Efficient Self-embedding Data Hiding for Image Integrity Verification with Pixel-Wise Recovery Capability

  • Faranak Tohidi
  • Manoranjan PaulEmail author
  • Mohammad Reza Hooshmandasl
  • Tanmoy Debnath
  • Hojjat Jamshidi
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11854)


Due to the powerful image editing tools, image integrity protection is becoming important, for instance, in a court of law, news reports, insurance claims or telemedicine. Digital image watermarking is a technique for detecting, localizing and recovering of tampered image but capability and accuracy of performance by the existing methods are still issues especially when tampering rate is relatively high. This paper proposes a novel blind fragile watermarking mechanism for effective image authentication and recovery. In the proposed scheme, not only the probability of detection and localization of tampering is increased because of embedding appropriate authentication code in the proper position but also there is an efficient post-processing of recovery in a way that any pixel has treated differently leading to higher quality of recovered image. Furthermore, embedding more fragile authentication code with a smaller number of bits can help to provide a second opportunity for content recovery while the quality of watermarked image is preserved. Thus, better results have been achieved in terms of accuracy of detection and the quality of recovered image after higher tampering rate compared with some of the state-of-the-art schemes.


Watermarking Tamper detection Image recovery Image security Image authentication 


  1. 1.
    Liu, X.-L., Lin, C.-C., Yuan, S.-M.: Blind dual watermarking for color images’ authentication and copyright protection. IEEE Trans. Circ. Syst. Video Technol. 28(5), 1047–1055 (2018)CrossRefGoogle Scholar
  2. 2.
    Wang, N., Cheng, X., Li, Z., Chen, Y.: Dual watermarking algorithm based on singular value decomposition and compressive sensing. In: IEEE 17th International Conference on Communication Technology (ICCT), pp. 1763–1767 (2017)Google Scholar
  3. 3.
    Qin, C., Ji, P., Zhang, X., Dong, J., Wang, J.: Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Sig. Process. 138, 280–293 (2017)CrossRefGoogle Scholar
  4. 4.
    Dole, V.S., Patil, N.N.: Self-embedding fragile watermarking for image tampering detection and image recovery using self recovery blocks. In: IEEE International Conference on Computing Communication Control and Automation, (ICCUBEA) (2015)Google Scholar
  5. 5.
    Sing, D., Sing, S.K.: Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J. Vis. Commun. Image Represent. 38, 775–789 (2016)CrossRefGoogle Scholar
  6. 6.
    Shehab, M., et al.: Secure and robust fragile watermarking scheme for medical images. IEEE Access 6, 10269–10278 (2018)CrossRefGoogle Scholar
  7. 7.
    Hsu, C.-S., Tu, S.-F.: Image tamper detection and recovery using adaptive embedding rules. Measurement 88, 287–296 (2016)CrossRefGoogle Scholar
  8. 8.
    Haghighi, B.B., Taherinia, A.H.: TRLH: fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and half toning technique. J. Vis. Commun. Image Represent. 50, 49–64 (2018)CrossRefGoogle Scholar
  9. 9.
    Tai, W.L., Liao, Z.J.: Image self-recovery with watermark self-embedding. In: IEEE International Conference on Signal Processing, Signal Processing: Image Communication, vol. 65, pp. 11–25, July 2018Google Scholar
  10. 10.
    Kim, C., Shin, D., Yang, C.-N.: Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC. Pers. Ubiquit. Comput. 22(1), 11–22 (2018)CrossRefGoogle Scholar
  11. 11.
    Qin, C., Ji, P., Chang, C.-C., Dong, J., Sun, X.: Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery. IEEE Multimedia 25, 36–48 (2018)CrossRefGoogle Scholar
  12. 12.
    Rakhmawati, L., Wirawan, W., Suwadi, S.: A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability. EURASIP J. Image Video Process. 2019, 1–22 (2019)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Faranak Tohidi
    • 1
    • 2
    • 3
  • Manoranjan Paul
    • 3
    Email author
  • Mohammad Reza Hooshmandasl
    • 1
    • 2
  • Tanmoy Debnath
    • 3
  • Hojjat Jamshidi
    • 4
  1. 1.The Laboratory of Quantum Information ProcessingYazd UniversityYazdIran
  2. 2.Department of Computer ScienceYazd UniversityYazdIran
  3. 3.School of Computing and MathematicsCharles Sturt UniversityBathurstAustralia
  4. 4.Tehran UniversityTehranIran

Personalised recommendations