Abstract
This paper proposes a divide-and-conquer fragile self-embedding watermarking with adaptive payload for digital images. A graph-based visual saliency (GBVS) model is adopted to automatically classify image blocks into region of interest (ROI) and background (ROB). The divide-and-conquer mechanisms aim to protect the ROI blocks with higher priority, which is embodied in two procedures: backup information collection and payload allocation. We collect the ROI backup information without compression, and allocate payload in a water-filling order to preferentially maintain the visual quality of ROI. The collected backup information are encoded as reference bits through a measurement process, in which a flexible scaling factor adaptively modulates the size of payload. Auxiliary information, which records the ROI locations, is embedded into the host images together with the reference bits. Hash-based authentication bits are responsible for detecting tampered blocks. A legitimate recipient can sequentially restore the auxiliary information and the original image content as long as the tampering is not too severe. The qualitative and quantitative results demonstrate the effectiveness and the superiority of the proposed methods compared with the previous works.
Similar content being viewed by others
Notes
The thirty-one selected BOWS2 images were ‘326’, ‘425’, ‘428’, ‘1151’, ‘1754’, ‘1806’, ‘1861’, ‘2169’, ‘2354’, ‘3442’, ‘3477’, ‘3533’, ‘3570’, ‘3608’, ‘4550’, ‘4552’, ‘4871’, ‘5984’, ‘6081’, ‘6413’, ‘6687’, ‘7318’, ‘7818’, ‘8074’, ‘8171’, ‘8293’, ‘8445’, ‘8944’, ‘9310’, ‘9461’, and ‘9604’.
References
Bravo-Solorio S, Calderon F, Li CT, Nandi AK (2018) Fast fragile watermark embedding and iterative mechanism with high self-restoration performance. Digital Signal Process 73:83–92
Cao F, An BW, Wang JW, Ye DP, Wang HL (2017) Hierarchical recovery for tampered images based on watermark self-embedding. Displays 46:52–60
Chang CC, Fan YH, Tai WL (2008) Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 41(2):654–661
Chen F, He H J, Huo Y R, Wang H X (2011) Self-recovery fragile watermarking scheme with variable watermark payload, 10th International Workshop on Digital-forensics and Watermarking, IWDW’11, pp 142–155
Chen F, He HJ, Tai HM, Wang HX (2014) Chaos-based self-embedding fragile watermarking with flexible watermark payload. Multimed Tools Appl 72(1):41–56
Fridrich J, Goljan M (1999) Images with self-correcting capabilities, In: Proceedings of 6th International Conference on Image Processing, ICIP’99, pp 792–796
Haghighi BB, Taherinia AH, Harati A (2018) TRLH: Fragile And blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique. J Vis Commun Image Represent 50:49–64
He HJ, Zhang JS, Chen F (2009) Adjacent-block based statistical detection method for self-embedding watermarking techniques. Signal Process 89(8):1557–1566
He HJ, Zhang JS, Tai HM (2009) Self-recovery fragile watermarking using block-neighborhood tampering characterization, 11th International Workshop on Information Hidding, IH’09, pp 132–145
Holliman M, Memon N (2000) Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans Image Process 9(3):432–441
Hu YC, Choo KKR, Chen WL (2017) Tamper detection and image recovery for BTC-compressed images. Multimed Tools Appl 76(14):1–29
Hua G, Huang JW, Shi YQ, Goh J, Thing VLL (2016) Twenty years of digital audio watermarking - a comprehensive review. Signal Process 128:222–242
Korus P, Dziech A (2013) Efficient method for content reconstrucation with self-embedding. IEEE Trans Image Process 22(3):1134–1147
Korus P, Dziech A (2014) Adaptive self-embedding scheme with controlled reconstruction performance. IEEE Trans Inf Forensic Secur 9(2):169–181
Kumar C, Singh A, Kumar P (2018) A recent survey on image watermarking techniques and its application in e-governance. Multimed Tools Appl 77(3):3597–3622
Lee T Y, Lin S D (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506
Lin PL, Hsieh CK, Huang PW (2005) A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 38(12):2519–2529
Luis RR, Manuel CH, Mariko NM, Hector PM, Brian K (2013) Watermarking-based image authentication with recovery capability using halftoning technique. Signal Process-Image Commun 28(1):69–83
Niu DM, Wang HX, Cheng MQ, Shi CH (2018) Reference sharing mechanism-based self-embedding watermarking scheme with deterministic content reconstruction. Secur Commun Netw 2516324:12
Otsu N (1979) A threshold selection method from gray-level histograms. IEEE Trans Syst Man Cybern 9(1):62–66
Qian ZX, Feng GR (2010) Inpainting assisted self recovery with decreased embedding data. IEEE Signal Process Lett 17(10):929–932
Qian ZX, Feng GR, Zhang XP, Wang SZ (2011) Image self-embedding with high-quality restoration capability. Digit Signal Process 21(2):278–286
Qin C, Chang CC, Chen PY (2012) Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process 92(4):1137–1150
Qin C, Chang CC, Chen KN (2013) Adaptive self-recovery for tampered images based on VQ indexing and inpainting. Signal Process 93(4):933–946
Qin C, Ji P, Wang JW, Chang CC (2016) Fragile image watermarking scheme based on VQ index sharing and self-embedding. Multimed Tools Appl 76(2):2267–2287
Qin C, Wang HL, Zhang XP, Sun XM (2016) Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode. Inf Sci 373:233–250
Qin C, Ji P, Zhang XP, Dong J, Wang JW (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138(C):280–293
Run RS, Horng SJ, Lin WH, Kao TW, Fan PZ, KHan MK (2011) An efficient wavelet-tree-based watermarking method. Expert Syst Appl 38 (12):14357–14366
Sadek MM, Khalifa AS, Mostafa MGM (2015) Video steganography: a compreshensive review. Multimed Tools Appl 74(17):7063–7094
Sarreshtedari S, Akhaee MA (2015) A source-channel coding approach to digital image protection and self-recovery. IEEE Trans Image Process 24(7):2266–2277
Schölkopf B, Platt J, Hofmann T (2006) Graph-based visual saliency. Adv Neural Inf Process Syst 19:545–552
Tian LH, Zheng NN, Xue JR, Li C (2015) Authentication and copyright protection watermarking scheme for h.264 based on visual saliency and secret sharing. Multimed Tools Appl 74(9):2991–3011
The USC-SIPI image database, [Online]. Available: http://sipi.usc.edu/database/
The Dataset from the 2nd Bows Content, [Online]. Available: http://bows2.ec-lille.fr/
Tong X J, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process-Image Commun 28(3):301–308
Wang SS, Tsai SL (2008) Automatic image authentication and recovery using fractal code embedding and image inpainting. Pattern Recogn 41(2):701–712
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13 (4):600–612
Yang CW, Shen JJ (2010) Recover the tampered image based on VQ indexing. Signal Process 90(1):331–343
Zhang XP, Wang SZ (2007) Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process Lett 14(10):727–730
Zhang XP, Wang SZ (2008) Fragile watermarking with error-free restoration capability. IEEE Trans Multimed 10(8):1490–1499
Zhang XP, Qian ZX, Ren YL, Feng GR (2011) Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans Inf Forensic Secur 6(4):1223–1232
Zhang XP, Wang SZ, Qian ZX, Feng GR (2011) Reference sharing mechanism for watermark self-embedding. IEEE Trans Image Process 20(2):485–495
Zhang XP, Wang SZ, Qian ZX, Feng G R (2011) Self-embedding watermark with flexible restoration quality. Multimed Tools Appl 54(2):385–395
Zhang XP, Xiao YY, Zhao ZM (2015) Self-embedding fragile watermarking based on DCT and fast fractal coding. Multimed Tools Appl 74(15):5767–5786
Acknowledgements
This work was supported in part by the National Natural Science Foundation of China (61806171), the Natural Science Foundation of Shanghai (18ZR1400300), the Program for the Fundamental Research of the Shanghai Committee of Science and Technology (15JC1400600), and the Fundamental Research Funds of the Central Universities (16D110412,17D110408).
Author information
Authors and Affiliations
Corresponding authors
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Huang, R., Liu, H., Liao, X. et al. A divide-and-conquer fragile self-embedding watermarking with adaptive payload. Multimed Tools Appl 78, 26701–26727 (2019). https://doi.org/10.1007/s11042-019-07802-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-07802-y