Skip to main content
Log in

An image authentication scheme based on digital watermarking and image secret sharing

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper presents an image authentication scheme that can verify the origin of the received image and, moreover, detect if the image has been tampered with. The underlying technologies of the scheme are digital watermarking and image secret sharing. Different from other schemes that use one piece of watermark information for one purpose and a different piece for another, the watermark information used for original verification is also utilized for tamper detection. Moreover, unlike other schemes that employ a fixed strength value for embedding watermarks, the scheme automatically utilizes two different strength values, one for flat regions and the other for complex regions. The experimental results prove that using different strength values increases the robustness of the watermark with little sacrifice in image quality. The results also demonstrate the effectiveness of the scheme for the origin verification as well as the tamper detection.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Adil H, Rita N (2008) Methods for image authentication: a survey. Springer Multimedia Tools and Applications 39:1–46

    Article  Google Scholar 

  2. Bhatnagar G, Raman B, Swaminathan K (2008) DWT-SVD based dual watermarking scheme. First international conference on the applications of digital information and web technologies:526-531

  3. Chin-Chen C, Ju-Yuan H, Chi-Lung C (2002) An image copyright protection scheme based on torus automorphism. First International Symposium on Cyber Worlds:217-224

  4. Chin-Chen C, Yi_Pei H, Chia-Hsuan L (2008) Sharing secrets in stego images with authentication. Pattern Recogn 41:3130–3137

    Article  MATH  Google Scholar 

  5. C-M P, I-K K (2008) Digital image watermarking by adaptive quantization of wavelet packet coefficients. International conference on systems, signals and image processing:173-176

  6. Congxu Z, Yuping H (2008) A multipurpose watermarking scheme for image authentication and copyright protection. International symposium on electronic commerce and security:930-933

  7. Fan Z, Honghin Z (2004) Digital watermarking capacity research. The IEEE international conference on communications, circuits and systems 2:796–799

    Google Scholar 

  8. Guzman VVF, Miyatake MN, Meana HMH (2004) Analysis of a wavelet-based watermarking algorithm. In: the IEEE international conference on electronics, communications and computers:283-287

  9. Hartung F, Kutter M (1999) Multimedia watermarking techniques. Proc IEEE 89(7):1079–1107

    Article  Google Scholar 

  10. Hongmei L, Jiufen L, Jiwu H, Daren H, Shi YQ (2002) A robust DWT-based blind data hiding algorithm. The IEEE international symposium on circuits and systems 2:672–675

    Google Scholar 

  11. Huajian L, Steinebach M (2006) Digital watermarking for image authentication with localization. In: the IEEE international conference on image processing:1973-1976

  12. I-Kuan K, Chi-Man P (2008) Digital image watermarking with blind detection for copyright verification. Congress on image and signal processing 1:504–508

    Google Scholar 

  13. Jun X, Ying W (2008) Semi-Fragile watermarking based on image gradient. International conference on computational intelligence and security 1:285–289

    Google Scholar 

  14. Kwang-Fu L, Tung-Shou C, Seng-Cheng W (2001) Image tamper detection and recovery system based on discrete wavelet transformation. IEEE Pacific Rim conference on communications, computers and signal processing 1:164–167

    Google Scholar 

  15. Maeno K, Qibin S, Shih-Fu C, Suto M (2006) New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization. IEEE Trans on Multimedia 8(11):32–45

    Article  Google Scholar 

  16. Ming-Quan F, Hong-Xia W (2007) A novel multipurpose watermarking scheme for copyright protection and content authentication. In: 2007 second workshop on digital media and its application in museum & heritage:19-24

  17. Safabakhsh R, Zaboli S, Tabibiazar A (2004) Digital watermarking on still images using wavelet transform. The IEEE international conference on information technology: coding and computing l:671–675

    Article  Google Scholar 

  18. Sang-Heun O, Sung-Wook P, Byung-Jun K (2002) DWT (discrete wavelet transform) based watermark system. In: the International conference on consumer electronics, 2002 digest of technical papers:192-193

  19. Shang-Lin H, I-Ju T, Bin-Yuan H, Jh-Jie J (2008) Protecting copyrights of color images using a watermarking scheme based on secret sharing and wavelet transform. Journal of Multimedia 3(4):42–49

    Google Scholar 

  20. Shinfeng DL, Yu-Chan K, Yu-Hsun H (2006) An image watermarking scheme with tamper detection and recovery. First international conference on innovative computing, information and control 3:74–77

    Article  Google Scholar 

  21. Tung-Shou C, Chen J, Jian-Guo C (2004) Tamper detection and retrieval technique based on JPEG2000 with LL subband. The IEEE international conference on networking, sensing and control 2:1235–1240

    Article  Google Scholar 

  22. Voyatzis G, Pitas I (1996) Applications of torus automorphisms in image watermarking. Proceedings of international conference on image processing (ICIP) 3:237–240

    Google Scholar 

  23. Xianhai Z, Yongtian Y, Yan Z (2006) A secure hierarchical fragile watermarking method with tamper localization. First international multi-symposiums on computer and computational sciences 2:69–74

    Google Scholar 

  24. Yazhou L, Wen G, Hongxun Y, Shaohui L (2004) A texture-based tamper detection scheme by fragile watermark. International symposium on circuits and systems 2:177–180, II

    Google Scholar 

  25. Zhe-Ming L, Dian-Guo X, Sun Sheng-He (2005) Multipurpose image watermarking algorithm based on multistage vector quantization. IEEE Transactions on Image Processing 14(6):822–831

    Article  Google Scholar 

Download references

Acknowledgement

Financial support of this study by Tatung University, Taipei, Taiwan, under grant B97-I12-053 is gratefully acknowledged.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shang-Lin Hsieh.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hsieh, SL., Tsai, IJ., Yeh, CP. et al. An image authentication scheme based on digital watermarking and image secret sharing. Multimed Tools Appl 52, 597–619 (2011). https://doi.org/10.1007/s11042-010-0520-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-010-0520-4

Keywords

Navigation