Abstract
To improve the imperceptibility, security and tamper detection performance, a self-embedding watermarking scheme against JPEG compression is proposed in this work. The recovery watermark of all blocks in the host image, which consists of 6-bit DC-code and 5-bit AC-code and simultaneously used to both tamper detection and tamper recovery, is recombined based on the secret key and embedded in the quantized DCT coefficients. This strategy not only enhances the ability against the known forgery attacks due to introducing multi-blocks independency, but also improves the tamper detection performance by designing the tamper detection method based on the multi-neighbor characteristic and multi-threshold optimization. To achieve the better imperceptibility, the 7 middle frequency DCT coefficients of an 8 × 8 block are chosen to hide the 11-bit watermark by adopting the weight-function modulo based embedding method. Robustness against JPEG compression is enhanced by setting the quantization step of the chosen DCT coefficients according to the standard JPEG quantization table and an adjustable scaling factor which balances the robustness with imperceptibility. We also discuss the effects of different scaling factors on the imperceptibility and robustness in terms of peak signal to noise ratio (PSNR) and survival quality factor (SQF) of watermarked image generated by a given scaling factor. Experimental results demonstrate that the proposed method outperforms conventional semi-fragile restorable watermarking schemes in imperceptibility, tamper detection and tamper recovery in various forgery attacks especially for JPEG compression with low QFs.




















Similar content being viewed by others
References
Didi R, Horng SJ, Fan PZ, Wang X, Khan MK (2012) An efficient copyright protection scheme for e-government document images. IEEE Multimed 19(3):62–73
Fridrich J, Goljan M (1999) Images with self-correcting capabilities. Proc ICIP’99, Kobe, Japan
Fridrich J, Goljan M, Memon M (2002) Cryptanalysis of the yeung-mintzer fragile watermarking technique. J Electron Imag 11(4):262–274
Han S, Chu C (2010) Content-based image authentication current status, issues, and challenges. Int J Inf Secur 9:19–32
Haouzia A, Noumeir R (2008) Methods for image authentication: a survey, multimedia tools and applications. 39:1–46
He HJ, Chen F, Tai HM, Ton K, Zhang J (2012) Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Trans Inform Forensics Sec 7(1):185–196
He HJ, Zhang J, Tai HM (2006) A wavelet-based fragile watermarkingscheme for secure image authentication. Proc 5th Int Workshop Digit Watermarking, Jeju Island, Korea
Horng SJ, Didi R, Fan PZ, Wang X, Muhammad KK (2014) An adaptive watermarking scheme for e-government document images. Multimed Tools Appl 72(3):3085–3103
Huang HC, Pan JS, Huang YH, Wang FH, Huang KC(2007) Progressive watermarking techniques using genetic algorithms, circuits, systems, and signal processing. 26(5), 671–687
Huo YR, He HJ, Chen F (2013) A restorable semi-fragile watermarking combined DCT with interpolation. IWDW, LNCS 8389:393–408
Huo YR, He HJ, Chen F (2014) A semi-fragile watermarking algorithm with two-stage detection. Multimed Tools Appl 72:123–149
Korus P, Dziech A (2013) Efficient method for content reconstruction with self-embedding. IEEE Trans Image Process 22(3):1134–1147
Li J, Li X, Yang B, Sun X (2015) Segmentation-based images copy-move forgery detection scheme. IEEE Trans Inform Forensics Sec 10(3):507–518
Lin WH, Horng SJ, Kao TW, Chen RJ, Chen YH, Lee CL, Tersno T (2009) Image copyright protection with forward error correction. Expert Syst Appl (SCI 1/64, 2596) 36(9):11888–11894
Lin WH, Horng SJ, Kao TW, Fan PZ, Lee CL, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimed (SCI 12/86, 2288) 10(5):746–757
Lin WH, Wang YR, Horng SJ, Kao TW, Pan Y (2009) A blind watermarking method using maximum wavelet coefficient quantization. Expert Syst Appl (SCI 1/64, 2596) 36(9):11509–11516, copyright protection
Lin WH, Wang YR, Horng SJ (2009) A wavelet-tree-based watermarking method using distance vector of binary cluster. Expert Syst Appl (SCI 1/64, 2596) 36(6):9869–9878
Luis RR, Manuel CH, Mariko NM, Hector PM, Brian K (2013) Watermarking-based image authentication with recovery capability using halftoning technique. Signal Process Image Commun 28:69–83
Mendoza NJ, Kurkoski B, Nakano MM, Perez MM (2010) Halftoning-based self-embedding watermarking for image authentication and recovery. Proc 53rd IEEE Int Midwest Symp Circ Syst, Seattle, USA
Pan JS, Hsin YC, Huang HC, Huang KC (2004) Robust image watermarking based on multiple description vector quantisation. Electron Lett 40(22):1409–1410
Phadikar A, Maity SP, Mandal M (2012) Novel wavelet-based QIM data hiding technique for tamper detection and correctionof digital images. J Vis Commun Image R 23:454–466
Preda RQ (2013) Semi-fragile watermarking for image authentuication with sensitive tamper localization in the wavelet domain. Measurement 46:367–373
Qin C, Chang C, Chen KN (2013) Adaptive self-recovery for tampered images based on VQ indexing and inpainting. Signal Process 93(4):933–946
Rafi U, Asifullah K, Aamir SM (2013) Dual-purpose semi-fragile watermark: authentication and recovery of digital images. Comput Electr Eng 39:2019–2030
Rafiullah C, Asifullah K (2010) Digital image authentication and recovery: employing integer transform based information embedding and extraction. Inf Sci 180:4909–4928
Saxena A, Fernandes C (2013) DCT/DST-based transform coding for intra prediction in image/video coding. IEEE Trans Image Process 22(10):3974–3981
Sun HM, Weng CY, Wang SJ, Yang CH (2013) Data embedding in image-media using weight-function on modulo operations. ACM Trans Embed Comput Syst 12(2):1–12
Wang H, Anthony TH, Zhao X (2011) A novel fast self-restoration semi-fragile watermarking algorithm for image content authentication resistant to JPEG compression. Proc 10th Int Workshop Digital-Forensics Watermarking, Atlantic City, USA 72–85
Wang S, Miyauchi R, Unoki M, Kim NS (2015) Tampering detection scheme for speech signals using formant enhancement based watermarking. J Inform Hiding Multimed Sign Process 6(6):1264–1283
Xia Z, Wang X, Sun X, Liu Q, Xiong N (2014) Steganalysis of LSB matching using differences between nonadjacent pixels, Multimed Tools Appl 11 (Published online) doi: 10.1007/s11042-014-2381-8
Xia ZH, Wang XH, Sun XM, Wang BW (2014) Steganalysis of least significant bit matching using multi-order differences. Sec Commun Netw 7(8):1283–1291
Yan B, Wang YF, Song LY, Yang HM (2015) Power spectrum compliant QIM watermarking for autoregressive host signals. J Inform Hiding Multimed Sign Process 6(5):882–888
Zhang X, Qian Z, Ren Y, Feng G (2011) Watermarking with flexible self-recovery quality based oncompressive sensing and compositive reconstruction. IEEE Trans Inform Forensics Sec 6(4):1223–1232
Zhang H, Wu B, Pengetal Q (2007) Digital image inpainting based on p-harmonic energy minimization. Chin J Elecron 16(3):525–530
Acknowledgments
This work is supported in part by the National Natural Science Foundation of China (Grant No.61373180, 61461047), the Science and Technique Foundation of Tibet Autonomous Region (2012), the Science and Technology Innovation Talent Project of Sichuan Province (No.2014-058). Thanks authors of reference [18] for providing us the source codes.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chen, F., He, H. & Huo, Y. Self-embedding watermarking scheme against JPEG compression with superior imperceptibility. Multimed Tools Appl 76, 9681–9712 (2017). https://doi.org/10.1007/s11042-016-3574-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-3574-0