Skip to main content

Semi-fragile Watermarking Algorithm Based on Arnold Scrambling for Three-Layer Tamper Localization and Restoration

  • Conference paper
  • First Online:
  • 587 Accesses

Abstract

To protect the content integrity, authenticity and improve the effect of tamper localization and recovery, this paper designs and implements a semi-fragile watermark based on Arnold transformation, which is used to localize and recover tamper of confused image and plain-image. The sender encodes the watermark into the 2-bit least significant bit of the pixel of the original image, and the authentication watermark consists of the pixel value comparison result and the parity check code; the recovery watermark is the pixel value of the Torus image block. In the detection side, the plain-image adopts the stratified idea, carries on the three-level tamper localization and recovery, the third-party authentication institution can detect tamper of the scrambled image using the layer detection method, the receiver will detect the positioning result again. The experimental results show that the proposed algorithm can accurately locate tamper and realize the content recovery and effectively prevent the vector quantization attack. Compared with other algorithms, this algorithm has better effect of tamper localization and recovery.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Celik, M.U., et al.: Hierarchical watermarking for secure image authentication with localization. IEEE Trans. Image Process. 11(6), 585 (2002). A Publication of the IEEE Signal Processing Society

    Article  Google Scholar 

  2. Potdar, V.M., Han, S., Chang, E.: A survey of digital image watermarking techniques (2005)

    Google Scholar 

  3. Cox, I.J., Kilian, J., Leighton, F.T., et al.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673–1687 (1997). A Publication of the IEEE Signal Processing Society

    Article  Google Scholar 

  4. Walton, S.: Information authentication for a slippery new age. Dr. Dobbs J. 20(4), 18–26 (1995)

    Google Scholar 

  5. Fridrich, J., Goljan, M.: Images with self-correcting capabilities. In: Proceedings of the International Conference on Image Processing, ICIP 1999, vol. 3, pp. 792–796. IEEE (2002)

    Google Scholar 

  6. Sikder, I., Dhar, P.K., Shimamura, T.: A semi-fragile watermarking method using slant transform and LU decomposition for image authentication. In: International Conference on Electrical, Computer and Communication Engineering, pp. 881–885. IEEE (2017)

    Google Scholar 

  7. Hore, A., Ziou, D.: Image quality metrics: PSNR vs. SSIM. In: International Conference on Pattern Recognition, pp. 2366–2369. IEEE (2010)

    Google Scholar 

  8. Liu, Q., Jiang, X., et al.: A unified digital watermark algorithm based on singular value decomposition and spread spectrum technology. Acta Electron. Sin. 4, 621–624 (2005)

    Google Scholar 

  9. Arnold, V.I.: Geometrical Methods in the Theory of Ordinary Differential Equations, 2nd edn., 351 pp. Springer, New York (1988). https://doi.org/10.1007/978-1-4612-1037-5. Rota, G.C. Adv. Math. 80(2), 269 (1990)

  10. Qiu, T., Zhao, A., Xia, F., Si, W., Wu, D.O.: ROSE: robustness strategy for scale-free wireless sensor networks. IEEE/ACM Trans. Networking 25(5), 2944–2959 (2017)

    Article  Google Scholar 

  11. Qiu, T., Qiao, R., Wu, D.O.: EABS: an event-aware backpressure scheduling scheme for emergency internet of things. IEEE Trans. Mobile Comput. 17(1) (2017). https://doi.org/10.1109/TMC.2017.2702670

  12. Guo, C., Zhuang, R., Jie, Y., Ren, Y., Wu, T., Choo, K.-K.R.: Fine-grained database field search using attribute-based encryption for E-healthcare clouds. J. Med. Syst. 40(11), 235:1–235:8 (2016)

    Article  Google Scholar 

Download references

Acknowledgements

This paper is supported by the National Science Foundation of China under grant No. 61401060, 61501080, 61572095 and 61771090, the Fundamental Research Funds for the Central Universities’ under No. DUT16QY09, and the Social Science Foundation of Jiangxi Province, China No. 15JY48.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cheng Guo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Feng, B., Li, X., Jie, Y., Guo, C., Fu, H. (2018). Semi-fragile Watermarking Algorithm Based on Arnold Scrambling for Three-Layer Tamper Localization and Restoration. In: Wang, L., Qiu, T., Zhao, W. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Systems. QShine 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 234. Springer, Cham. https://doi.org/10.1007/978-3-319-78078-8_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-78078-8_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-78077-1

  • Online ISBN: 978-3-319-78078-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics