Skip to main content
Log in

A Novel Semi-fragile Digital Watermarking Scheme for Scrambled Image Authentication and Restoration

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

More than ever, the practical and accurate watermarking technologies are called for the growing amount of exchanged digital image over the Internet. To protect the integrity and authenticity of digital image and to enhance the effect of tamper detection and restoration, we design and implement a semi-fragile watermark based on cat transformation, mostly used to locate tamper and recover for the transformed image and plain-image. The watermark which consists of two parts: the authentication watermark and recovery watermark, is embedded into the 2 least significant bit (LSB) of the pixel of the original image. The authentication watermark is calculated by the pixel value comparison and the parity check code, while the recovery watermark contains the average pixel value of the Torus image block. In the detection side, we use the hierarchy concept to locate the tamper in three layers and recover the attacked image in two layers. By using the hierarchy concept, this algorithm has another superiority that tamper can be detected on confused image. The experimental results show that our algorithm can accurately locate tamper and realize the content recovery and effectively prevent the vector quantization attack. Compared with other algorithms, this algorithm has better effect of tamper location and recovery.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687

    Article  Google Scholar 

  2. Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan Kaufmann, Burlington

    Google Scholar 

  3. Song C, Sudirman S, Merabti M (2012) A robust region-adaptive dual image watermarking technique. J Vis Commun Image Represent 23(3):549–568

    Article  Google Scholar 

  4. Barni M, Bartolini F (2004) Watermarking systems engineering: enabling digital assets security and other applications. Marcel Dekker, New York

    Google Scholar 

  5. Min W, Bede L (2003) Data hiding in image and video I Fundamental issues and solutions. IEEE Trans Image Process 12(6):685–695

    Article  Google Scholar 

  6. Watson AB (1993) DCT Quantization matrices visually optimized for individual images. Proc SPIE Human Vis Vis Process Digit Display 9:202–216

    Google Scholar 

  7. Mohan BC, Kumar SS (2008) Robust digital watermarking scheme using contourlet transform. Int J Comput Sci Netw Security 8(2):43–51

    Google Scholar 

  8. Giakoumaki A, Pavlopoulos S, Koutouris D (2003) A medical image watermarking scheme based on wavelet transform. In: Proc 25th Annu Int Conf IEEE Eng Med Biol Soc, pp 856–859

  9. Sadreazami H, Ahmad MO, Swamy MNS (2014) A study of multiplicative watermark detection in the contourlet domain using alpha-stable distributions. IEEE Trans Image Process 23(10):4348–4360

    Article  MathSciNet  Google Scholar 

  10. Karybali IG, Berberidis K (2006) Efficient spatial image watermarking via new perceptual masking and blind detection schemes. IEEE Trans Inf Forensics Security 1(2):256–274

    Article  Google Scholar 

  11. Zeki AM, Manaf AA (2011) ISB Watermarking embedding: block based model. Inf Technol J 10(4):841–848

    Article  Google Scholar 

  12. Emami MS, Sulong GB, Seliman SB (2012) An approximation approach for digital image owner identification using histogram intersection technique. Int J Innov Comput Inf Control 8(7):4605–4620

    Google Scholar 

  13. Wang Y, Pearmain A (2004) Blind image data hiding based on self reference. Pattern Recogn Lett 25 (15):1681–1689

    Article  Google Scholar 

  14. Bhatnagar G, Wu QMJ, Raman B (2012) A new robust adjustable logo watermarking scheme. Comput Secur 31(1):40–58

    Article  Google Scholar 

  15. Patra JC, Phua JE, Bornand C (2010) A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digit Signal Process 20(6):1597–1611

    Article  Google Scholar 

  16. Su Q, Niu Y, Zou H, Liu X (2013) A blind dual color images watermarking based on singular value decomposition. Appl Math Comput 219(16):8455–8466

    MathSciNet  MATH  Google Scholar 

  17. Su Q, Niu Y, Wang G, Jia S, Yue J (2014) Color image blind watermarking scheme based on QR decomposition. Signal Process 94:219–235

    Article  Google Scholar 

  18. Zhu X, Ding J, Dong H, Hu K, Zhang X (2014) Normalized correlation-based quantization modulation for robust watermarking. IEEE Trans Multimedia 16(7):1888–1904

    Article  Google Scholar 

  19. Horng S-J, Rosiyadi D, Li T, Takao T, Guo M, Khan MK (2013) A blind image copyright protection scheme for e-government. J Vis Commun Image Represent 24(7):1099–1105

    Article  Google Scholar 

  20. Shen J-J, Hsu P-W (2007) A robust associative watermarking technique based on similarity diagrams. Pattern Recognit 40(4):1355–1367

    Article  Google Scholar 

  21. Andalibi M, Chandler DM (2015) Digital image watermarking via adaptive logo texturization. IEEE Trans Image Processs 24(12):5060–5073

    Article  Google Scholar 

  22. Barni M, Bartolini F, Piva A (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10(5):783–791

    Article  Google Scholar 

  23. Chang CS, Shen JJ (2017) Features classification forest: a novel development that is adaptable to robust blind watermarking techniques[J]. IEEE Transactions on Image Processing A Publication of the IEEE Signal Processing Society PP(99):1–1

    MATH  Google Scholar 

  24. Urvoy M, Goudia D, Autrusseau F (2014) Perceptual DFT watermarking with improved detection and robustness to geometrical distortions[J]. IEEE Trans Inf Forensics Secur 9(7):1108– 1119

    Article  Google Scholar 

  25. Voloshynovskiy S, Pereira S, Pun T, Eggers JJ, Su JK (2001) Attacks on digital watermarks: classification, estimation based attacks, and benchmarks. IEEE Commun Mag 39(8):118–126

    Article  Google Scholar 

  26. Blum L, Blum M, Shub M (1986) A Simple unpredictable pseudorandom number generator. SIAM J Comput 15(2):364–383

    Article  MathSciNet  Google Scholar 

  27. Celik MU (2002) Hierarchical watermarking for secure image authentication with localization [J]. IEEE Trans Image Process. 11(6):585–595

    Article  Google Scholar 

  28. Wong PW, Memon N (2002) Secret and public key authentication schemes that resist vector quantization attack[A]. In: Proc of SPIE security and watermarking of multimedia[C]. San Jose, USA, pp 1593–1601

  29. Hore A, Ziou D (2010) Image quality PSNR vs. SSIM[c]. In: International conference on pattern recognition, IEEE, 2366– 2369

  30. Huang DZ, Chen ZG, Zhu CX (2008) Image spatial domain watermark algorithm based on general Arnold mapping and neural network[J]. Appl Res Comput 25(4):1144–1146

    Google Scholar 

  31. Shao L, Qin Z, Xingchen H (2007) Algorithm of spatial domain image watermark based on scrambling transformation of image[J]. Comput Eng 33(2):122–124

    Google Scholar 

  32. Celik MU, et al. (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Transactions on Image Processing A Publication of the IEEE Signal Processing Society 11(6):585

    Article  Google Scholar 

  33. Cox IJ, Kilian J, Leighton FT, et al. (1997) Secure spread spectrum watermarking for multimedia[J]. IEEE Transactions on Image Processing A Publication of the IEEE Signal Processing Society 6(12):1673–1687

    Article  Google Scholar 

  34. Rota GC (1990) Geometrical methods in the theory of ordinary differential equations : V. I. Arnold, 2nd ed. Springer, 1988, 351 pp[J]. Adv Mater 80(2):269–269

    Google Scholar 

  35. Qiu T, Zhao A, Xia F, Si W, Wu. DO (2017) ROSE: Robustness strategy for scale-free wireless sensor networks. IEEE/ACM Trans Netw 25(5):2944–2959

    Article  Google Scholar 

  36. Qiu T, Qiao R, Han M, Sangaiah AK, Lee I (2017) A lifetime-enhanced data collecting scheme for internet of things. IEEE Commun Mag 55(11):132–137

    Article  Google Scholar 

  37. Qiu T, Zheng K, Han M, Philip Chen CL, Xu M (2017) A data-emergency-aware scheduling scheme for internet of things in smart cities. IEEE Transactions on Industrial Informatics. https://doi.org/10.1109/TII.2017.2763971

    Article  Google Scholar 

  38. Guo C, Chen X, Jie YM, et al. (2017) Dynamic multi-phrase ranked search over encrypted data with symmetric searchable encryption. IEEE Transactions on Services Computing, published online. https://doi.org/10.1109/TSC.2017.2768045

  39. Guo C, Luo NQ, Alam Bhuiyan MZ, et al. (2017) Key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage. Future Generation Computer Systems, published online. https://doi.org/10.1016/j.future.2017.07.038

    Article  Google Scholar 

  40. Guo C, Zhuang RH, Jie YM, et al. (2016) Fine-grained database field search using attribute-based encryption for E-Healthcare clouds. J Med Syst 40(11):235;1–235:8

    Article  Google Scholar 

Download references

Acknowledgements

This paper is supported by the National Science Foundation of China under grant No.61401060, 61501080, 61572095 and 61771090, the Fundamental Research Funds for the Central Universities’ under No. DUT16QY09, and the Social Science Foundation of Jiangxi Province, China No.15JY48.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cheng Guo.

Additional information

A preliminary version of this paper appeared in Q-Shine 2017, 2017, December. This version includes a more detailed scheme and a concrete discussion, which was not included before.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Feng, B., Li, X., Jie, Y. et al. A Novel Semi-fragile Digital Watermarking Scheme for Scrambled Image Authentication and Restoration. Mobile Netw Appl 25, 82–94 (2020). https://doi.org/10.1007/s11036-018-1186-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-018-1186-9

Keywords

Navigation