Abstract
Nowadays, image authentication techniques are widely applied to digital multimedia to address their fraudulent and illegal use. Digital multimedia plays a vital role in various real time applications and therefore, there is a need for the development of more powerful and robust algorithms in order to strengthen their security. In this paper, we proposed a self-embedding fragile image authentication method based on Singular Value Decomposition (SVD). First the original image was divided into non-overlapping blocks and thereafter, each block was further divided into two parts: upper part and bottom part. After block separation, SVD was performed to generate the authentication information for both upper and bottom parts of each block, which were concatenated to generate the authentication code. We performed a series of attacking experiments on the original image to test the robustness of the proposed method. The recovered imperceptibility of the proposed scheme was measured using False Positive Rate (FPR), False Negative Rate (FNR), Peak Signal to Noise Ratio (PSNR), and Structural Similarity (SSIM). It was found that our method not only surpassed previous methods in PSNR but FNR and FPR as well. The experimental results showed an excellent visual imperceptibility against a variety of attacks. The proposed method detected image tampering precisely, and even after massive tampering, it was able to recover the tampered image with high quality.
Similar content being viewed by others
References
Ababneh S, Ansari R, Khokhar A (2009) Iterative compensation schemes for multimedia content authentication. J Vis Commun Image R 20(5):303–311
Ansari IA, Pant M, Ahn CW (2016) SVD based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybern 7(6):1225–1239
Benrhouma O, Hermassi H, Belghith S (2015) Tamper detection and self-recovery scheme by DWT watermarking. Nonlinear Dynam 79(3):1817–1833
Bravo-Solorio S, Nandi AK (2011) Secure fragile watermarking method for image authentication with improved tampering localization and self-recovery capabilities. Signal Process 91(4):728–739
Chamlawi R, Khan A, Usman I (2010) Authentication and recovery of image using multiple watermarks. Comput Electr Eng 36(3):578–584
Chen F, He H (2014) Chaos-based self-embedding fragile watermarking with flexible watermark payload. Multimed Appls 72(1):41–56
Chen WC, Wang MS (2009) A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Syst Appl 36(2):1300–1307
Chen YH, Lin CY, Sirakriengkrai W, Weng IC (2015) Repairable image authentication scheme. International Journal of Network Security 17(4):439–444
Chen F, He H, Huo Y (2017) Self-embedding watermarking scheme against JPEG compression with superior imperceptibility. Multimed Tools Appl 76(7):9681–9712
Dadkhah S, Manaf AA (2014) An effective SVD-based image tampering detection and self-recovery using active watermarking. Signal Process Image Commun 29(10):1197–1210
Das C, Panigrahi S, Sharma VK, Mahapatra KK (2014) A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. AEU Int J Electron Commun 68(3):244–253
Dhole, VS, Patil, NN (2015). Self embedding fragile watermarking for image tampering detection and image recovery using self-recovery blocks. Proc Int Conf Comput Commun Control Autom (ICCUBEA) 752–757.
Di YF, Lee CF, Wang ZH, Chang CC, Li JJ (2016) A robust and removable watermarking scheme using singular value decomposition. KSII T Internet Info 10(12):5831–5848
El'arbi M, Amar CB (2014) Image authentication algorithm with recovery capabilities based on neural networks in the DCT domain. IET Signal Process 8(11):619–626
Hao W, Xiang L, Li Y, Yang P, Shen X (2018) Reversible natural language watermarking using synonym substitution and arithmetic coding. CMC-Computers, Materials & Continua 55(3):541–559
Hsu CS, Tu SF (2016) Image tamper detection and recovery using adaptive embedding rules. Measurement. 88:287–296
Lee CT, Si H (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506
Lee CF, Chen KN, Chang CC, Tsai MC (2011) A hierarchical fragile watermarking with VQ index recovery. J Multimed 6(3):277–284
Lee CF, Shen JJ, Chen ZR, Agrawal S (2019) Self-embedding authentication watermarking with effective tampered location detection and high-quality image recovery. Sensors. 19(10):2267
Li C, Zhang A, Liu Z, Liao L, Huang D (2015) Semi-fragile self-recoverable watermarking algorithm based on wavelet group quantization and double authentication. Multimed Tools Appl 74(23):10581–10604
Lo CC, Hu YC (2014) A novel reversible image authentication scheme for digital images. Signal Process 98:174–185
Lou DC, Liu JL (2000) Fault resilient and compression tolerant digital signature for image authentication. IEEE T Consum Electr 46(1):31–39
Mishra A, Agarwal C, Sharma A, Bedi P (2014) Optimized gray-scale image watermarking using DWT-SVD and firefly algorithm. Expert Syst Appl 41(17):7858–7867
Parah SA, Sheikh JA, Loan NA, Bhat GM (2016) Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digit Signal Process 53:11–24
Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Vis Commun Image R 30:312–327
Qin C, Zhang P, Ji X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280–293
Rameshkumar AUS, Suresh GR (2014) Secure medical image communication using ROI based lossless watermarking and novel digital signature. Journal of Engineering Research 2(3):87–108
Rey C, Dugelay JL (2002) A survey of watermarking algorithms for image authentication. EURASIP J Adv Signal Process 2002(1):613–621
Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269–10278
Singh AK (2017) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed Tools Appl 76(6):8881–8900
Singh D, Singh SK (2016) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J Vis Commun Image Represent 38:775–789
Singh AK, Kumar B, Dave M, Mohan A (2015) Robust and imperceptible dual watermarking for telemedicine applications. Wirel Pers Commun 80(4):1415–1433
Tai WL, Liao ZJ (2018) Image self-recovery with watermark self-embedding. Signal Process 65:11–25
Tiwari A, Sharma M, Tamrakar RK (2017) Watermarking based image authentication and tamper detection algorithm using vector quantization approach. AEU-Int J Electron C 78:114–123
Tsai P, Hu Y, Chang C (2005) Novel image authentication scheme based on quadtree segmentation. Imaging Sci J 53(3):149–162
Wang C, Zhang H, Zhou X (2018) A self-recovery fragile image watermarking with variable watermark capacity. Appl Sci 8(4):548–568
Wu WC, Lin ZW (2016) SVD-based self-embedding image authentication scheme using quick response code features. J Vis Commun Image 38:18–28
Yin Z, Niu X, Zhou Z, Tang J, Luo B (2016) Improved reversible image authentication scheme. Cogn Comput 8:890–899
Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77(4):4863–4882
Zhang X, Wang S (2007) Statistical fragile watermarking capable of locating individual tampered pixels. IEEE signal process. Lett. 14(10):727–730
Acknowledgements
We are grateful to all students and teachers who participated in this study and all the colleagues working to realize this project.
Disclosure statement
No potential conflict of interest was reported by the authors.
Funding
This research was partially supported by the Ministry of Science and Technology of the Republic of China under the Grant [MOST 106–2221-E-324-006 -MY2].
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Shen, JJ., Lee, CF., Hsu, FW. et al. A self-embedding fragile image authentication based on singular value decomposition. Multimed Tools Appl 79, 25969–25988 (2020). https://doi.org/10.1007/s11042-020-09254-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09254-1