Skip to main content
Log in

A self-recovery watermarking scheme based on block truncation coding and quantum chaos map

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

To take into account the invisibility, recovery quality, detection ability, and security, a new digital image fragile watermarking method based on block truncation coding (BTC) and quantum chaos map is proposed. In this method generates the authentication watermark for each 4 × 4 block and generates the recovery watermark for each 2 × 2 block by block truncation coding. For each block, the block truncation coding is used to classify the image blocks into smooth blocks and rough blocks. For different blocks, recovery data can be generated by allocating fewer bits to the smooth blocks and more bits to the rough blocks to encoding the block content. Quantum chaos map is used to generate the block mapping sequence for embedding recovery watermark to improve the shortcoming of watermarking such as small keyspace and low security. The experimental results show that the proposed scheme improves the quality of watermarked and recovered images. Additionally, this approach achieves higher security than the existing methods, under different attacks, such as general tampering, collage attack, content-only, and a hybrid attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26

Similar content being viewed by others

References

  1. Behnia S, Ayubi P, Soltanpoor W. (2012). Image encryption based on quantum chaotic map and FSM transforms. Proc. Telecommunications Network Strategy and Planning Symposium (NETWORKS), 2012 XVth International, 2012:1-6.

  2. Benrhouma O, Hermassi H, Belghith S (2015) Tamper detection and self-recovery scheme by DWT watermarking. Nonlinear Dynamics 79:1817–1833

    Article  Google Scholar 

  3. Betancourth GP. (2012). Fragile watermarking scheme for image authentication. Proc. Human System Interactions (HSI), 2012 5th International Conference, 2012:168-74.

  4. Chang C-C, Hu Y-S, Lu T-C (2006) Watermarking-based image ownership and tampering authentication scheme. Pattern Recogn Lett 27:439–446

    Article  Google Scholar 

  5. Dadkhah S, Manaf AA, Hori Y, Hassanien AE, Sadeghi S (2014) An effective SVD-based image tampering detection and self-recovery using active watermarking. Signal Process Image Commun 29:1197–1210

    Article  Google Scholar 

  6. Delp EJ, Mitchell OR (1979) Image compression using block truncation coding. IEEE Trans Commun 27:1335–1342

    Article  Google Scholar 

  7. Edupuganti VG, Shih FY, Chang I-C (2011) An efficient block-based fragile watermarking system for tamper localization and recovery. Intelligent Automation & Soft Computing 17:257–267

    Article  Google Scholar 

  8. Fridrich, J. (1999). Protection of digital images using self-embedding. Proc. Symposium on Content Security and Data Hiding in Digital Media, Institute of Technology, New Jersey, USA.

  9. Fridrich J, Goljan M (1999) Images with self-correcting capabilities. Proc international conference on image processing 1999(3):792–796

    Google Scholar 

  10. Fridrich JJ, Goljan M, Memon ND (2002) Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging 11:262–274

    Article  Google Scholar 

  11. Haouzia A, Noumeir R (2008) Methods for image authentication: a survey. Multimed Tools Appl 39:1–46

    Article  Google Scholar 

  12. H-b Z, Yang C (2004) Tamper detection and self-recovery of images using self-embedding. Acta Electron Sin 32:196–199

    Google Scholar 

  13. He H-J, Zhang J-S, Chen F (2009) Adjacent-block based statistical detection method for self-embedding watermarking techniques. Signal Process 89:1557–1566

    Article  Google Scholar 

  14. He H, Zhang J, Tai H (2009) Self-recovery fragile watermarking using block-neighborhood tampering characterization. Proc information hiding 2009:132–145

    Article  Google Scholar 

  15. Hemida O, Huo Y, Chen F, He H. (2017). Block-DCT based alterable-coding restorable fragile watermarking scheme with superior localization. Proc. Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), IEEE,2017, 2017:846-51.

  16. Hemida O, Huo Y, He H, Chen F (2018) A restorable fragile watermarking scheme with superior localization for both natural and text images. Multimed Tools Appl

  17. Huo Y, Chen F, He H, Yin Z. (2010). An alterable-capacity authentication watermarking algorithm with superior localization. Proc. Information Theory and Information Security (ICITIS), 2010 IEEE International Conference, 2010:608-11.

  18. Lee T-Y, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41:3497–3506

    Article  Google Scholar 

  19. Li C-T (2004) Digital fragile watermarking scheme for authentication of JPEG images. IEE proceedings-vision, image and signal processing 151:460–466

    Article  Google Scholar 

  20. Lin P-L, Huang P-W, Peng A-W. (2004) A fragile watermarking scheme for image authentication with localization and recovery. Proc. Multimedia Software Engineering, 2004. Proceedings. IEEE Sixth International Symposium on, 146-53.

  21. Liu Z, Zhang F, Wang J, Wang H, Huang J (2016) Authentication and recovery algorithm for speech signal based on digital watermarking. Signal Process 123:157–166

    Article  Google Scholar 

  22. Nyeem H, Boles W, Boyd C (2016) Modeling attacks on self-authentication watermarking. Multimed Tools Appl 75:15849–15880

    Article  Google Scholar 

  23. Piper A, Safavi-Naini R (2013) Scalable fragile watermarking for image authentication. IET Inf Secur 7:300–311

    Article  Google Scholar 

  24. Qian Z, Feng G, Zhang X, Wang S (2011) Image self-embedding with high-quality restoration capability. Digital Signal Processing 21:278–286

    Article  Google Scholar 

  25. Qin C, Chang C-C, Chen P-Y (2012) Self-embedding fragile watermarking with restoration capability based on an adaptive bit allocation mechanism. Signal Process 92:1137–1150

    Article  Google Scholar 

  26. Qin C, Wang H, Zhang X, Sun X (2016) Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode. Inf Sci 373:233–250

    Article  Google Scholar 

  27. Shi H, Wang XH, Li MC, Bai J, Feng B (2017) Secure variable-capacity self-recovery watermarking scheme. Multimed Tools Appl 76:6941–6972

    Article  Google Scholar 

  28. Singh P, Agarwal S (2016) An efficient fragile watermarking scheme with multilevel tamper detection and recovery based on dynamic domain selection. Multimed Tools Appl 75:8165–8194

    Article  Google Scholar 

  29. Singh D, Singh SK (2016) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J Vis Commun Image Represent 38:775–789

    Article  Google Scholar 

  30. Singh D, Singh SK. (2017). Block Truncation Coding based effective watermarking scheme for image authentication with recovery capability. Multimedia Tools and Applications:1–19.

  31. Singh D, Singh SK (2017) DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimed Tools Appl 76:953–977

    Article  Google Scholar 

  32. Sreenivas K, Prasad VK (2018) Fragile watermarking schemes for image authentication: a survey. Int J Mach Learn Cybern 9:1193–1218

    Article  Google Scholar 

  33. Stinson DR (2005) Cryptography: theory and practice. CRC press

  34. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13:600–612

    Article  Google Scholar 

  35. Wei L, Chia-Chen L, Jeng-Shyang P. (2016). Novel image authentication scheme with fine image quality for BTC-based compressed images. Multimedia Tools and Applications75:4771–4793.

  36. Yang C-W, Shen J-J (2010) Recover the tampered image based on VQ indexing. Signal Process 90:331–343

    Article  Google Scholar 

  37. Zain JM, Fauzi AR. (2006). Medical image watermarking with tamper detection and recovery. Proc. Engineering in Medicine and Biology Society, 2006. EMBS'06. 28th Annual International Conference of the IEEE, 2006:3270-3.

Download references

Acknowledgments

This work is supported by National Natural Science Foundation of China (NSFC) Under grants (61872303) and Technology Innovation Talent Program of Science & Technology Department of Sichuan Province(2018RZ0143).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Omer Hemida.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hemida, O., He, H. A self-recovery watermarking scheme based on block truncation coding and quantum chaos map. Multimed Tools Appl 79, 18695–18725 (2020). https://doi.org/10.1007/s11042-020-08727-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08727-7

Keywords

Navigation