Abstract
This paper presents an image authentication scheme that can verify the origin of the received image and, moreover, detect if the image has been tampered with. The underlying technologies of the scheme are digital watermarking and image secret sharing. Different from other schemes that use one piece of watermark information for one purpose and a different piece for another, the watermark information used for original verification is also utilized for tamper detection. Moreover, unlike other schemes that employ a fixed strength value for embedding watermarks, the scheme automatically utilizes two different strength values, one for flat regions and the other for complex regions. The experimental results prove that using different strength values increases the robustness of the watermark with little sacrifice in image quality. The results also demonstrate the effectiveness of the scheme for the origin verification as well as the tamper detection.















Similar content being viewed by others
References
Adil H, Rita N (2008) Methods for image authentication: a survey. Springer Multimedia Tools and Applications 39:1–46
Bhatnagar G, Raman B, Swaminathan K (2008) DWT-SVD based dual watermarking scheme. First international conference on the applications of digital information and web technologies:526-531
Chin-Chen C, Ju-Yuan H, Chi-Lung C (2002) An image copyright protection scheme based on torus automorphism. First International Symposium on Cyber Worlds:217-224
Chin-Chen C, Yi_Pei H, Chia-Hsuan L (2008) Sharing secrets in stego images with authentication. Pattern Recogn 41:3130–3137
C-M P, I-K K (2008) Digital image watermarking by adaptive quantization of wavelet packet coefficients. International conference on systems, signals and image processing:173-176
Congxu Z, Yuping H (2008) A multipurpose watermarking scheme for image authentication and copyright protection. International symposium on electronic commerce and security:930-933
Fan Z, Honghin Z (2004) Digital watermarking capacity research. The IEEE international conference on communications, circuits and systems 2:796–799
Guzman VVF, Miyatake MN, Meana HMH (2004) Analysis of a wavelet-based watermarking algorithm. In: the IEEE international conference on electronics, communications and computers:283-287
Hartung F, Kutter M (1999) Multimedia watermarking techniques. Proc IEEE 89(7):1079–1107
Hongmei L, Jiufen L, Jiwu H, Daren H, Shi YQ (2002) A robust DWT-based blind data hiding algorithm. The IEEE international symposium on circuits and systems 2:672–675
Huajian L, Steinebach M (2006) Digital watermarking for image authentication with localization. In: the IEEE international conference on image processing:1973-1976
I-Kuan K, Chi-Man P (2008) Digital image watermarking with blind detection for copyright verification. Congress on image and signal processing 1:504–508
Jun X, Ying W (2008) Semi-Fragile watermarking based on image gradient. International conference on computational intelligence and security 1:285–289
Kwang-Fu L, Tung-Shou C, Seng-Cheng W (2001) Image tamper detection and recovery system based on discrete wavelet transformation. IEEE Pacific Rim conference on communications, computers and signal processing 1:164–167
Maeno K, Qibin S, Shih-Fu C, Suto M (2006) New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization. IEEE Trans on Multimedia 8(11):32–45
Ming-Quan F, Hong-Xia W (2007) A novel multipurpose watermarking scheme for copyright protection and content authentication. In: 2007 second workshop on digital media and its application in museum & heritage:19-24
Safabakhsh R, Zaboli S, Tabibiazar A (2004) Digital watermarking on still images using wavelet transform. The IEEE international conference on information technology: coding and computing l:671–675
Sang-Heun O, Sung-Wook P, Byung-Jun K (2002) DWT (discrete wavelet transform) based watermark system. In: the International conference on consumer electronics, 2002 digest of technical papers:192-193
Shang-Lin H, I-Ju T, Bin-Yuan H, Jh-Jie J (2008) Protecting copyrights of color images using a watermarking scheme based on secret sharing and wavelet transform. Journal of Multimedia 3(4):42–49
Shinfeng DL, Yu-Chan K, Yu-Hsun H (2006) An image watermarking scheme with tamper detection and recovery. First international conference on innovative computing, information and control 3:74–77
Tung-Shou C, Chen J, Jian-Guo C (2004) Tamper detection and retrieval technique based on JPEG2000 with LL subband. The IEEE international conference on networking, sensing and control 2:1235–1240
Voyatzis G, Pitas I (1996) Applications of torus automorphisms in image watermarking. Proceedings of international conference on image processing (ICIP) 3:237–240
Xianhai Z, Yongtian Y, Yan Z (2006) A secure hierarchical fragile watermarking method with tamper localization. First international multi-symposiums on computer and computational sciences 2:69–74
Yazhou L, Wen G, Hongxun Y, Shaohui L (2004) A texture-based tamper detection scheme by fragile watermark. International symposium on circuits and systems 2:177–180, II
Zhe-Ming L, Dian-Guo X, Sun Sheng-He (2005) Multipurpose image watermarking algorithm based on multistage vector quantization. IEEE Transactions on Image Processing 14(6):822–831
Acknowledgement
Financial support of this study by Tatung University, Taipei, Taiwan, under grant B97-I12-053 is gratefully acknowledged.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hsieh, SL., Tsai, IJ., Yeh, CP. et al. An image authentication scheme based on digital watermarking and image secret sharing. Multimed Tools Appl 52, 597–619 (2011). https://doi.org/10.1007/s11042-010-0520-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-010-0520-4