Abstract
Verifying image authentication is necessary when images support evidence for essential purposes such as law enforcement and forensic investigation. The self-embedding fragile watermarking method is a powerful technique for confirming exact content authentication and restoration. This paper proposes the integer wavelet transform(IWT) based watermarking approach for accurate authentication and restoration. Here, watermark bits are calculated from each block of \(2\times 2\) pixels. The authentication bits are inserted into the block’s three LSBs, while restoration bits are inserted into the mapping block. Restoration bits are calculated from the five MSBs of the cover image using IWT. In contrast, authentication bits are calculated from secret keys, MSBs and, the location of pixels. The experimental outcomes prove that the PSNR and NCC of the reconstructed image in the suggested scheme are significantly high analyzed with the existing methods.















Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data availability statement
The results reported in this paper are constructed using publicly available data set.
References
Amrit P, Singh AK (2022) Survey on watermarking methods in the artificial intelligence domain and beyond. Comput Commun 188:52–65. https://doi.org/10.1016/j.comcom.2022.02.023
Anand A, Singh AK (2021) Watermarking techniques for medical data authentication: a survey. Multimed Tools Appl 80(20):30165–30197
Ansari IA, Pant M, Ahn CW (2016) Svd based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cyber 7:1225–1239. https://doi.org/10.1007/s13042-015-0455-1
Bolourian Haghighi B, Taherinia AH, Mohajerzadeh AH (2019) Trlg: Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with optimized quality using lwt and ga. Inform Sci 486:204–230. https://doi.org/10.1016/j.ins.2019.02.055, https://www.sciencedirect.com/science/article/pii/S0020025519301707
Dadkhah S, Abd Manaf A, Hori Y, Ella Hassanien A, Sadeghi S (2014) An effective svd-based image tampering detection and self-recovery using active watermarking. Signal Process Image Commun 29(10):1197–1210. https://doi.org/10.1016/j.image.2014.09.001, www.sciencedirect.com/science/article/pii/S0923596514001313
Hosseini S, Mahdavi M (2021) Image content dependent semi-fragile watermarking with localized tamper detection. CoRR abs/2106.14150, https://arxiv.org/abs/2106.14150
Huang L, Kuang D, Long-Li C, Jian-Zhuang Y, Hua-Duan S, Yi-Zhou X (2022) A self-embedding secure fragile watermarking scheme with high quality recovery. J Vis Commun Image Represent 83(103):437. https://doi.org/10.1016/j.jvcir.2022.103437
Kundur D (2001) Watermarking with diversity: insights and implications. IEEE MultiMed 8(4):46–52. https://doi.org/10.1109/93.959102
Lee TY, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506.https://doi.org/10.1016/j.patcog.2008.05.003, www.sciencedirect.com/science/article/pii/S003132030800174X
Mahto DK, Singh A (2021a) Hybrid optimisation-based robust watermarking using denoising convolutional neural network. Soft Computi. https://doi.org/10.1007/s00500-022-07155-z
Mahto DK, Singh A (2021b) A survey of color image watermarking: state-of-the-art and research directions. Comput Electr Eng 93:107255. https://doi.org/10.1016/j.compeleceng.2021.107255
Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Vis Commun Image Represent 30:312–327. https://doi.org/10.1016/j.jvcir.2015.05.006, www.sciencedirect.com/science/article/pii/S104732031500084X
Qin C, Chang CC, Chen PY (2012) Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process 92(4):1137–1150. https://doi.org/10.1016/j.sigpro.2011.11.013, www.sciencedirect.com/science/article/pii/S0165168411003987
Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280–293. https://doi.org/10.1016/j.sigpro.2017.03.033, www.sciencedirect.com/science/article/pii/S0165168417301251
Singh D, Singh SK (2016) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J Vis Commun Image Represent 38:775–789. https://doi.org/10.1016/j.jvcir.2016.04.023, www.sciencedirect.com/science/article/pii/S1047320316300566
Singh D, Singh SK (2017a) DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimed Tools Appl 76(1):953–977
Singh D, Singh SK (2017b) Dwt-svd and dct based robust and blind watermarking scheme for copyright protection. Multimed Tools Appl 76(11):13001–13024. https://doi.org/10.1007/s11042-016-3706-6
Singh D, Singh SK (2019) Block truncation coding based effective watermarking scheme for image authentication with recovery capability. Multimed Tools Appl 78:4197–4215
Singh D, Shivani S, Agarwal S (2013a) Quantization-based fragile watermarking using block-wise authentication and pixel-wise recovery scheme for tampered image. Int J Image Graph 13(02):1340002, https://doi.org/10.1142/S0219467813400020, http://www.worldscientific.com/doi/abs/10.1142/S0219467813400020
Singh D, Shivani S, Agarwal S (2013b) Self-embedding pixel wise fragile watermarking scheme for image authentication. Intelligent interactive technologies and multimedia. Springer, Berlin, pp 111–122
Sreenivas K, Kamakshiprasad V (2017) Improved image tamper localisation using chaotic maps and self-recovery. J Vis Commun Image Represent 49:164–176. https://doi.org/10.1016/j.jvcir.2017.09.001, www.sciencedirect.com/science/article/pii/S1047320317301761
Tai WL, Liao ZJ (2018) Image self-recovery with watermark self-embedding. Signal Process Image Commun 65:11–25. https://doi.org/10.1016/j.image.2018.03.011, www.sciencedirect.com/science/article/pii/S0923596518302509
Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28(3):301–308. https://doi.org/10.1016/j.image.2012.12.003
USC-SIPI (1977) Usc-sipi image database website. http://sipi.usc.edu/database/database.php?volume=misc
Yuan X, Li X, Liu T (2021) Gauss-jordan elimination-based image tampering detection and self-recovery. Signal Process Image Commun 90(116):038. https://doi.org/10.1016/j.image.2020.116038, www.sciencedirect.com/science/article/pii/S0923596520301855
Yu M, Wang J, Jiang G, Peng Z, Shao F, Luo T (2015) New fragile watermarking method for stereo image authentication with localization and recovery. AEU Int J Electron Commun 69(1):361–370. https://doi.org/10.1016/j.aeue.2014.10.006, www.sciencedirect.com/science/article/pii/S1434841114002878
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Singh, D., Udmale, S.S. & Singh, S.K. Integer wavelet transform based an effective fragile watermarking scheme for exact authentication and restoration. J Ambient Intell Human Comput 14, 4841–4852 (2023). https://doi.org/10.1007/s12652-022-04369-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-022-04369-9