Skip to main content
Log in

Attack and Improvement of the Fidelity Preserved Fragile Watermarking of Digital Images

  • Research Article - Computer Engineering and Computer Science
  • Published:
Arabian Journal for Science and Engineering Aims and scope Submit manuscript

Abstract

Recent fragile watermarking is applied to protect the content integrity, to detect and locate the tampered area, and to recover the tampered data of digital images. Since the watermark which is made up of a considerable amount of digital data distorts the protected image seriously, attention has been drawn to fidelity preservation of the watermarked image. A typical watermarking scheme with fidelity preservation was proposed by Lin et al., in which the superiority is that high fidelity of the watermarked image can be guaranteed while retaining the tamper-proof functionality. However, no recovery capability is provided in the original scheme; therefore it cannot meet the requirement of recent watermarking applications. In addition, the original scheme is insecure. Any part of the protected image can be replaced with an arbitrary image by some simple operations, and the illegal modification could not be detected. In this paper, we attack the original scheme first and then overcome the insecurity problem by using a modified weighted-sum function; we also design an improved scheme with recovery capability by using the vector quantization technology, while maintaining the superiority of the original scheme, i.e., fidelity preservation. Experiments verify the feasibility of the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. De Vleeschouwer, C.; Delaigle, J.F.; Macq, B.: Invisibility and application functionalities in perceptual watermarking an overview. Proc. IEEE 90(1), 64–77 (2002)

  2. Petitcolas F.A., Anderson R.J., Kuhn M.G.: Information hiding—a survey. Proc. IEEE 87(7), 1062–1078 (1999)

    Article  Google Scholar 

  3. Wong P.W., Memon N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10(10), 1593–1601 (2001)

    Article  MATH  Google Scholar 

  4. Suthaharan S.: Fragile image watermarking using a gradient image for improved localization and security. Pattern Recognit. Lett. 25(16), 1893–1903 (2004)

    Article  Google Scholar 

  5. Yang H., Kot A.C.: Binary image authentication with tampering localization by embedding cryptographic signature and block identifier. IEEE Signal Process. Lett. 13(12), 741–744 (2006)

    Article  Google Scholar 

  6. Zhang X., Wang S.: Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process. Lett. 14(10), 727–730 (2007)

    Article  Google Scholar 

  7. Zhang X., Wang S.: Fragile watermarking with error-free restoration capability. IEEE Trans. Multimedia 10(8), 1490–1499 (2008)

    Article  Google Scholar 

  8. Qin C., Chang C.C., Chen P.Y.: Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process. 92(4), 1137–1150 (2012)

    Article  Google Scholar 

  9. Zhang X., Wang S., Qian Z., Feng G.: Reference sharing mechanism for watermark self-embedding. IEEE Trans. Image Process. 20(2), 485–495 (2011)

    Article  MathSciNet  Google Scholar 

  10. Qian Z., Feng G., Zhang X., Wang S.: Image self-embedding with high-quality restoration capability. Digit. Signal Process. 21(2), 278–286 (2011)

    Article  MathSciNet  Google Scholar 

  11. Qian Z., Feng G.: Inpainting assisted self recovery with decreased embedding data. IEEE Signal Process. Lett. 17(11), 929–932 (2010)

    Article  Google Scholar 

  12. Lin P.Y., Lee J.S., Chang C.C.: Protecting the content integrity of digital imagery with fidelity preservation. ACM Trans. Multimedia Comput. Commun. Appl. 7(3), 15 (2011)

    Article  Google Scholar 

  13. Chang C.K., Jiang T.M.: A binary single-key-lock system for access control. IEEE Trans. Comput. 38(10), 1462–1466 (1989)

    Article  MathSciNet  Google Scholar 

  14. Wu M.L., Hwang T.Y.: Access control with single-key-lock. IEEE Trans. Softw. Eng. 10(2), 185–191 (1984)

    Article  Google Scholar 

  15. Linde Y., Buzo A., Gray R.: An algorithm for vector quantizer design. IEEE Trans. Commun. 28(1), 84–95 (1980)

    Article  Google Scholar 

  16. Wu H.C., Chang C.C.: A novel digital image watermarking scheme based on the vector quantization technique. Comput. Secur. 24(6), 460–471 (2005)

    Article  MathSciNet  Google Scholar 

  17. Kerckhoffs A.: La Cryptographie Militaire. University Microfilms, Ann Arbor (1978)

    Google Scholar 

  18. Zhang, L.; Zhang, L.; Mou, X.; Zhang, D.: A comprehensive evaluation of full reference image quality assessment algorithms. In: 19th IEEE International Conference on Image Processing (ICIP), pp. 1477–1480 (2012)

  19. Wang Z., Bovik A.C., Sheikh H.R., Simoncelli E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)

    Article  Google Scholar 

  20. Wang, Z.; Simoncelli, E.P.; Bovik, A.C.: Multiscale structural similarity for image quality assessment. In: Conference Record of the Thirty-Seventh Asilomar Conference on Signals, Systems and Computers, vol 2, pp. 1398–1402 (2003)

  21. Zhang L., Zhang L., Mou X., Zhang D.: FSIM: a feature similarity index for image quality assessment. IEEE Trans. Image Process. 20(8), 2378–2386 (2011)

    Article  MathSciNet  Google Scholar 

  22. Okarma K.: Combined image similarity index. Opt. Rev. 19(5), 349–354 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ming Li.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, M., Xiao, D. & Zhang, Y. Attack and Improvement of the Fidelity Preserved Fragile Watermarking of Digital Images. Arab J Sci Eng 41, 941–950 (2016). https://doi.org/10.1007/s13369-015-1941-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13369-015-1941-1

Keywords

Navigation