Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

A novel pixel-wise authentication-based self-embedding fragile watermarking method

Published: 01 June 2021 Publication History

Abstract

Self-embedding fragile watermarking algorithms can perform detection of the manipulated areas as well as recovery of these detected areas. Most of the self-embedding fragile watermarking algorithms are performed block-wise authentication approach. However, entire block is marked as tampered in case one of the pixels in the block is detected as manipulated. This situation decreases the accuracy rate of the authentication process especially against pixel-based attacks such as salt and paper noise adding. Therefore, we present a novel pixel-wise authentication-based self-embedding fragile watermarking method for manipulation detection and recovery. In this proposed method, reference image is divided into four main blocks. Then, each main block is subdivided into 2×4 or 4×2 sized blocks according to block type determined using recovery quality. Recovery bits of each main block generated from sub-blocks are spreaded into the two main blocks in the other half of the image. For each pixel, two authentication bits are generated using the six most significant bits of the pixel with two pixel position bits and then embedded into the first and second least significant bits of the pixel. In experimental results, pixel-based attacks are applied to the images to demonstrate the success of the presented method. Also, performance of the presented method has been evaluated by applying different size of cropping attacks to the watermarked images. Experimental results show that the proposed method satisfactory detect and recover the manipulated areas.

References

[1]
Ansari IA, Pant M, and Ahn CW Svd based fragile watermarking scheme for tamper localization and self-recovery Int. J. Mach. Learn. Cybernet. 2016 7 6 1225-1239
[2]
Bravo-Solorio S, Calderon F, Li CT, and Nandi AK Fast fragile watermark embedding and iterative mechanism with high self-restoration performance Digital Sig. Process. 2018 73 83-92
[3]
Cao F, An B, Wang J, Ye D, and Wang H Hierarchical recovery for tampered images based on watermark self-embedding Displays 2017 46 52-60
[4]
Chen, W.C., Wang, M.S.: A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Systems with Applications 36(2, Part 1):1300 – 1307 (2009)
[5]
Chuang JC and Hu YC An adaptive image authentication scheme for vector quantization compressed image J. Vis. Commun. Image Represent. 2011 22 5 440-449
[6]
Chun-Shien L and Liao HM Structural digital signature for image authentication: an incidental distortion resistant scheme IEEE Trans. Multimedia 2003 5 2 161-173
[7]
Gul E and Ozturk S A novel hash function based fragile watermarking method for image integrity Multimedia Tools Appl. 2019 78 13 17701-17718
[8]
Huang R, Liu H, Liao X, and Sun S A divide-and-conquer fragile self-embedding watermarking with adaptive payload Multimedia Tools Appl. 2019 78 18 26701-26727
[9]
Kim C, Shin D, and Yang CN Self-embedding fragile watermarking scheme to restoration of a tampered image using ambtc Personal Ubiquitous Comput. 2018 22 1 11-22
[10]
Lee CF, Shen JJ, Chen ZR, and Agrawal S Self-embedding authentication watermarking with effective tampered location detection and high-quality image recovery Sensors 2019 19 10 2267
[11]
Lee TY and Lin SD Dual watermark for image tamper detection and recovery Pattern Recognit. 2008 41 11 3497-3506
[12]
Lin P, Lee J, and Chang C Dual digital watermarking for internet media based on hybrid strategies IEEE Trans. Circuits Syst. Video Technol. 2009 19 8 1169-1177
[13]
Lin PL, Hsieh CK, and Huang PW A hierarchical digital watermarking method for image tamper detection and recovery Pattern Recognit. 2005 38 12 2519-2529
[14]
Martino FD and Sessa S Fragile watermarking tamper detection with images compressed by fuzzy transform Inform. Sci. 2012 195 62-90
[15]
Puhan NB and Ho AT Secure authentication watermarking for localization against the holliman-memon attack Multimedia Syst. 2007 12 6 521-532
[16]
Qian Z, Feng G, Zhang X, and Wang S Image self-embedding with high-quality restoration capability Digital Signal Process. 2011 21 2 278-286
[17]
Qin C, Ji P, Zhang X, Dong J, and Wang J Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy Signal Process. 2017 138 280-293
[18]
Rajkumar R and Vasuki A Reversible and robust image watermarking based on histogram shifting Cluster Comput. 2019 22 5 12313-12323
[19]
Rayachoti, E., Tirumalasetty, S., Prathipati, S.C.: Slt based watermarking system for secure telemedicine. Cluster Computing pp 1–10 (2020)
[20]
Rhayma H, Makhloufi A, Hamam H, and Hamida AB Semi-fragile self-recovery watermarking scheme based on data representation through combination Multimedia Tools Appl. 2019 78 10 14067-14089
[21]
Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, and Hou G Secure and robust fragile watermarking scheme for medical images IEEE Access 2018 6 10269-10278
[22]
Singh D and Singh SK Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability J. Vis. Commun. Image Represent. 2016 38 775-789
[23]
Singh P and Agarwal S An efficient fragile watermarking scheme with multilevel tamper detection and recovery based on dynamic domain selection Multimedia Tools Appl. 2016 75 14 8165-8194
[24]
Sreenivas K and Kamakshiprasad V Improved image tamper localisation using chaotic maps and self-recovery J Vis Commun. Image Represent. 2017 49 164-176
[25]
Tai WL and Liao ZJ Image self-recovery with watermark self-embedding Signal Process. 2018 65 11-25
[26]
Thanh TM and Iwakiri M Fragile watermarking with permutation code for content-leakage in digital rights management system Multimedia Syst. 2016 22 5 603-615
[27]
Tsai P, Hu YC, and Chang CC Novel image authentication scheme based on quadtree segmentation Imaging Sci. J. 2005 53 3 149-162
[28]
Wang Z Image quality assessment: from error visibility to structural similarity IEEE Trans. Image Process. 2004 13 4 600-612
[29]
Xie X, Wang C, and Li M A fragile watermark scheme for image recovery based on singular value decomposition, edge detection and median filter Appl. Sci. 2019 9 15 3020
[30]
Yan, C., Gong, B., Wei, Y., Gao, Y.: Deep multi-view enhancement hashing for image retrieval. IEEE Transactions on Pattern Analysis and Machine Intelligence (2020a)
[31]
Yan, C., Li, Z., Zhang, Y., Liu, Y., Ji, X., Zhang, Y.: Depth image denoising using nuclear norm and learning graph model. arXiv preprint (2020b) arXiv:200803741
[32]
Yan, C., Shao, B., Zhao, H., Ning, R., Zhang, Y., Xu, F.: 3d room layout estimation from a single rgb image. IEEE Transactions on Multimedia (2020c)
[33]
Yang, S., Qin, C., Qian, Z., Xu, B.: Tampering detection and content recovery for digital images using halftone mechanism. In: 2014 tenth International conference on intelligent information hiding and multimedia signal processing, pp 130–133 (2014)
[34]
Zhang X and Wang S Statistical fragile watermarking capable of locating individual tampered pixels IEEE Signal Process. Lett. 2007 14 10 727-730

Cited By

View all
  • (2024)C3MWJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2023.10179535:9Online publication date: 1-Feb-2024
  • (2023)A secure pixel level self-recovery scheme for digital imagesJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-22124544:3(4481-4493)Online publication date: 1-Jan-2023
  • (2023)Tampering localization and self-recovery using block labeling and adaptive significanceExpert Systems with Applications: An International Journal10.1016/j.eswa.2023.120228226:COnline publication date: 15-Sep-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Multimedia Systems
Multimedia Systems  Volume 27, Issue 3
Jun 2021
269 pages

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 01 June 2021
Accepted: 04 January 2021
Received: 30 May 2020

Author Tags

  1. Self-recovery
  2. Self-embedding
  3. Tamper detection
  4. Pixel-wise

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)C3MWJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2023.10179535:9Online publication date: 1-Feb-2024
  • (2023)A secure pixel level self-recovery scheme for digital imagesJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-22124544:3(4481-4493)Online publication date: 1-Jan-2023
  • (2023)Tampering localization and self-recovery using block labeling and adaptive significanceExpert Systems with Applications: An International Journal10.1016/j.eswa.2023.120228226:COnline publication date: 15-Sep-2023
  • (2023)Contourlet and discrete cosine transform based quality guaranteed robust image watermarking method using artificial bee colony algorithmExpert Systems with Applications: An International Journal10.1016/j.eswa.2022.118730212:COnline publication date: 1-Feb-2023

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media