Superpixel-Based Watermarking Scheme for Image Authentication and Recovery

  • Xiumei Qiao
  • Rongrong NiEmail author
  • Yao ZhaoEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9023)


Based on the superpixel segmentation mechanism, a novel fragile watermarking scheme for image authentication and recovery is proposed. For each superpixel region, the authentication watermark is generated by putting the pixels into a feedback-based chaotic system and embedded into the region itself. The content of each superpixel is compressed to construct the recovery watermark, which is embedded into another selected superpixel. To extract the authentication and recovery watermark properly, the superpixel boundaries are marked. The reliability of a superpixel is first determined by its authentication watermark. To improve detection accuracy, the recovery watermark extracted from authentic superpixels is utilized for precise detection. Moreover, the recovery information extracted from authentic superpixels is decompressed to recover the tampered regions. Experimental results demonstrate that the proposed method can not only resist general counterfeiting attacks, especially vector quantization (VQ) attack, but also has an excellent performance on location accuracy and self-recovery.


Superpixels Chaotic system Precise detection Authentication Self-recovery VQ attack Watermarking 



This work is supported in part by 973 Program (2011CB302204), National Natural Science Funds for Distinguished Young Scholar (61025013), National NSF of China (61332012, 61272355), PCSIRT (IRT 201206), and Open Projects Program of National Laboratory of Pattern Recognition (201306309).


  1. 1.
    Haouzia, A., Noumeir, R.: Methods for image authentication: a survey. Multimed Tools Appl. 39, 1–46 (2008)CrossRefGoogle Scholar
  2. 2.
    Wong, P.W.: A public key watermark for image verication and authentication. In: Proceedings of the IEEE International Conference on Image Processing, Chicago, IL, pp. 425–429, October 1998Google Scholar
  3. 3.
    Holliman, M., Memon, N.: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Process. 9(3), 432–441 (2000)CrossRefGoogle Scholar
  4. 4.
    Celik, M.U., Sharma, G., Saber, E., Tekalp, A.M.: Hierarchical watermarking for secure image authentication with localization. IEEE Trans. Image Process. 11(6), 585–595 (2002)CrossRefGoogle Scholar
  5. 5.
    Suthaharan, S., Kim, S.: A gradient image dependent fragile watermarking for improved security and localization. In: Proceedings of the IEEE Southeast Con, pp. 343–348 (2004)Google Scholar
  6. 6.
    Chen, W.C., Wang, M.S.: A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Syst. Appl. 36(2), 1300–1307 (2009)CrossRefGoogle Scholar
  7. 7.
    Lin, P.L., Hsieh, C.K., Huang, P.W.: A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn. 38(12), 2519–2529 (2005)CrossRefGoogle Scholar
  8. 8.
    Li, C., Wang, Y., Ma, B., Zhang, Z.: A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure. Comput. Electr. Eng. 37, 927–940 (2011)CrossRefGoogle Scholar
  9. 9.
    He, H., Chen, F., Huo, Y.: Self-embedding fragile watermarking scheme combined average with VQ encoding. In: Shi, Y.Q., Kim, H.-J., Pérez-González, F. (eds.) IWDW 2012. LNCS, vol. 7809, pp. 120–134. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  10. 10.
    Ren, X., Malik, J.: Learning a classifacation model for segmentation. In: ICCV 2003, pp. 10–17. IEEE Computer Society (2003)Google Scholar
  11. 11.
    Fulkerson, B., Vedali, A., Soatto, S.: Class segmentation and object localization with superpixel neighborhoods. In: ICCV 2009, pp. 670–677. IEEE (2009)Google Scholar
  12. 12.
    Wang, Z., Feng, J., Xi, H.: Image classification via object-aware holistic superpixel selection. IEEE Trans. Image Process. 22(11), 4341–4352 (2013)CrossRefMathSciNetGoogle Scholar
  13. 13.
    Yang, F., Lu, H., Yang, M.-H.: Robust superpixel tracking. IEEE Trans. Image Process. 23(4), 1639–1651 (2014)CrossRefMathSciNetGoogle Scholar
  14. 14.
    Levinshtein, A.S., Kutulakos, K.N., Fleet, D.J., Dickinson, S.J., Siddiqi, K.: Turbopixels: fast superpixels using geometric flows. IEEE Trans. Pattern Anal. Mach. Intell. 31(12), 2290–2297 (2009)CrossRefGoogle Scholar
  15. 15.
    Ni, R., Ruan, Q.: Neighbor-aided authentication watermarking based on a chaotic system with feedback. IEICE Trans. Inf. Syst. E91-D(8), 2196–2198 (2008)CrossRefGoogle Scholar
  16. 16.
    Braga-Neto, U., Goutsias, J.: A theoretical tour of connectivity in image processing and analysis. J. Math. Image Vis. 19(1), 5–31 (2003)CrossRefzbMATHMathSciNetGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Institute of Information Science, Beijing Key Laboratory of Advanced Information Science and Network TechnologyBeijing Jiaotong UniversityBeijingChina

Personalised recommendations