Skip to main content
Log in

Blind image—variant based authentication method

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

There is a plethora of image authentication techniques in the literature. Almost all of these methods use either a form of watermarking or data hiding techniques to embed data directly in the original image or its decomposed sub-bands. Recently, new multiple watermarking methods have emerged to tackle more robust forgery challenges where a single watermark fails or insufficient. Most of these methods are directed towards medical images for obvious reasons. This paper presents a new precise blind image-variant authentication method. This method initiates a new direction for research on image authentication as it does not embed any sort of data in the original image or its decomposed sub-band(s) but rather produces an image-variant via manipulating some statistics of the original image. These variations represent two sequences which were infused in two QR-codes that enabled the variation process. We tested this method against image processing attacks including JPEG compression, resizing, and Gaussian-noise using images from several databases including the USC – SIPI, McGill Calibrated Color Image, DICOM medical image. Also, we compared this method performance with results from seven 7 published methods and found that our method scored higher performance results for robustness and imperceptibility and it regenerated the variation secret sequences with 100% accuracy in each case. Furthermore, this method capacity is large enough to prevent data-overflow.

This is a preview of subscription content, log in via an institution to check access.

Access this article

We’re sorry, something doesn't seem to be working properly.

Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Algorithm 1
Fig. 5
Algorithm 2
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data availability

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. Digital Imaging and Communications in Medicine DICOM: http://medical.nema.org/Dicom/2011/11_11pu.pdf obtained September 2020

  2. Boussif M, Aloui N, Cherif A (2020) “DICOM imaging watermarking for hiding medical reports”. Med Biol Eng Comput, Springer. https://doi.org/10.1007/s11517-020-02269-8

  3. Cheddad A, Condell J, Curran K, Kevitt PM (2010) Digital Image Steganography: Survey and Analysis of current methods, vol 90. Signal Processing, Elsevier, pp 727–752

    Google Scholar 

  4. Lee W, Choi B, Lee, S, Lee J (2005) ‘Image watermarking using improved DWT and HVS based on JPEG compression’, AWIC 2005, LNAI 3528. Springer-Verlag Berlin Heidelberg, pp 254–259

  5. alZahir S, Islam MW (2011) A new wavelet – based image watermarking technique. IEEE Int Con Consumer Electronics (ICCE), Las Vegas, USA 723–724

  6. Amirpholiour S, Naghsh-Nilchi AR (2009) Robust digital image watermarking based on joint DWT-DCT. Int J Digit Content Technol Appl 3(2):42–54

    Google Scholar 

  7. Islam MW, alZahir S (2012) “A robust color image watermarking scheme”, Vis, Imaging Image Process, Banff, AB, Canada 3–5

  8. Zear A, Singh AK, Kumar P (2016) ‘Multiple watermarking for healthcare applications’. J Intell Syst

  9. Wang JW, Lian SG, Shi YQ (2017) Hybrid multiplicative multi-watermarking in DWT domain. Multidimens Syst Sig Process 28:617–636

    Article  Google Scholar 

  10. Yuan XC, Li M (2018) Local multi-watermarking method based on robust and adaptive feature extraction. Sig Process 149:103–117

    Article  Google Scholar 

  11. Dugad R, Ratakonda K, Ahuja N (1998) A new wavelet-based Scheme for watermarking images. Proc Intl Conf Image Process, Chicago, IL, USA 2:419–423

  12. Elbasi E, Eskicioglu AM (2006) PRN based watermarking scheme for color images. J Istanbul Commer Univ 5(10):119–131

    Google Scholar 

  13. Liu R, Tan T (2002) An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans Multimed 4:121–128

    Article  Google Scholar 

  14. Bhatnagar G, Raman B (2009) A new robust reference watermarking scheme based on DWT-SVD. Comput Standards Interf 31:1002–1013

    Article  Google Scholar 

  15. Ganic E, Eskicioglu AM (2004) Robust DWT-SVD Domain Image Watermarking: Embedding Data in All Frequencies, MM&SEC’04, September 20–21. Magdeburg, Germany

    Book  Google Scholar 

  16. Yavuz E, Telatar Z (2005) “Improved SVD-DWT based digital image watermarking against watermark ambiguity”. J Electron Imaging 1051–1055

  17. Zhang XP, Li K (2005) Comments on - An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans Multimed: Correspondence 7(2):593–594

    Article  Google Scholar 

  18. Elbasi E, Eskicioglu AM (2006) A DWT – based robust semi-blind image watermarking algorithm using two bands, IS&T/SPIE’s, 18th Annual Symp. On Elec Imaging, Security, Steganography and Watermarking of Multimedia Contents

  19. Yin C, Li L, Lv A, Qu L (2007) Color image watermarking algorithm based on DWT-SVD”, IEEE Proc Intl Conf Autom Logist, Jinan, China 2607-2611

  20. Lee MH, Kwon OJ (2008) Color image watermarking based on DS-CDMA using Hadamard kernel. Proc 10th IEEE Intl Conf Adv Commun Technol, Korea 3:1592–1597

  21. Gui F, Qiwei L (2008) Adaptive color image watermarking. Proc SPIE 6623. https://doi.org/10.1117/12.791517

  22. Dharwadkar NV, Amberker BB, Gorai A (2011) Non-blind Watermarking scheme for color images in RGB space using DWT-SVD. Intl Conf Commun Sig Process 489–493

  23. Vahedi E, Zoroofi RA, Shiva M (2012) “Toward a new wavelet-based watermarking approach for color images using bio-inspired optimization principles". Digit Sig Process, Elsevier 22:153-162

  24. Al-Haj A, Amer A (2014) Secured telemedicine using region-based watermarking with tamper localization. J Digit Imaging 27(6):737–750

    Article  Google Scholar 

  25. alZahir S, Bayaa H (2018)” Three precise spatial signatures for image copy recall”, IEEE Canadian Conf Electr Comput Eng, CCECE

  26. Andrews HC, Patterson CL (1976) Singular value decomposition (SVD) image coding. IEEE Trans Commun 24(4):425–432

    Article  Google Scholar 

  27. Rec. ITU-R BT.601–4 https://glenwing.github.io/docs/ITU-R-BT.601-4.pdf Accessed January 15, 2022

  28. Chou CH, Liu KC (2006) Performance analysis of color image watermarking schemes using perceptually redundant signal spaces. Proc 2006 Intl Conf Intell Info Hiding Multimed Sig Process

  29. QR Codes: https://www.qrcode.com/en/about/version.html obtained September 20, 2020

  30. http://sipi.usc.edu/database/database.php obtained in January, 2022

  31. http://tabby.vision.mcgill.ca/html obtained in January 20 2020

  32. Meerwald P, Koidl C, Uhl A (2009) Attack on watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimed 11(5):1–5

    Article  Google Scholar 

  33. Rakhmawati L, Suwadi S, Wirawan W (2020) Blind robust and self-embedding fragile image watermarking for image authentication and copyright protection with recovery capability. Int J Intell Eng Syst 13(5)

  34. Zhang R, Xiao D, Chang Y (2018) ‘A novel image authentication with tamper localization and self-recovery in encrypted domain based on compressive sensing’. Secur Commun Netw, Hindawi https://doi.org/10.1155/2018/1591206

  35. Daren H Jiufen L, Jiwu H, Hongmei L (2001) ‘A DWT-based Image watermarking algorithm’. IEEE Int Conf Multimed Expo, Tokyo, Japan 429-432

  36. Singh AK (2019) Robust and distortion control dual watermarking in LWT domain using DCT and error correction code for color medical image. Multimed Tools Appl 78:30523–30533. https://doi.org/10.1007/s11042-018-7115-x

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saif alZahir.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

alZahir, S., Islam, W. Blind image—variant based authentication method. Multimed Tools Appl 83, 51899–51923 (2024). https://doi.org/10.1007/s11042-023-17547-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-17547-4

Keywords

Navigation