Abstract
A self-embedding fragile watermarking scheme is proposed in this paper, which is based on Discrete Cosine Transform and fractal compression coding. To overcome the high computational complexity of fractal coding, a fast coding method is also presented that improves the efficiency of fractal block coding in the watermarking procedure. In our algorithm, three kinds of watermarks are generated for image authentication and recovery, which is based on an interleaved and overlapped 8 ×8 image block structure. This makes our method obtain an authentication granularity of 4 ×4 approximately. At the same time, we take advantage of two levels of mapping to select mapping block for every image block. Three versions of recovery watermarks for each block are embedded in different quadrants, which provides another two chances for block recovery in case one is destroyed. Experimental results demonstrate that the proposed scheme not only outperforms conventional self-embedding fragile watermarking algorithms in tamper recovery, but also improves the security against the various counterfeiting attacks.
Similar content being viewed by others
References
Bhatnagar G, Wu QMJ, Raman B (2013) A new aspect in robust digital watermarking. Multimed Tools Appl 66(2):179–200
Bransley M (1988) Fractals everywhere. Academic Press, New York
Celik M, Sharma G, Saber E, Tekalp AM (2001) A hierarchical image authentication watermarking with improved localization and security. IEEE Int Conf Image Process 2:502–505
Celik M, Sharma G, Saber E, Tekalp AM (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11(6):585–595
Chen F, He HJ, Tai HM et al (2012) Chaos-based self-embedding fragile watermarking with flexible watermark payload. Multimed Tools Appl. doi:10.1007/s11042-012-1332-5
Coppersmith D, Mintzer F, Tresser C et al (1999) Fragile imperceptible digital watermark with privacy control. In: Proceedings SPIE, security and watermarking of multimedia contents, pp 79–84
Fridrich J, Goljan M, Memon N (2002) Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. J Electron Imaging 11(4):262–274
Hassine A, Rhouma R, Belghith S (2009) A novel method for tamper resistant to vector quantization attack detection and recovery. In: IEEE 6th International multi-conference on systems, signals and devices, pp 1–6
He HJ, Zhang JS, Chen F (2009) Adjacent-block based statistical detection method for self-embedding watermarking techniques. Signal Process 89(8):1557–1566
He HJ, Zhang JS, Tai HM (2011) A neighborhood-characteristic-based detection model for statistical fragile watermarking with localization. Multimed Tools Appl 52(2–3):307–324
Hernandez-Avalos PA, Feregrino-Uribe C, Cumplido R (2012) Watermarking using similarities based on fractal codification. Digit Signal Process 22(2):324–336
Holliman M, Memon N (2000) Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans Image Process 9(3):432–441
Jacquin AE (1992) Image coding based on a fractal theory of iterated contractive image transformation. IEEE Trans Image Process 1(1):18–30
Kiani S, Moghaddam ME (2011) A multi-purpose digital image watermarking using fractal block coding. J Syst Soft 84(9):1550–1562
Korus P, Dziech A (2013) Efficient method for content reconstruction with self-embedding. IEEE Trans Image Process 22(3):1134–1147
Lee TY, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506
Li C, Liu L (2008) An image authentication scheme with localization and recovery. In: IEEE congress on image and signal processing, CISP, pp 669–673
Lin CY, Chang SF (2001) A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE T Circ Syst Vid 11(2):153–168
Lin PL, Hsieh CK, Huang PW (2005) A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 38(12):2519–2529
Lin SD, Kuo YC, Huang YH (2006) An image watermarking scheme with tamper detection and recovery. In: IEEE First International conference on innovative computing, information and control, pp 74–77
Liu YJ, Tong SC, Chen CLP (2013) Adaptive fuzzy control via observer design for uncertain nonlinear systems with unmodeled dynamics. IEEE Trans Fuzzy Syst 21(2):275–288
Liu YJ, Wang W (2007) Adaptive fuzzy control for a class of uncertain nonaffine nonlinear systems. Inf Sci 177(18):3901–3917
Liu YJ, Wang W, Tong SC, Liu YS (2010) Robust adaptive tracking control for nonlinear systems based on bounds of fuzzy approximation parameters. IEEE T Syst Man Cy A 40(1):170–184
Qian Z, Feng G (2010) Inpainting assisted self recovery with decreased embedding data. IEEE Signal Proc Lett 17(11):929–932
Qian Z, Feng G, Zhang X, Wang S (2011) Image self-embedding with high-quality restoration capability. Digit Signal Process 21(2):278–286
Qin C, Chang CC, Chen PY (2012) Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process 92(4):1137–1150
Wang XY, Zhang DD, Guo X (2013) A novel image recovery method based on discrete cosine transform and matched blocks. Nonlinear Dyn 73(3):1945–1954
Wong PW (1998) A public key watermark for image verification and authentication. In: IEEE International conference on image processing 1998, 455–459
Wong PW, Memon N (2001) Secret and Public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10(10):1593–1601
Yang L, Ni RR, Zhao Y (2012) Segmentation-based image authentication and recovery scheme using reference sharing mechanism. In: International conference on industrial control and electronics engineering, pp 863–866
Yoon JW, Kim H (2010) An image encryption scheme with a pseudorandom permutation based on chaotic maps. Commun Nonlinear Sci 15(12):3998–4006
Zhang XP, Qian ZX et al (2011) Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE T Inf Foren Sec 6(4):1223–1232
Zhang XP, Wang SZ, Qian ZX et al (2011) Self-embedding watermark with flexible restoration quality. Multimed Tools Appl 54(2):385–395
Zhang XP, Wang SZ, Qian ZX et al (2011) Reference sharing mechanism for watermark self-embedding. IEEE Trans Image Process 20(2):485–495
Zhao X, Ho ATS, Treharne H et al (2007) A novel semi-fragile image watermarking, authentication and self-restoration technique using the slant transform. In: IEEE third International Conference on IIHMSP, pp 283–286
Acknowledgments
This work is supported by the National Natural Science Foundation of China (Grant No: 61100239 and 60803088), the Ph.D. Programs Foundation of Ministry of Education of China (Grant No: 20100201110063).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhang, X., Xiao, Y. & Zhao, Z. Self-embedding fragile watermarking based on DCT and fast fractal coding. Multimed Tools Appl 74, 5767–5786 (2015). https://doi.org/10.1007/s11042-014-1882-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-014-1882-9