Skip to main content
Log in

A self-embedding fragile image authentication based on singular value decomposition

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Nowadays, image authentication techniques are widely applied to digital multimedia to address their fraudulent and illegal use. Digital multimedia plays a vital role in various real time applications and therefore, there is a need for the development of more powerful and robust algorithms in order to strengthen their security. In this paper, we proposed a self-embedding fragile image authentication method based on Singular Value Decomposition (SVD). First the original image was divided into non-overlapping blocks and thereafter, each block was further divided into two parts: upper part and bottom part. After block separation, SVD was performed to generate the authentication information for both upper and bottom parts of each block, which were concatenated to generate the authentication code. We performed a series of attacking experiments on the original image to test the robustness of the proposed method. The recovered imperceptibility of the proposed scheme was measured using False Positive Rate (FPR), False Negative Rate (FNR), Peak Signal to Noise Ratio (PSNR), and Structural Similarity (SSIM). It was found that our method not only surpassed previous methods in PSNR but FNR and FPR as well. The experimental results showed an excellent visual imperceptibility against a variety of attacks. The proposed method detected image tampering precisely, and even after massive tampering, it was able to recover the tampered image with high quality.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Ababneh S, Ansari R, Khokhar A (2009) Iterative compensation schemes for multimedia content authentication. J Vis Commun Image R 20(5):303–311

    Article  Google Scholar 

  2. Ansari IA, Pant M, Ahn CW (2016) SVD based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybern 7(6):1225–1239

    Article  Google Scholar 

  3. Benrhouma O, Hermassi H, Belghith S (2015) Tamper detection and self-recovery scheme by DWT watermarking. Nonlinear Dynam 79(3):1817–1833

    Article  Google Scholar 

  4. Bravo-Solorio S, Nandi AK (2011) Secure fragile watermarking method for image authentication with improved tampering localization and self-recovery capabilities. Signal Process 91(4):728–739

    Article  MATH  Google Scholar 

  5. Chamlawi R, Khan A, Usman I (2010) Authentication and recovery of image using multiple watermarks. Comput Electr Eng 36(3):578–584

    Article  MATH  Google Scholar 

  6. Chen F, He H (2014) Chaos-based self-embedding fragile watermarking with flexible watermark payload. Multimed Appls 72(1):41–56

    Article  Google Scholar 

  7. Chen WC, Wang MS (2009) A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Syst Appl 36(2):1300–1307

    Article  Google Scholar 

  8. Chen YH, Lin CY, Sirakriengkrai W, Weng IC (2015) Repairable image authentication scheme. International Journal of Network Security 17(4):439–444

    Google Scholar 

  9. Chen F, He H, Huo Y (2017) Self-embedding watermarking scheme against JPEG compression with superior imperceptibility. Multimed Tools Appl 76(7):9681–9712

    Article  Google Scholar 

  10. Dadkhah S, Manaf AA (2014) An effective SVD-based image tampering detection and self-recovery using active watermarking. Signal Process Image Commun 29(10):1197–1210

    Article  Google Scholar 

  11. Das C, Panigrahi S, Sharma VK, Mahapatra KK (2014) A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. AEU Int J Electron Commun 68(3):244–253

    Article  Google Scholar 

  12. Dhole, VS, Patil, NN (2015). Self embedding fragile watermarking for image tampering detection and image recovery using self-recovery blocks. Proc Int Conf Comput Commun Control Autom (ICCUBEA) 752–757.

  13. Di YF, Lee CF, Wang ZH, Chang CC, Li JJ (2016) A robust and removable watermarking scheme using singular value decomposition. KSII T Internet Info 10(12):5831–5848

    Google Scholar 

  14. El'arbi M, Amar CB (2014) Image authentication algorithm with recovery capabilities based on neural networks in the DCT domain. IET Signal Process 8(11):619–626

    Google Scholar 

  15. Hao W, Xiang L, Li Y, Yang P, Shen X (2018) Reversible natural language watermarking using synonym substitution and arithmetic coding. CMC-Computers, Materials & Continua 55(3):541–559

    Google Scholar 

  16. Hsu CS, Tu SF (2016) Image tamper detection and recovery using adaptive embedding rules. Measurement. 88:287–296

    Article  Google Scholar 

  17. Lee CT, Si H (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506

    Article  MATH  Google Scholar 

  18. Lee CF, Chen KN, Chang CC, Tsai MC (2011) A hierarchical fragile watermarking with VQ index recovery. J Multimed 6(3):277–284

    Article  Google Scholar 

  19. Lee CF, Shen JJ, Chen ZR, Agrawal S (2019) Self-embedding authentication watermarking with effective tampered location detection and high-quality image recovery. Sensors. 19(10):2267

    Article  Google Scholar 

  20. Li C, Zhang A, Liu Z, Liao L, Huang D (2015) Semi-fragile self-recoverable watermarking algorithm based on wavelet group quantization and double authentication. Multimed Tools Appl 74(23):10581–10604

    Article  Google Scholar 

  21. Lo CC, Hu YC (2014) A novel reversible image authentication scheme for digital images. Signal Process 98:174–185

    Article  Google Scholar 

  22. Lou DC, Liu JL (2000) Fault resilient and compression tolerant digital signature for image authentication. IEEE T Consum Electr 46(1):31–39

    Article  Google Scholar 

  23. Mishra A, Agarwal C, Sharma A, Bedi P (2014) Optimized gray-scale image watermarking using DWT-SVD and firefly algorithm. Expert Syst Appl 41(17):7858–7867

    Article  Google Scholar 

  24. Parah SA, Sheikh JA, Loan NA, Bhat GM (2016) Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digit Signal Process 53:11–24

    Article  Google Scholar 

  25. Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Vis Commun Image R 30:312–327

    Article  Google Scholar 

  26. Qin C, Zhang P, Ji X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280–293

    Article  Google Scholar 

  27. Rameshkumar AUS, Suresh GR (2014) Secure medical image communication using ROI based lossless watermarking and novel digital signature. Journal of Engineering Research 2(3):87–108

    Google Scholar 

  28. Rey C, Dugelay JL (2002) A survey of watermarking algorithms for image authentication. EURASIP J Adv Signal Process 2002(1):613–621

    MATH  Google Scholar 

  29. Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269–10278

    Article  Google Scholar 

  30. Singh AK (2017) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed Tools Appl 76(6):8881–8900

    Article  Google Scholar 

  31. Singh D, Singh SK (2016) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J Vis Commun Image Represent 38:775–789

    Article  Google Scholar 

  32. Singh AK, Kumar B, Dave M, Mohan A (2015) Robust and imperceptible dual watermarking for telemedicine applications. Wirel Pers Commun 80(4):1415–1433

    Article  Google Scholar 

  33. Tai WL, Liao ZJ (2018) Image self-recovery with watermark self-embedding. Signal Process 65:11–25

    Google Scholar 

  34. Tiwari A, Sharma M, Tamrakar RK (2017) Watermarking based image authentication and tamper detection algorithm using vector quantization approach. AEU-Int J Electron C 78:114–123

    Article  Google Scholar 

  35. Tsai P, Hu Y, Chang C (2005) Novel image authentication scheme based on quadtree segmentation. Imaging Sci J 53(3):149–162

    Article  Google Scholar 

  36. Wang C, Zhang H, Zhou X (2018) A self-recovery fragile image watermarking with variable watermark capacity. Appl Sci 8(4):548–568

    Article  Google Scholar 

  37. Wu WC, Lin ZW (2016) SVD-based self-embedding image authentication scheme using quick response code features. J Vis Commun Image 38:18–28

    Article  Google Scholar 

  38. Yin Z, Niu X, Zhou Z, Tang J, Luo B (2016) Improved reversible image authentication scheme. Cogn Comput 8:890–899

    Article  Google Scholar 

  39. Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77(4):4863–4882

    Article  Google Scholar 

  40. Zhang X, Wang S (2007) Statistical fragile watermarking capable of locating individual tampered pixels. IEEE signal process. Lett. 14(10):727–730

    Google Scholar 

Download references

Acknowledgements

We are grateful to all students and teachers who participated in this study and all the colleagues working to realize this project.

Disclosure statement

No potential conflict of interest was reported by the authors.

Funding

This research was partially supported by the Ministry of Science and Technology of the Republic of China under the Grant [MOST 106–2221-E-324-006 -MY2].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chin-Feng Lee.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shen, JJ., Lee, CF., Hsu, FW. et al. A self-embedding fragile image authentication based on singular value decomposition. Multimed Tools Appl 79, 25969–25988 (2020). https://doi.org/10.1007/s11042-020-09254-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09254-1

Keywords

Navigation