Skip to main content
Log in

Fragile image watermarking scheme based on VQ index sharing and self-embedding

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, we propose a self-embedding fragile watermarking scheme using vector quantization (VQ) and index sharing. First, the principle contents of original image are compactly represented by a series of VQ indices. Then, after permutation, the binary bits of VQ indices are extended to generate reference-bits by a random binary matrix, which can make all reference-bits share the information of VQ index bits from different regions of the whole image. The image is embedded with watermark-bits including hash-bits for tampering localization and reference-bits for content recovery, and is transmitted to receiver side. Tampered regions in the received, suspicious image can be accurately located and then be recovered by VQ index reconstruction. Experimental results demonstrate that the proposed scheme can achieve successful content recovery for larger tampering rate and obtain better visual quality of recovered results than the reported schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Bravo SS, Nandi AK (2011) Secure fragile watermarking method for image authentication with improved tampering localization and self-recovery capabilities. Signal Process 91(4):728–739

    Article  MATH  Google Scholar 

  2. Chang CC, Chen KN, Lee CF (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462–1470

    Article  Google Scholar 

  3. Chang CC, Wu WC (2007) Fast planar-oriented ripple search algorithm for hyperspace VQ codebook. IEEE Trans Image Process 16(6):1538–1547

    Article  MathSciNet  Google Scholar 

  4. Fridrich J, Goljan M (1999) Images with self-correcting capabilities. Proc IEEE Int Conf Image Process 3:792–796

    Google Scholar 

  5. He HJ, Chen F, Tai HM, Kalker T, Zhang JS (2012) Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Trans Inf Forensics Secur 7(1):185–196

    Article  Google Scholar 

  6. Huo YR, He HJ, Chen F (2012) Alterable-capacity fragile watermarking scheme with restoration capability. Opt Commun 285(7):1759–1766

    Article  Google Scholar 

  7. Korus P, Dziech A (2013) Efficient method for content reconstruction with self-embedding. IEEE Trans Image Process 22(3):1134–1147

    Article  MathSciNet  MATH  Google Scholar 

  8. Korus P, Dziech A (2014) Adaptive self-embedding scheme with controlled reconstruction performance. IEEE Trans Inf Forensics Secur 9(2):169–181

    Article  Google Scholar 

  9. Lee TY, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506

    Article  MathSciNet  MATH  Google Scholar 

  10. Li J, Li XL, Yang B, Sun XM (2015) Segmentation-based Image Copy-move Forgery Detection Scheme. IEEE Trans Inf Forensics Secur 10(3):507–518

    Article  Google Scholar 

  11. Lin PL, Hsieh CK, Huang PW (2005) A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 38(12):2519–2529

    Article  Google Scholar 

  12. Linde Y, Buzo A, Gray RM (1980) An algorithm for vector quantization design. IEEE Trans Commun 28(1):84–95

    Article  Google Scholar 

  13. Liu KC (2012) Color image watermarking for tamper proofing and pattern-based recovery. IET Image Process 6(5):445–454

    Article  MathSciNet  Google Scholar 

  14. Martino FD, Sessa S (2012) Fragile watermarking tamper detection with images compressed by fuzzy transform. Inf Sci 195(13):62–90

    Article  Google Scholar 

  15. Nasrabadi NM, King R (1988) Image coding using vector quantization: a review. IEEE Trans Commun 36(8):957–971

    Article  Google Scholar 

  16. Qian ZX, Feng GR, Zhang XP (2011) Image self-embedding with high-quality restoration capability. Digital Signal Process 21(2):278–286

    Article  Google Scholar 

  17. Qin C, Chang CC, Chen PY (2012) Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process 92(4):1137–1150

    Article  Google Scholar 

  18. Qin C, Chang CC, Chen KN (2013) Adaptive self-recovery for tampered images based on VQ indexing and inpainting. Signal Process 93(4):933–946

    Article  Google Scholar 

  19. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  20. Wang FH, Jain LC, Pan JS (2007) VQ-based watermarking scheme with genetic codebook partition. J Netw Comput Appl 30(1):4–23

    Article  Google Scholar 

  21. Wu CC, Kao SJ, Hwang MS (2011) A high quality image sharing with steganography and adaptive authentication scheme. J Syst Softw 84(12):2196–2207

    Article  Google Scholar 

  22. Yang SS, Qin C, Qian ZX, Xu BQ (2014) Tampering detection and content recovery for digital images using halftone mechanism. In: Proceedings of the 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Kitakyushu, Japan, pp. 130–133

  23. Yang CW, Shen JJ (2010) Recover the tampered image based on VQ indexing. Signal Process 90(1):331–343

    Article  MATH  Google Scholar 

  24. Zhang XP, Wang SZ, Qian ZX, Feng GR (2011) Reference sharing mechanism for watermark self-embedding. IEEE Trans Image Process 20(2):485–495

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (61303203, 61232016, U1405254), the Natural Science Foundation of Shanghai, China (13ZR1428400), the Innovation Program of Shanghai Municipal Education Commission (14YZ087), Shanghai Engineering Center Project of Massive Internet of Things Technology for Smart Home (GCZX14014), Research Base Special Project of Hujiang Foundation (C14001), Hujiang Foundation of China (C14002), the PAPD Fund, and the Open Project Program of Shenzhen Key Laboratory of Media Security.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chin-Chen Chang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Qin, C., Ji, P., Wang, J. et al. Fragile image watermarking scheme based on VQ index sharing and self-embedding. Multimed Tools Appl 76, 2267–2287 (2017). https://doi.org/10.1007/s11042-015-3218-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-3218-9

Keywords

Navigation