Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

A divide-and-conquer fragile self-embedding watermarking with adaptive payload

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper proposes a divide-and-conquer fragile self-embedding watermarking with adaptive payload for digital images. A graph-based visual saliency (GBVS) model is adopted to automatically classify image blocks into region of interest (ROI) and background (ROB). The divide-and-conquer mechanisms aim to protect the ROI blocks with higher priority, which is embodied in two procedures: backup information collection and payload allocation. We collect the ROI backup information without compression, and allocate payload in a water-filling order to preferentially maintain the visual quality of ROI. The collected backup information are encoded as reference bits through a measurement process, in which a flexible scaling factor adaptively modulates the size of payload. Auxiliary information, which records the ROI locations, is embedded into the host images together with the reference bits. Hash-based authentication bits are responsible for detecting tampered blocks. A legitimate recipient can sequentially restore the auxiliary information and the original image content as long as the tampering is not too severe. The qualitative and quantitative results demonstrate the effectiveness and the superiority of the proposed methods compared with the previous works.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Notes

  1. The thirty-one selected BOWS2 images were ‘326’, ‘425’, ‘428’, ‘1151’, ‘1754’, ‘1806’, ‘1861’, ‘2169’, ‘2354’, ‘3442’, ‘3477’, ‘3533’, ‘3570’, ‘3608’, ‘4550’, ‘4552’, ‘4871’, ‘5984’, ‘6081’, ‘6413’, ‘6687’, ‘7318’, ‘7818’, ‘8074’, ‘8171’, ‘8293’, ‘8445’, ‘8944’, ‘9310’, ‘9461’, and ‘9604’.

References

  1. Bravo-Solorio S, Calderon F, Li CT, Nandi AK (2018) Fast fragile watermark embedding and iterative mechanism with high self-restoration performance. Digital Signal Process 73:83–92

    Article  MathSciNet  Google Scholar 

  2. Cao F, An BW, Wang JW, Ye DP, Wang HL (2017) Hierarchical recovery for tampered images based on watermark self-embedding. Displays 46:52–60

    Article  Google Scholar 

  3. Chang CC, Fan YH, Tai WL (2008) Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 41(2):654–661

    Article  MATH  Google Scholar 

  4. Chen F, He H J, Huo Y R, Wang H X (2011) Self-recovery fragile watermarking scheme with variable watermark payload, 10th International Workshop on Digital-forensics and Watermarking, IWDW’11, pp 142–155

  5. Chen F, He HJ, Tai HM, Wang HX (2014) Chaos-based self-embedding fragile watermarking with flexible watermark payload. Multimed Tools Appl 72(1):41–56

    Article  Google Scholar 

  6. Fridrich J, Goljan M (1999) Images with self-correcting capabilities, In: Proceedings of 6th International Conference on Image Processing, ICIP’99, pp 792–796

  7. Haghighi BB, Taherinia AH, Harati A (2018) TRLH: Fragile And blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique. J Vis Commun Image Represent 50:49–64

    Article  Google Scholar 

  8. He HJ, Zhang JS, Chen F (2009) Adjacent-block based statistical detection method for self-embedding watermarking techniques. Signal Process 89(8):1557–1566

    Article  MATH  Google Scholar 

  9. He HJ, Zhang JS, Tai HM (2009) Self-recovery fragile watermarking using block-neighborhood tampering characterization, 11th International Workshop on Information Hidding, IH’09, pp 132–145

  10. Holliman M, Memon N (2000) Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans Image Process 9(3):432–441

    Article  Google Scholar 

  11. Hu YC, Choo KKR, Chen WL (2017) Tamper detection and image recovery for BTC-compressed images. Multimed Tools Appl 76(14):1–29

    Article  Google Scholar 

  12. Hua G, Huang JW, Shi YQ, Goh J, Thing VLL (2016) Twenty years of digital audio watermarking - a comprehensive review. Signal Process 128:222–242

    Article  Google Scholar 

  13. Korus P, Dziech A (2013) Efficient method for content reconstrucation with self-embedding. IEEE Trans Image Process 22(3):1134–1147

    Article  MathSciNet  MATH  Google Scholar 

  14. Korus P, Dziech A (2014) Adaptive self-embedding scheme with controlled reconstruction performance. IEEE Trans Inf Forensic Secur 9(2):169–181

    Article  Google Scholar 

  15. Kumar C, Singh A, Kumar P (2018) A recent survey on image watermarking techniques and its application in e-governance. Multimed Tools Appl 77(3):3597–3622

    Article  Google Scholar 

  16. Lee T Y, Lin S D (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506

    Article  MathSciNet  MATH  Google Scholar 

  17. Lin PL, Hsieh CK, Huang PW (2005) A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 38(12):2519–2529

    Article  Google Scholar 

  18. Luis RR, Manuel CH, Mariko NM, Hector PM, Brian K (2013) Watermarking-based image authentication with recovery capability using halftoning technique. Signal Process-Image Commun 28(1):69–83

    Article  Google Scholar 

  19. Niu DM, Wang HX, Cheng MQ, Shi CH (2018) Reference sharing mechanism-based self-embedding watermarking scheme with deterministic content reconstruction. Secur Commun Netw 2516324:12

    Google Scholar 

  20. Otsu N (1979) A threshold selection method from gray-level histograms. IEEE Trans Syst Man Cybern 9(1):62–66

    Article  Google Scholar 

  21. Qian ZX, Feng GR (2010) Inpainting assisted self recovery with decreased embedding data. IEEE Signal Process Lett 17(10):929–932

    Article  Google Scholar 

  22. Qian ZX, Feng GR, Zhang XP, Wang SZ (2011) Image self-embedding with high-quality restoration capability. Digit Signal Process 21(2):278–286

    Article  Google Scholar 

  23. Qin C, Chang CC, Chen PY (2012) Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process 92(4):1137–1150

    Article  Google Scholar 

  24. Qin C, Chang CC, Chen KN (2013) Adaptive self-recovery for tampered images based on VQ indexing and inpainting. Signal Process 93(4):933–946

    Article  Google Scholar 

  25. Qin C, Ji P, Wang JW, Chang CC (2016) Fragile image watermarking scheme based on VQ index sharing and self-embedding. Multimed Tools Appl 76(2):2267–2287

    Article  Google Scholar 

  26. Qin C, Wang HL, Zhang XP, Sun XM (2016) Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode. Inf Sci 373:233–250

    Article  Google Scholar 

  27. Qin C, Ji P, Zhang XP, Dong J, Wang JW (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138(C):280–293

    Article  Google Scholar 

  28. Run RS, Horng SJ, Lin WH, Kao TW, Fan PZ, KHan MK (2011) An efficient wavelet-tree-based watermarking method. Expert Syst Appl 38 (12):14357–14366

    Article  Google Scholar 

  29. Sadek MM, Khalifa AS, Mostafa MGM (2015) Video steganography: a compreshensive review. Multimed Tools Appl 74(17):7063–7094

    Article  Google Scholar 

  30. Sarreshtedari S, Akhaee MA (2015) A source-channel coding approach to digital image protection and self-recovery. IEEE Trans Image Process 24(7):2266–2277

    Article  MathSciNet  MATH  Google Scholar 

  31. Schölkopf B, Platt J, Hofmann T (2006) Graph-based visual saliency. Adv Neural Inf Process Syst 19:545–552

    Google Scholar 

  32. Tian LH, Zheng NN, Xue JR, Li C (2015) Authentication and copyright protection watermarking scheme for h.264 based on visual saliency and secret sharing. Multimed Tools Appl 74(9):2991–3011

    Article  Google Scholar 

  33. The USC-SIPI image database, [Online]. Available: http://sipi.usc.edu/database/

  34. The Dataset from the 2nd Bows Content, [Online]. Available: http://bows2.ec-lille.fr/

  35. Tong X J, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process-Image Commun 28(3):301–308

    Article  Google Scholar 

  36. Wang SS, Tsai SL (2008) Automatic image authentication and recovery using fractal code embedding and image inpainting. Pattern Recogn 41(2):701–712

    Article  MATH  Google Scholar 

  37. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13 (4):600–612

    Article  Google Scholar 

  38. Yang CW, Shen JJ (2010) Recover the tampered image based on VQ indexing. Signal Process 90(1):331–343

    Article  MATH  Google Scholar 

  39. Zhang XP, Wang SZ (2007) Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process Lett 14(10):727–730

    Article  Google Scholar 

  40. Zhang XP, Wang SZ (2008) Fragile watermarking with error-free restoration capability. IEEE Trans Multimed 10(8):1490–1499

    Article  Google Scholar 

  41. Zhang XP, Qian ZX, Ren YL, Feng GR (2011) Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans Inf Forensic Secur 6(4):1223–1232

    Article  Google Scholar 

  42. Zhang XP, Wang SZ, Qian ZX, Feng GR (2011) Reference sharing mechanism for watermark self-embedding. IEEE Trans Image Process 20(2):485–495

    Article  MathSciNet  MATH  Google Scholar 

  43. Zhang XP, Wang SZ, Qian ZX, Feng G R (2011) Self-embedding watermark with flexible restoration quality. Multimed Tools Appl 54(2):385–395

    Article  Google Scholar 

  44. Zhang XP, Xiao YY, Zhao ZM (2015) Self-embedding fragile watermarking based on DCT and fast fractal coding. Multimed Tools Appl 74(15):5767–5786

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported in part by the National Natural Science Foundation of China (61806171), the Natural Science Foundation of Shanghai (18ZR1400300), the Program for the Fundamental Research of the Shanghai Committee of Science and Technology (15JC1400600), and the Fundamental Research Funds of the Central Universities (16D110412,17D110408).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Rong Huang or Hao Liu.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huang, R., Liu, H., Liao, X. et al. A divide-and-conquer fragile self-embedding watermarking with adaptive payload. Multimed Tools Appl 78, 26701–26727 (2019). https://doi.org/10.1007/s11042-019-07802-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-07802-y

Keywords