Skip to main content
Log in

Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

The problem of digital forgeries has become more and more serious in various fields like entertainment, digital forensics, and journalism. This paper proposes a self-embedding watermarking scheme for the restoration of an image after tampering by digital forgery. In this study, an absolute moment block truncation coding image was used as a watermark, in which the image was a compressed version of the original cover image and contained the content features of the cover image. Therefore, it was perfectly possible to perform self-embedding. The watermark was embedded using the LSB and 2LSB for the pixels of the cover image. This procedure made it possible to recover the original watermarked image from a tampered watermarked image. Furthermore, there was no problem in reconstructing it when the rate of tampering was more than 80%. In addition, we verified our proposed self-embedding scheme through an experiment. As a result of the experiment, the recovered image showed good perceptual quality compared to that of the previous scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Wu M, Liu B (2004) Data hiding in binary image for authentication and annotation. IEEE Trans Multimedia 6(4):528–538

    Article  Google Scholar 

  2. Katzenbeisser S, Petitcolas FAP (2000) Information techniques for steganography and digital watermarking. Artec house, Norwood, MA

    Google Scholar 

  3. Farid H (2009) Image forgery detection. IEEE Signal Process Mag 26(2):16–25

    Article  Google Scholar 

  4. Baek J, Kim C, Fisher PS (2010) (N, 1) secret sharing approach based on steganography with gray digital images. In: Proceedings 2010 IEEE international conference on wireless communications, networking and information security (WCNIS), pp 325–329

  5. Kim C (2010) Data hiding based on compressed dithering images. In: Proceedings advances in intelligent information and database systems, studies in computational intelligence, vol 283, pp 89–98

  6. Kim C, Yang CN (2015) Watermark with DSA signature using predictive coding. Multimedia Tools and Applications 74(14):5189–5203

    Article  Google Scholar 

  7. Iran faked missile test image, BBC news, 10 July 2008

  8. Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verication. IEEE Trans Image Process 10(10):1593–1601

    Article  MATH  Google Scholar 

  9. Suthaharan S (2004) Fragile image watermarking using a gradient image for improved localization and security. Pattern Recogn Lett 25:1893–1903

    Article  Google Scholar 

  10. Lu H, Shen R, Chung F-L (2003) Fragile watermarking scheme for image authentication. Electron Lett 39(12):898–900

    Article  Google Scholar 

  11. He H, Zhang J, Tai H-M (2006) A wavelet-based fragile watermarking scheme for secure image authentication. In: Proceedings IWDW 2006. Lecture notes in computer science, pp 422–432

  12. Liu S-H, Yao H-X, Gao W, Liu Y-L (2007) An image fragile watermark scheme based on chaotic image pattern and pixel-pairs. Appl Math Comput 185(2):869–882

    MATH  Google Scholar 

  13. Lin C-Y, Chang S-F (2001) SARI: Self-Authentication-and-recovery image watermarking system. In: Proceedings 9th ACM international conference multimedia, pp 628–629

  14. Luo H, Chu S-C, Lu Z-M (2008) Self embedding watermarking using halftoning technique. Circuits Syst Signal Process 27(2):155–170

    Article  MathSciNet  Google Scholar 

  15. Cheddad A, Condell J, Curran K, Kevitt PM (2009) A secure and improved self-embedding algorithm to combat digital document forgery. Signal Process 89(12):2324–2332

    Article  MATH  Google Scholar 

  16. Fridrich J, Goljan M (1999) Images with self-correcting capabilities. In: Proceedings IEEE international conference Image Process, pp 792–796

  17. He H, Zhang J, Chen F (2009) Adjacent-block based statistical detection method for self-embedding watermarking techniques. Signal Process 89:1557–1566

    Article  MATH  Google Scholar 

  18. Zhang X, Wang S, Feng G (2009) Fragile watermarking scheme with extensive content. In: IWDW 2009, Lecture notes in computer science, vol 5703, pp 268–278

  19. Qian Z, Feng G, Zhang X, Wang S (2011) Image self-embedding with high-quality, restoration capability. Digital Signal Process 21:278–286

    Article  Google Scholar 

  20. Zhang X, Wang S (2007) Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process Lett 14(10):727–730

    Article  Google Scholar 

  21. Zhang X, Wang S (2009) Fragile watermarking scheme using a hierarchical mechanism. Signal Process 89(4):675–679

    Article  MATH  Google Scholar 

  22. Lema MD, Mitchell OR (1984) Absolute moment blocking truncation coding and its application to color image. IEEE Trans Commun 32(10):1148–1157

    Article  Google Scholar 

  23. Delp EJ, Mitchell OR (1979) Image compression using block truncation coding. IEEE Trans Commun 27(9):1335–1342

    Article  Google Scholar 

Download references

Acknowledgements

This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2015R1D1A1A01059253). This work was supported under the framework of the international cooperation program managed by the National Research Foundation of Korea (2016K2A9A2A05005255).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Cheonshik Kim or Dongkyoo Shin.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, C., Shin, D. & Yang, CN. Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC. Pers Ubiquit Comput 22, 11–22 (2018). https://doi.org/10.1007/s00779-017-1061-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-017-1061-x

Keywords

Navigation