Skip to main content
Log in

Self-embedding fragile watermarking based on DCT and fast fractal coding

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A self-embedding fragile watermarking scheme is proposed in this paper, which is based on Discrete Cosine Transform and fractal compression coding. To overcome the high computational complexity of fractal coding, a fast coding method is also presented that improves the efficiency of fractal block coding in the watermarking procedure. In our algorithm, three kinds of watermarks are generated for image authentication and recovery, which is based on an interleaved and overlapped 8 ×8 image block structure. This makes our method obtain an authentication granularity of 4 ×4 approximately. At the same time, we take advantage of two levels of mapping to select mapping block for every image block. Three versions of recovery watermarks for each block are embedded in different quadrants, which provides another two chances for block recovery in case one is destroyed. Experimental results demonstrate that the proposed scheme not only outperforms conventional self-embedding fragile watermarking algorithms in tamper recovery, but also improves the security against the various counterfeiting attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Bhatnagar G, Wu QMJ, Raman B (2013) A new aspect in robust digital watermarking. Multimed Tools Appl 66(2):179–200

    Article  Google Scholar 

  2. Bransley M (1988) Fractals everywhere. Academic Press, New York

    Google Scholar 

  3. Celik M, Sharma G, Saber E, Tekalp AM (2001) A hierarchical image authentication watermarking with improved localization and security. IEEE Int Conf Image Process 2:502–505

    Google Scholar 

  4. Celik M, Sharma G, Saber E, Tekalp AM (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11(6):585–595

    Article  Google Scholar 

  5. Chen F, He HJ, Tai HM et al (2012) Chaos-based self-embedding fragile watermarking with flexible watermark payload. Multimed Tools Appl. doi:10.1007/s11042-012-1332-5

  6. Coppersmith D, Mintzer F, Tresser C et al (1999) Fragile imperceptible digital watermark with privacy control. In: Proceedings SPIE, security and watermarking of multimedia contents, pp 79–84

  7. Fridrich J, Goljan M, Memon N (2002) Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. J Electron Imaging 11(4):262–274

    Google Scholar 

  8. Hassine A, Rhouma R, Belghith S (2009) A novel method for tamper resistant to vector quantization attack detection and recovery. In: IEEE 6th International multi-conference on systems, signals and devices, pp 1–6

  9. He HJ, Zhang JS, Chen F (2009) Adjacent-block based statistical detection method for self-embedding watermarking techniques. Signal Process 89(8):1557–1566

    Article  MATH  Google Scholar 

  10. He HJ, Zhang JS, Tai HM (2011) A neighborhood-characteristic-based detection model for statistical fragile watermarking with localization. Multimed Tools Appl 52(2–3):307–324

    Article  Google Scholar 

  11. Hernandez-Avalos PA, Feregrino-Uribe C, Cumplido R (2012) Watermarking using similarities based on fractal codification. Digit Signal Process 22(2):324–336

    Article  MathSciNet  Google Scholar 

  12. Holliman M, Memon N (2000) Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans Image Process 9(3):432–441

    Article  Google Scholar 

  13. Jacquin AE (1992) Image coding based on a fractal theory of iterated contractive image transformation. IEEE Trans Image Process 1(1):18–30

    Article  Google Scholar 

  14. Kiani S, Moghaddam ME (2011) A multi-purpose digital image watermarking using fractal block coding. J Syst Soft 84(9):1550–1562

    Article  Google Scholar 

  15. Korus P, Dziech A (2013) Efficient method for content reconstruction with self-embedding. IEEE Trans Image Process 22(3):1134–1147

    Article  MathSciNet  Google Scholar 

  16. Lee TY, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506

    Article  MATH  Google Scholar 

  17. Li C, Liu L (2008) An image authentication scheme with localization and recovery. In: IEEE congress on image and signal processing, CISP, pp 669–673

  18. Lin CY, Chang SF (2001) A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE T Circ Syst Vid 11(2):153–168

    Article  MathSciNet  Google Scholar 

  19. Lin PL, Hsieh CK, Huang PW (2005) A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 38(12):2519–2529

    Article  Google Scholar 

  20. Lin SD, Kuo YC, Huang YH (2006) An image watermarking scheme with tamper detection and recovery. In: IEEE First International conference on innovative computing, information and control, pp 74–77

  21. Liu YJ, Tong SC, Chen CLP (2013) Adaptive fuzzy control via observer design for uncertain nonlinear systems with unmodeled dynamics. IEEE Trans Fuzzy Syst 21(2):275–288

    Article  Google Scholar 

  22. Liu YJ, Wang W (2007) Adaptive fuzzy control for a class of uncertain nonaffine nonlinear systems. Inf Sci 177(18):3901–3917

    Article  MATH  Google Scholar 

  23. Liu YJ, Wang W, Tong SC, Liu YS (2010) Robust adaptive tracking control for nonlinear systems based on bounds of fuzzy approximation parameters. IEEE T Syst Man Cy A 40(1):170–184

    Article  Google Scholar 

  24. Qian Z, Feng G (2010) Inpainting assisted self recovery with decreased embedding data. IEEE Signal Proc Lett 17(11):929–932

    Article  Google Scholar 

  25. Qian Z, Feng G, Zhang X, Wang S (2011) Image self-embedding with high-quality restoration capability. Digit Signal Process 21(2):278–286

    Article  MathSciNet  Google Scholar 

  26. Qin C, Chang CC, Chen PY (2012) Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process 92(4):1137–1150

    Article  Google Scholar 

  27. Wang XY, Zhang DD, Guo X (2013) A novel image recovery method based on discrete cosine transform and matched blocks. Nonlinear Dyn 73(3):1945–1954

    Article  MathSciNet  Google Scholar 

  28. Wong PW (1998) A public key watermark for image verification and authentication. In: IEEE International conference on image processing 1998, 455–459

  29. Wong PW, Memon N (2001) Secret and Public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10(10):1593–1601

    Article  MATH  Google Scholar 

  30. Yang L, Ni RR, Zhao Y (2012) Segmentation-based image authentication and recovery scheme using reference sharing mechanism. In: International conference on industrial control and electronics engineering, pp 863–866

  31. Yoon JW, Kim H (2010) An image encryption scheme with a pseudorandom permutation based on chaotic maps. Commun Nonlinear Sci 15(12):3998–4006

    Article  MATH  MathSciNet  Google Scholar 

  32. Zhang XP, Qian ZX et al (2011) Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE T Inf Foren Sec 6(4):1223–1232

    Article  MathSciNet  Google Scholar 

  33. Zhang XP, Wang SZ, Qian ZX et al (2011) Self-embedding watermark with flexible restoration quality. Multimed Tools Appl 54(2):385–395

    Article  MathSciNet  Google Scholar 

  34. Zhang XP, Wang SZ, Qian ZX et al (2011) Reference sharing mechanism for watermark self-embedding. IEEE Trans Image Process 20(2):485–495

    Article  MathSciNet  Google Scholar 

  35. Zhao X, Ho ATS, Treharne H et al (2007) A novel semi-fragile image watermarking, authentication and self-restoration technique using the slant transform. In: IEEE third International Conference on IIHMSP, pp 283–286

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (Grant No: 61100239 and 60803088), the Ph.D. Programs Foundation of Ministry of Education of China (Grant No: 20100201110063).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xuanping Zhang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhang, X., Xiao, Y. & Zhao, Z. Self-embedding fragile watermarking based on DCT and fast fractal coding. Multimed Tools Appl 74, 5767–5786 (2015). https://doi.org/10.1007/s11042-014-1882-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-1882-9

Keywords

Navigation