Skip to main content
Log in

A robust multimedia authentication and restoration scheme in digital photography

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Image authentication and restoration is an important area of modern research. In digital photography, copyright protection is very crucial. Visible signatures distract from the meaning of the photograph as well as they are easy to be removed by using advanced softwares. Invisible watermarks provide protection, offer a better look to photographs than visible watermarking, and prevent the photographs from unauthorized manipulations. A robust multiple watermarking scheme is required which could invisibly protect the content and also should survive the manipulations for later verification and restoration. In this paper, a robust and imperceptible multimedia authentication and restoration scheme is proposed. The security of Advanced Encryption Standard (AES) is utilized to make an encrypted watermark. The encrypted watermark is then embedded into photographs in the salient regions by proposed Feature-Closest Point Transform (F-CPT) algorithm. The second watermark is generated by wavelet decomposition and embedded in the second and third level wavelet sub-bands of the cover photographs. Several security attacks are performed e.g. noise attack, compression attack, resizing attack, rotation attack, collage attack, and cropping attack on multiple watermarked photographs to examine the system robustness by normalized cross correlation (NCC) for retrieved authentication watermarks. Result of PSNR, MSE, and SSIM show the high imperceptibility of our technique and aesthetic score (AS) shows the aesthetic quality of watermarked photographs (WPs).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Ali Al-Haj M (2010) Two spatial watermarking techniques for digital images. In: Advance techniques in multimedia watermarking: image, video, and audio applications. IGI Global Snippet, ch. 1, pp. 2–5

  2. Ali H-M, Abdellatif M, Bourennane E-B (2011) A watermarking of medical image: method based “LSB”. In: Journal of Emerging Trends in Computing and Information Science, vol. 2, no. 12, December, pp. 714-721

  3. Alomari R-S, Al-Jaber A (2004) A fragile watermarking algorithm for content authentication. In: IEEE Trans. JCIS Journal of Computing and Information Science, vol. 2, no. 1, pp. 27–37

  4. Barnes C, Goldman D-B, Shechtman E, Finkelstein A (2011) The patchmatch randomized correspondence algorithm for structural image manipulation. In: Communication of the ACM, vol. 54, issue. 11, November, pp. 103–111

  5. Chamlawi R, Asifullah K, Adris I, Zahid M (2007) A secure semi-fragile watermarking scheme for authentication and recovery of image based on wavelet transform. In: Journal of Computer Science and Technology, vol. 2, no. 6, November, pp. 795–804

  6. Chamlawi R, Asifullah K, Imran U (2010) Authentication and recovery of images using multiple watermarks. In: Computers & Electrical Engineering, vol. 36, issue. 3, May, pp. 578–584

  7. Chamlawi R, Khan A, Idris A (2007) Wavelet based image authentication and recovery. In: Journal of Computer Science and Technology, vol. 22, no. 6, November, pp. 795–804

  8. Christof P, Jan P (2010) Introduction to cryptography and data security. In: Understanding cryptography: a textbook for students and practitioners, reprint. Springer, Germany, ch. 1, sec. 1.1, pp. 2–4

  9. Chuan Q, Chang C-C, Chen P-Y (2012) Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. In: Journal of Signal Processing, ACM, vol. 92, issue, 4, April, pp. 1137–1150

  10. Datta R, Joshi D, Li J, Wang J-Z (2006) Studying aesthetics in photographic images using computational approach. In: Proc. of European Conference on Computer Vision (ECCV), May, pp. 288–301

  11. Dobbertin H, Knudsen L, Robshaw M (2005) The cryptanalysis of the AES – a brief survey. In: Advanced encryption standard-AES. Springer, India, vol. 3373, ch. 1, sec. 2, pp. 1–10

  12. Furht B, Kirovski D (2006) Protection of multimedia content in distribution networks. In: Multimedia watermarking techniques and applications. CRC Press, Taylor and Francis Groups, USA, ch. 1, pp. 1–60

  13. Huang W, Ho T-SA, Pankajakshan V (2008) Watermarking-based content authentication of motion-JPEG sequences. In: Proc. of VIE visual information engineering. p. 813–818

  14. Hung K-M, Chen T-W, Su W-K (2012) Automatic image authentication and recovery using multiple watermarks. In: ICIDT information science and digital content technology, vol. 3, June, pp. 730–735

  15. Jeng-Shyang P, Hsiang-Cheh L, Jain LC (2004) Advanced watermarking techniques. In: Intelligent watermarking techniques, 4th ed. World Scientific, USA and London, UK, part 3, ch. 12-18, pp. 351–515

  16. Li C-T, Lou D-C, Liu J-L (2003) Image integrity and authenticity verification via content-based watermarks and a public key cryptosystem. In: Journal of Chinese Institute of Electrical Engineering, vol. 10, no. 1, pp. 99–106

  17. Lin C-Y, Chang S-F (2000) Semi-fragile watermarking for authenticating JPEG visual content. In: Proc. of SPIE, security and watermarking of multimedia contents, vol. 2971, pp. 140–151

  18. Lin ET, Podilchuk CI, Delp EJ (2000) Detection of image alterations using semi-fragile watermarks. In: Proc. of SPIE security and watermarking of multimedia contents, vol. 3971. San Jose, California, January, pp. 23–28

  19. LinP-L, Hsieh C-K, Huang P-W (2005) A hierarchical digital watermarking method for image tamper detection and recovery. In: Journal of Pattern Recognition, ELSEVIER, vol. 38, issue. 12, December, pp. 2519–2529

  20. Pan H-K, Chen Y-Y, Tseng Y-C (2000) A secure data hiding scheme for two-color images. In: Proc. of IEEE Symposium on Computers and Communications, pp. 750–755

  21. Radharani S, Valarmathi M-L (2010) A study on watermarking schemes for image authentication. In: International Journal of Computer Applications, vol. 2, no. 4, June, p. 24–32

  22. Randall A (2011) A novel semi-fragile watermarking scheme with iterative restoration. Available: http://aaronrandall.com/files/WatermarkingPaperLight.pdf (URL)

  23. Rubner Y, Tomasi C, Guibas L-J (2000) The earth mover’s distance as a metric for image retrieval. In: Journal of Computer Vision, vol. 40, no. 2, pp. 99–121

  24. Sathik M-M, Sujatha S-S (2010) An improved invisible watermarking technique for image authentication. In: International Journal of Advanced Science and Technology, vo. 24, November, pp. 61–73

  25. Sencar HT, Ramkumar M, Akansu AN (2004) Communication with side information and data hiding. In: Data hiding fundamentals and applications: content security in digital media. ELSEVIER Academic Press, London, UK, ch. 3, sec. 3.3, pp. 35–39

  26. Shelly GB, Vermaat ME, Quasney JJ, Sebok SL, Jeffrey J (2008) Multimedia and content sharing. In: Discovering computers 2009: complete. Cengage Learning, Boston, USA, ch. 5, sec. ‘Special Features’, pp. 294–297

  27. Shih FY (2012) “Watermarking,” and “Steganography,”. In: Multimedia security: watermarking, steganography, and forensics. CRC Press, Taylor and Francis Group, USA, ch. 2 and ch. 3, pp. 67–181, and pp. 201–215

  28. Sidra R, Lee K-H, Lee S-W (2012) Aesthetic score assessment based on generic features in digital photography. In: AUN/SEED-Net regional conference on information and communication technology, Manila, Philippine, October, pp. 76–79

  29. Somayeh S, Sajjad D, Azizah A-M (2012) Efficient digital image authentication and tamper localization techniques using 3Lsb watermarking. In: IJCSI International Journal Of Computer Science, vol. 9, issue. 1, January, pp. 1–8

  30. Tai W-L, Yeh C-M, Chang C-C (2009) Reversible data hiding based on histogram modification of pixel differences. In: IEEE Trans. on Circuits and Systems for Video Technology, vol. 19, no. 6, June, pp. 906–910

  31. Tian J (2002) Wavelet-based reversible watermarking for authentication. In: Proc. of SPIE 4675, Security and Watermarking of Multimedia Contents IV, vol. 4675, April, pp. 679–690

  32. Tseng Y-C, Pan H-K (2001) Secure and invisible data hiding in 2 - color images. In: Proc. of IEEE Computer and Communication Societies, vol. 2, pp. 887–896

  33. TsihrintzisGA, Jain LC (2008) Cryptography and data hiding for media security. In: Multimedia services in intelligent environments: advanced tools and methodologies. Springer, Berlin, Germany, ch. 9, sec. 9.1, pp. 227–228

  34. Wu Y, Qiu B, Bao F (2007) Evaluating OUDA’s tamper-localization watermarking scheme. In: Proc. of IEEE Conference on Multimedia and Expo, July, pp. 843–846

  35. Yang H, Sun X (2007) Semi-fragile watermarking for image authentication and tamper detection using HVS model. In: IEEE conference on multimedia and ubiquitous engineering, April, pp. 26–28

  36. Zhang X, Wang S (2008) Fragile watermarking with error-free restoration capability. In: IEEE Trans. on Multimedia, vol. 10, no. 8, December, pp.1490–1499

  37. Zoran D, Michael J, Sushil J (2005) Information hiding: steganography and steganalysis. In: Handbook of statistics 24: data mining and data visualization. USA: Elsevier, ch. 6, sec. 3, pp. 174–179

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sang-Woong Lee.

Additional information

A preliminary version of this paper has been presented in 15th International Conference on Advanced Communication Technology (ICACT2013) which was held in Pyeonchang, Korea, January 27–30, 2013, pp. 24–28.

This study was supported by research fund from Chosun University, 2012.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Riaz, S., Lee, SW. A robust multimedia authentication and restoration scheme in digital photography. Multimed Tools Appl 73, 1291–1321 (2014). https://doi.org/10.1007/s11042-013-1592-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-013-1592-8

Keywords

Navigation