Skip to main content

Advertisement

Log in

Reversible Fragile Watermarking for Multichannel Images with High Redundancy Channels

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The paper presents a methodology to protect the integrity of multichannel images, having some highly redundant channels, by means of a reversible fragile watermarking algorithm. The watermark embedding phase uses a lossless compression method to compress the high redundancy channels, stores the compressed stream into their most significant bits, then embeds a secret fragile watermark by modifying the least significant bits of the high redundancy channels. In case the watermarked image is not modified, the host image can be perfectly reconstructed; otherwise, the modified area can be detected and located with very high probability and the area that has not been forged can be restored as in the original host image. The embedding of the watermark is performed by a Genetic Algorithm in the Karhunen-Loève Transform (KLT) domain: the use of a secret space defined by the KLT guarantees both security of the method and a high sensitivity in the detection of the forged areas.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Notes

  1. For simplicity of the discussion we assume that both H and W are multiples of n.

  2. The computational complexity of this step depends on the complexity of the SHA-3 algorithm.

  3. We designed an experimental setting in which we test how many times the verifier misses a tampered subimage when a single pixel of that subimage is changed by just 1 or 2 grey levels. This is actually the smallest tampering an attacker can perform: any other attack, such as filtering, blurring, noise addition, copy-and-paste, cropping, etc., would modify more pixels and, very likely, of more than just 1 grey level.

References

  1. Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147–1156

    Article  MathSciNet  Google Scholar 

  2. Aslantas V, Ozer S, Ozturk S (2009) Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms. Opt Commun 282(14):2806–2817

    Article  Google Scholar 

  3. Bandyopadhyay P, Das S, Chaudhuri A, Banerjee M (2012) A new invisible color image watermarking framework through Alpha Channel. International conference on advance in engineering, science and management p 302–308

  4. Botta M, Cavagnino D, Pomponiu V (2014) Protecting the content integrity of digital imagery with Fidelity preservation: an improved version. ACM trans multimedia Comput Commun Appl 10(3):29:1–29:5

    Article  Google Scholar 

  5. Botta M, Cavagnino D, Pomponiu V (2016) A modular framework for color image watermarking. Signal Process 119:102–114

    Article  Google Scholar 

  6. Chaumont M, Puech W (2009) A High Capacity Reversible Watermarking Scheme Proceedings of SPIE 7257

  7. Dworkin MJ (2015) SHA-3 standard: permutation-based hash and extendable-output functions. NIST FIPS – 202

  8. Goldberg DE (1989) Genetic algorithms in search, Optimization and Machine Learning. Addison-Wesley Longman Publishing Co.

  9. Gonzalez RC, Wintz P (1987) Digital image processing 2nd ed. Addison-Wesley Publishing Company

  10. Hassanien A-E, Abraham A, Kacprzyk J, Peters JF (2008) Computational intelligence in multimedia processing: foundation and trends. Studies in Computational Intelligence 96:3–49

    Google Scholar 

  11. Kim KS, Lee MJ, Lee HY, Lee HK (2009) Reversible data hiding exploiting spatial correlation between sub-sampled images. Pattern Recogn 42(11):3083–3096

    Article  Google Scholar 

  12. Lee C-H, Tsai W-H (2012) A secret-sharing-based method for authentication of Grayscale document images via the use of the PNG image with a data repair capability. IEEE Trans Image Process 21(1):207–218

    Article  MathSciNet  Google Scholar 

  13. Lee C-H, Tsai W-H (2013) A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding. Signal Process 93(7):2010–2025

    Article  Google Scholar 

  14. Lin P-Y, Lee J-S, Chang C-C (2011) Protecting the content integrity of digital imagery with Fidelity preservation. ACM trans multimedia Comput Commun Appl 7(3):15:1–15:20

    Article  Google Scholar 

  15. Lin C-C, Tai W-L, Chang C-C (2008) Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recogn 41(12):3582–3591

    Article  Google Scholar 

  16. Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Transactions on Information Forensics and Security 5(1):16–21

    Google Scholar 

  17. Naskar R, Chakraborty RS (2013) A generalized tamper localization approach for reversible watermarking algorithms. ACM trans multimedia Comput Commun Appl 9(3):19:1–19:22

    Article  Google Scholar 

  18. Oktavia V, Lee W-H (2004) A fragile watermarking technique for image authentication using singular value decomposition. Advances in Multimedia Information Processing LNCS 3332:42–49

    Google Scholar 

  19. Qian Z, Feng G, Zhang X, Wang S (2011) Image self-embedding with high-quality restoration capability. Digital Signal Process 21(2):278–286

    Article  Google Scholar 

  20. Singh D, Singh SK (2017) DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimed Tools Appl 76(1):953–977

    Article  Google Scholar 

  21. Telegram.org Available online: https://telegram.org/blog/stickers-meet-art-and-history (accessed on September 2018)

  22. Telegram.org Available online: https://telegram.org/blog/moar-stickers (accessed on September 2018)

  23. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology 13(8):890–896

    Article  Google Scholar 

  24. Wang R-Z, Lin C-F, Lin J-C (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn 34(3):671–683

    Article  Google Scholar 

  25. Zhang X, Qian Z, Ren Y, Feng G (2011) Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans Inf Forensics Secur 6(4):1223–1232

    Article  Google Scholar 

  26. Zhang X, Wang S, Qian Z, Feng G (2011) Self-embedding watermark with flexible restoration quality. Multimed Tools Appl 54(2):385–395

    Article  Google Scholar 

  27. Zhang X, Wang S, Qian Z, Feng G (2011) Reference sharing mechanism for watermark self-embedding. IEEE Trans Image Process 20(2):485–495

    Article  MathSciNet  Google Scholar 

  28. Zhang XP, Xiao YY, Zhao ZM (2015) Self-embedding fragile watermarking based on DCT and fast fractal coding. Multimed Tools Appl 74(15):5767–5786

    Article  Google Scholar 

Download references

Acknowledgements

We would like to thank Dr. Roberto Esposito who helped in revising the manuscript according to the reviewers’ comments and making new experiments, pointing out and resolving issues in the first submission.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marco Botta.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Botta, M., Cavagnino, D. & Pomponiu, V. Reversible Fragile Watermarking for Multichannel Images with High Redundancy Channels. Multimed Tools Appl 79, 26427–26445 (2020). https://doi.org/10.1007/s11042-020-08986-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08986-4

Keywords

Navigation