Abstract
Recent fragile watermarking is applied to protect the content integrity, to detect and locate the tampered area, and to recover the tampered data of digital images. Since the watermark which is made up of a considerable amount of digital data distorts the protected image seriously, attention has been drawn to fidelity preservation of the watermarked image. A typical watermarking scheme with fidelity preservation was proposed by Lin et al., in which the superiority is that high fidelity of the watermarked image can be guaranteed while retaining the tamper-proof functionality. However, no recovery capability is provided in the original scheme; therefore it cannot meet the requirement of recent watermarking applications. In addition, the original scheme is insecure. Any part of the protected image can be replaced with an arbitrary image by some simple operations, and the illegal modification could not be detected. In this paper, we attack the original scheme first and then overcome the insecurity problem by using a modified weighted-sum function; we also design an improved scheme with recovery capability by using the vector quantization technology, while maintaining the superiority of the original scheme, i.e., fidelity preservation. Experiments verify the feasibility of the proposed method.
Similar content being viewed by others
References
De Vleeschouwer, C.; Delaigle, J.F.; Macq, B.: Invisibility and application functionalities in perceptual watermarking an overview. Proc. IEEE 90(1), 64–77 (2002)
Petitcolas F.A., Anderson R.J., Kuhn M.G.: Information hiding—a survey. Proc. IEEE 87(7), 1062–1078 (1999)
Wong P.W., Memon N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10(10), 1593–1601 (2001)
Suthaharan S.: Fragile image watermarking using a gradient image for improved localization and security. Pattern Recognit. Lett. 25(16), 1893–1903 (2004)
Yang H., Kot A.C.: Binary image authentication with tampering localization by embedding cryptographic signature and block identifier. IEEE Signal Process. Lett. 13(12), 741–744 (2006)
Zhang X., Wang S.: Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process. Lett. 14(10), 727–730 (2007)
Zhang X., Wang S.: Fragile watermarking with error-free restoration capability. IEEE Trans. Multimedia 10(8), 1490–1499 (2008)
Qin C., Chang C.C., Chen P.Y.: Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process. 92(4), 1137–1150 (2012)
Zhang X., Wang S., Qian Z., Feng G.: Reference sharing mechanism for watermark self-embedding. IEEE Trans. Image Process. 20(2), 485–495 (2011)
Qian Z., Feng G., Zhang X., Wang S.: Image self-embedding with high-quality restoration capability. Digit. Signal Process. 21(2), 278–286 (2011)
Qian Z., Feng G.: Inpainting assisted self recovery with decreased embedding data. IEEE Signal Process. Lett. 17(11), 929–932 (2010)
Lin P.Y., Lee J.S., Chang C.C.: Protecting the content integrity of digital imagery with fidelity preservation. ACM Trans. Multimedia Comput. Commun. Appl. 7(3), 15 (2011)
Chang C.K., Jiang T.M.: A binary single-key-lock system for access control. IEEE Trans. Comput. 38(10), 1462–1466 (1989)
Wu M.L., Hwang T.Y.: Access control with single-key-lock. IEEE Trans. Softw. Eng. 10(2), 185–191 (1984)
Linde Y., Buzo A., Gray R.: An algorithm for vector quantizer design. IEEE Trans. Commun. 28(1), 84–95 (1980)
Wu H.C., Chang C.C.: A novel digital image watermarking scheme based on the vector quantization technique. Comput. Secur. 24(6), 460–471 (2005)
Kerckhoffs A.: La Cryptographie Militaire. University Microfilms, Ann Arbor (1978)
Zhang, L.; Zhang, L.; Mou, X.; Zhang, D.: A comprehensive evaluation of full reference image quality assessment algorithms. In: 19th IEEE International Conference on Image Processing (ICIP), pp. 1477–1480 (2012)
Wang Z., Bovik A.C., Sheikh H.R., Simoncelli E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)
Wang, Z.; Simoncelli, E.P.; Bovik, A.C.: Multiscale structural similarity for image quality assessment. In: Conference Record of the Thirty-Seventh Asilomar Conference on Signals, Systems and Computers, vol 2, pp. 1398–1402 (2003)
Zhang L., Zhang L., Mou X., Zhang D.: FSIM: a feature similarity index for image quality assessment. IEEE Trans. Image Process. 20(8), 2378–2386 (2011)
Okarma K.: Combined image similarity index. Opt. Rev. 19(5), 349–354 (2012)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Li, M., Xiao, D. & Zhang, Y. Attack and Improvement of the Fidelity Preserved Fragile Watermarking of Digital Images. Arab J Sci Eng 41, 941–950 (2016). https://doi.org/10.1007/s13369-015-1941-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13369-015-1941-1