Skip to main content
Log in

A secure DWT-based dual watermarking scheme for image authentication and copyright protection

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Digital watermarking mechanisms have become an essential tool for guaranteeing copyright protection and content authentication. However, most state-of-the-art works focus on providing only one of these services. In this paper, a dual watermarking scheme for image authentication and copyright protection is introduced. The proposed scheme simultaneously embeds two watermarks in the host image by exploiting the discrete wavelet transform (DWT). A fragile watermark and a robust watermark are embedded into frequency domain by modifying DWT coefficients of high-frequency sub-bands. To improve the scheme security, host image undergoes a chaotic transformation while robust watermark is obtained by using a particular visual cryptography technique. The proposed scheme provides satisfactory watermark imperceptibility levels, achieving PSNR values above 49dB when a small watermark is used and above 40dB when a larger watermark is embedded. Several image processing attacks are applied to evaluate the watermark robustness, obtaining normal correlation coefficient values near to 1 against most attacks. Finally, an authentication accuracy near to 1 is achieved when marked images undergo tampering attacks. The obtained results show that proposed scheme achieves competitive results in terms of imperceptibility and outperforms similar state-of-the-art dual watermarking methods in terms of watermark robustness and authentication accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data Availability

All data generated or analyzed during this study are included in this published article (and its supplementary information files).

References

  1. Agarwal N, Singh AK, Singh PK (2019) Survey of robust and imperceptible watermarking. Multimed Tools Appl 78(7):8603–8633. https://doi.org/10.1007/s11042-018-7128-5

    Article  Google Scholar 

  2. Ahmadi SBB, Zhang G, Rabbani M, et al (2021) An intelligent and blind dual color image watermarking for authentication and copyright protection. Appl Intell 51(3):1701–1732. https://doi.org/10.1007/s10489-020-01903-0

    Article  Google Scholar 

  3. Ali M, Ahn CW, Pant M (2014) A robust image watermarking technique using svd and differential evolution in dct domain. Optik 125(1):428–434. https://doi.org/10.1016/j.ijleo.2013.06.082

    Article  Google Scholar 

  4. Arnold VI, Avez A (1968) Ergodic problems of classical mechanics, vol 9. Benjamin

  5. Behnia S, Ahadpour S, Ayubi P (2014) Design and implementation of coupled chaotic maps in watermarking. Appl Soft Comput 21:481–490. https://doi.org/10.1016/j.asoc.2014.03.022

    Article  Google Scholar 

  6. Chen W, Quan C, Tay C (2009) Optical color image encryption based on arnold transform and interference method. Opt Commun 282(18):3680–3685. https://doi.org/10.1016/j.optcom.2009.06.014

    Article  Google Scholar 

  7. Chrysochos E, Fotopoulos V, Xenos M, et al (2014) Hybrid watermarking based on chaos and histogram modification. Signal Image Video Process 8(5):843–857. https://doi.org/10.1007/s11760-012-0307-3

    Article  Google Scholar 

  8. Chung KL, Yang WN, Huang YH, et al (2007) On svd-based watermarking algorithm. Appl Math Comput 188(1):54–57. https://doi.org/10.1016/j.amc.2006.09.117

    Article  MathSciNet  MATH  Google Scholar 

  9. Cox IJ, Doërr G, Furon T (2006) Watermarking is not cryptography. In: Digital watermarking. Springer, Berlin, pp 1–15. https://doi.org/10.1007/11922841_1

  10. Cox I, Miller M, Bloom J, et al (2008) Digital Watermarking and Steganography, 2nd edn. The Morgan Kaufmann Series in Multimedia Information and Systems, Morgan Kaufmann Publishers Inc., San Francisco. https://doi.org/10.1016/B978-012372585-1.50005-X

    Google Scholar 

  11. Darwish SM, Al-Khafaji LDS (2020) Dual watermarking for color images: a new image copyright protection model based on the fusion of successive and segmented watermarking. Multimed Tools Appl 79(9):6503–6530. https://doi.org/10.1007/s11042-019-08290-w

    Article  Google Scholar 

  12. Das C, Panigrahi S, Sharma VK, et al (2014) A novel blind robust image watermarking in dct domain using inter-block coefficient correlation. AEU - Int J Electron Commun 68(3):244–253. https://doi.org/10.1016/j.aeue.2013.08.018

    Article  Google Scholar 

  13. Daubechies I (1992) Ten lectures on wavelets. SIAM

  14. Fazli S, Moeini M (2016) A robust image watermarking method based on dwt, dct, and svd using a new technique for correction of main geometric attacks. Optik 127(2):964–972. https://doi.org/10.1016/j.ijleo.2015.09.205

    Article  Google Scholar 

  15. Gong X, Chen L, Yu F, et al (2020) A secure image authentication scheme based on dual fragile watermark. Multimed Tools Appl 79(25):18,071–18,088. https://doi.org/10.1007/s11042-019-08594-x

    Article  Google Scholar 

  16. Haghighi BB, Taherinia AH, Harati A (2018) Trlh: fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique. J Vis Commun Image Represent 50:49–64. https://doi.org/10.1016/j.jvcir.2017.09.017

    Article  Google Scholar 

  17. Hosny KM, Darwish MM (2018) Robust color image watermarking using invariant quaternion legendre-fourier moments. Multimed Tools Appl 77 (19):24,727–24,750. https://doi.org/10.1007/s11042-018-5670-9

    Article  Google Scholar 

  18. Hosny KM, Darwish MM (2021) New geometrically invariant multiple zero-watermarking algorithm for color medical images. Biomed Signal Process Control 70:103,007. https://doi.org/10.1016/j.bspc.2021.103007

    Article  Google Scholar 

  19. Hosny KM, Darwish MM, Fouda MM (2021a) New color image zero-watermarking using orthogonal multi-channel fractional-order legendre-fourier moments. IEEE Access 9:91,209–91,219. https://doi.org/10.1109/ACCESS.2021.3091614

  20. Hosny KM, Darwish MM, Fouda MM (2021b) Robust color images watermarking using new fractional-order exponent moments. IEEE Access 9:47,425–47,435. https://doi.org/10.1109/ACCESS.2021.3068211

  21. Hu HT, Chang JR, Hsu LY (2016) Robust blind image watermarking by modulating the mean of partly sign-altered dct coefficients guided by human visual perception. AEU - Int J Electron Commun 70(10):1374–1381. https://doi.org/10.1016/j.aeue.2016.07.011

    Article  Google Scholar 

  22. Khalili M (2015) Dct-arnold chaotic based watermarking using jpeg-ycbcr. Optik 126(23):4367–4371. https://doi.org/10.1016/j.ijleo.2015.08.042

    Article  Google Scholar 

  23. Kumar A, Agarwal P, Choudhary A (2016) A digital image watermarking technique using cascading of dct and biorthogonal wavelet transform. In: Proceedings of the international conference on recent cognizance in wireless communication & image processing. Springer, New Delhi, pp 21–29, DOI https://doi.org/10.1007/978-81-322-2638-3_3

  24. Kumar S, Singh BK, Yadav M (2020) A recent survey on multimedia and database watermarking. Multimed Tools Appl 79(27):20,149–20,197. https://doi.org/10.1007/s11042-020-08881-y

    Article  Google Scholar 

  25. Lei B, Tan EL, Chen S, et al (2014) Reversible watermarking scheme for medical image based on differential evolution. Expert Syst Appl 41 (7):3178–3188. https://doi.org/10.1016/j.eswa.2013.11.019

    Article  Google Scholar 

  26. Li B, Xu JW (2005) Period of arnold transformation and its application in image scrambling. J Cent South Univ Technol 12(1):278–282. https://doi.org/10.1007/s11771-005-0414-1

    Article  Google Scholar 

  27. Lin PY, Lee JS, Chang CC (2009) Dual digital watermarking for internet media based on hybrid strategies. IEEE Trans Circuits Syst Video Technol 19(8):1169–1177. https://doi.org/10.1109/TCSVT.2009.2020263

    Article  Google Scholar 

  28. Liu SH, Yao HX, Gao W, et al (2007) An image fragile watermark scheme based on chaotic image pattern and pixel-pairs. Appl Math Comput 185 (2):869–882. https://doi.org/10.1016/j.amc.2006.07.036

    Article  MATH  Google Scholar 

  29. Liu H, Xiao D, Zhang R, et al (2016a) Robust and hierarchical watermarking of encrypted images based on compressive sensing. Signal Process Image Commun 45:41–51. https://doi.org/10.1016/j.image.2016.04.002

  30. Liu XL, Lin CC, Yuan SM (2016b) Blind dual watermarking for color images’ authentication and copyright protection. IEEE Trans Circ Syst Video Technol 28(5):1047–1055. https://doi.org/10.1109/TCSVT.2016.2633878

  31. Lu CS, Liao HY (2001) Multipurpose watermarking for image authentication and protection. IEEE Trans Image Process 10(10):1579–1592. https://doi.org/10.1109/83.951542

    Article  MATH  Google Scholar 

  32. Luo T, Jiang G, Yu M, et al (2019) Robust high dynamic range color image watermarking method based on feature map extraction. Signal Process 155:83–95. https://doi.org/10.1016/j.sigpro.2018.09.024

    Article  Google Scholar 

  33. Lusson F, Bailey K, Leeney M, et al (2013) A novel approach to digital watermarking, exploiting colour spaces. Signal Process 93(5):1268–1294. https://doi.org/10.1016/j.sigpro.2012.10.018

    Article  Google Scholar 

  34. Makbol NM, Khoo BE, Rassem TH (2016) Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics. IET Image Process 10(1):34–52. https://doi.org/10.1049/iet-ipr.2014.0965

    Article  Google Scholar 

  35. Mallat SG (1989) A theory for multiresolution signal decomposition: the wavelet representation. IEEE Trans Pattern Anal Mach Intell 11(7):674–693. https://doi.org/10.1109/34.192463

    Article  MATH  Google Scholar 

  36. Mishra A, Agarwal C, Sharma A, et al (2014) Optimized gray-scale image watermarking using dwt–svd and firefly algorithm. Expert Syst Appl 41 (17):7858–7867. https://doi.org/10.1016/j.eswa.2014.06.011

    Article  Google Scholar 

  37. Mohanarathinam A, Kamalraj S, Venkatesan GP, et al (2019) Digital watermarking techniques for image security: a review. J Ambient Intell Humaniz Comput:1–9. https://doi.org/10.1007/s12652-019-01500-1

  38. Molina-Garcia J, Garcia-Salgado BP, Ponomaryov V, et al (2020) An effective fragile watermarking scheme for color image tampering detection and self-recovery. Signal Process Image Commun 81:115,725. https://doi.org/10.1016/j.image.2019.115725

    Article  Google Scholar 

  39. Naor M, Shamir A (1994) Visual cryptography. In: Workshop on the theory and application of of cryptographic techniques. Springer, Berlin, pp 1–12. https://doi.org/10.1007/BFb0053419

  40. Nikolaidis N, Pitas I (1998) Robust image watermarking in the spatial domain. Signal Process 66(3):385–403. https://doi.org/10.1016/S0165-1684(98)00017-6

    Article  MATH  Google Scholar 

  41. of Southern California U (1977) Sipi data base. http://sipi.usc.edu/database/

  42. Podilchuk CI, Delp EJ (2001) Digital watermarking: algorithms and applications. IEEE Signal Process Mag 18(4):33–46. https://doi.org/10.1109/79.939835

    Article  Google Scholar 

  43. Preda RO (2013) Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain. Measurement 46(1):367–373. https://doi.org/10.1016/j.measurement.2012.07.010

    Article  Google Scholar 

  44. Preda R, Vizireanu D (2015) Watermarking-based image authentication robust to jpeg compression. Electron Lett 51(23):1873–1875

    Article  Google Scholar 

  45. Qin C, Ji P, Zhang X, et al (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280–293. https://doi.org/10.1016/j.sigpro.2017.03.033

    Article  Google Scholar 

  46. Rawat S, Raman B (2012) A blind watermarking algorithm based on fractional fourier transform and visual cryptography. Signal Process 92(6):1480–1491. https://doi.org/10.1016/j.sigpro.2011.12.006

    Article  Google Scholar 

  47. Reyes R, Cruz C, Nakano-Miyatake M, et al (2010) Digital video watermarking in dwt domain using chaotic mixtures. IEEE Lat Am Trans 8(3):304–310. https://doi.org/10.1109/TLA.2010.5538406

    Article  Google Scholar 

  48. Shyu SJ (2015) Visual cryptograms of random grids for threshold access structures. Theor Comput Sci 565:30–49. https://doi.org/10.1016/j.tcs.2014.10.048

    Article  MathSciNet  MATH  Google Scholar 

  49. Singh AK, Dave M, Mohan A (2014) Hybrid technique for robust and imperceptible image watermarking in dwt–dct–svd domain. Natl Acad Sci Lett 37(4):351–358. https://doi.org/10.1007/s40009-014-0241-8

    Article  Google Scholar 

  50. Singh AK, Dave M, Mohan A (2015) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimed Tools Appl:1–21. https://doi.org/10.1007/s11042-015-2754-7

  51. Sreenivas K, Prasad VK (2018) Fragile watermarking schemes for image authentication: a survey. Int J Mach Learn Cybern 9(7):1193–1218. https://doi.org/10.1007/s13042-017-0641-4

    Article  Google Scholar 

  52. Su Q, Niu Y, Zou H, et al (2013) A blind dual color images watermarking based on singular value decomposition. Appl Math Comput 219(16):8455–8466. https://doi.org/10.1016/j.amc.2013.03.013

    Article  MathSciNet  MATH  Google Scholar 

  53. Su Q, Chen B (2018) Robust color image watermarking technique in the spatial domain. Soft Comput 22(1):91–106. https://doi.org/10.1007/s00500-017-2489-7

    Article  Google Scholar 

  54. Voyatzis G, Pitas I (1996) Applications of toral automorphisms in image watermarking. In: Image processing 1996. Proceedings international conference on. IEEE, pp 237–240. https://doi.org/10.1109/ICIP.1996.560753

  55. Wallace GK (1992) The jpeg still picture compression standard. IEEE Trans Consum Electron 38(1):xviii–xxxiv. https://doi.org/10.1109/30.125072

    Article  Google Scholar 

  56. Xia Z, Wang X, Han B, et al (2021) Color image triple zero-watermarking using decimal-order polar harmonic transforms and chaotic system. Signal Process 180:107,864. https://doi.org/10.1016/j.sigpro.2020.107864

    Article  Google Scholar 

  57. Yan B, Xiang Y, Hua G (2020) Basic Visual Cryptography Algorithms. Springer, Singapore, pp 15–33. https://doi.org/10.1007/978-981-13-8289-5_2

    Google Scholar 

  58. Zhang L, Zhang L, Mou X, et al (2011) Fsim: a feature similarity index for image quality assessment. IEEE Trans Image Process 20(8):2378–2386. https://doi.org/10.1109/TIP.2011.2109730

    Article  MathSciNet  MATH  Google Scholar 

  59. Zhu P, Jia F, Zhang J (2013) A copyright protection watermarking algorithm for remote sensing image based on binary image watermark. Optik 124 (20):4177–4181. https://doi.org/10.1016/j.ijleo.2012.12.049

    Article  Google Scholar 

  60. Zope-Chaudhari S, Venkatachalam P, Buddhiraju KM (2015) Secure dissemination and protection of multispectral images using crypto-watermarking. IEEE J Sel Top Appl Earth Obs Remote Sens 8(11):5388–5394. https://doi.org/10.1109/JSTARS.2015.2475169

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Council of Science and Technology of Mexico - CONACyT [grant numbers 702608 and 731618].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Cumplido.

Ethics declarations

Conflict of Interests

The authors declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hernández-Joaquín, A., Melendez-Melendez, G. & Cumplido, R. A secure DWT-based dual watermarking scheme for image authentication and copyright protection. Multimed Tools Appl 82, 42739–42761 (2023). https://doi.org/10.1007/s11042-023-14974-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-14974-1

Keywords

Navigation