Skip to main content
Log in

Self-embedding watermarking scheme against JPEG compression with superior imperceptibility

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

To improve the imperceptibility, security and tamper detection performance, a self-embedding watermarking scheme against JPEG compression is proposed in this work. The recovery watermark of all blocks in the host image, which consists of 6-bit DC-code and 5-bit AC-code and simultaneously used to both tamper detection and tamper recovery, is recombined based on the secret key and embedded in the quantized DCT coefficients. This strategy not only enhances the ability against the known forgery attacks due to introducing multi-blocks independency, but also improves the tamper detection performance by designing the tamper detection method based on the multi-neighbor characteristic and multi-threshold optimization. To achieve the better imperceptibility, the 7 middle frequency DCT coefficients of an 8 × 8 block are chosen to hide the 11-bit watermark by adopting the weight-function modulo based embedding method. Robustness against JPEG compression is enhanced by setting the quantization step of the chosen DCT coefficients according to the standard JPEG quantization table and an adjustable scaling factor which balances the robustness with imperceptibility. We also discuss the effects of different scaling factors on the imperceptibility and robustness in terms of peak signal to noise ratio (PSNR) and survival quality factor (SQF) of watermarked image generated by a given scaling factor. Experimental results demonstrate that the proposed method outperforms conventional semi-fragile restorable watermarking schemes in imperceptibility, tamper detection and tamper recovery in various forgery attacks especially for JPEG compression with low QFs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20

Similar content being viewed by others

References

  1. Didi R, Horng SJ, Fan PZ, Wang X, Khan MK (2012) An efficient copyright protection scheme for e-government document images. IEEE Multimed 19(3):62–73

    Article  Google Scholar 

  2. Fridrich J, Goljan M (1999) Images with self-correcting capabilities. Proc ICIP’99, Kobe, Japan

  3. Fridrich J, Goljan M, Memon M (2002) Cryptanalysis of the yeung-mintzer fragile watermarking technique. J Electron Imag 11(4):262–274

    Google Scholar 

  4. Han S, Chu C (2010) Content-based image authentication current status, issues, and challenges. Int J Inf Secur 9:19–32

    Article  Google Scholar 

  5. Haouzia A, Noumeir R (2008) Methods for image authentication: a survey, multimedia tools and applications. 39:1–46

  6. He HJ, Chen F, Tai HM, Ton K, Zhang J (2012) Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Trans Inform Forensics Sec 7(1):185–196

    Article  Google Scholar 

  7. He HJ, Zhang J, Tai HM (2006) A wavelet-based fragile watermarkingscheme for secure image authentication. Proc 5th Int Workshop Digit Watermarking, Jeju Island, Korea

  8. Horng SJ, Didi R, Fan PZ, Wang X, Muhammad KK (2014) An adaptive watermarking scheme for e-government document images. Multimed Tools Appl 72(3):3085–3103

    Article  Google Scholar 

  9. Huang HC, Pan JS, Huang YH, Wang FH, Huang KC(2007) Progressive watermarking techniques using genetic algorithms, circuits, systems, and signal processing. 26(5), 671–687

  10. Huo YR, He HJ, Chen F (2013) A restorable semi-fragile watermarking combined DCT with interpolation. IWDW, LNCS 8389:393–408

    Google Scholar 

  11. Huo YR, He HJ, Chen F (2014) A semi-fragile watermarking algorithm with two-stage detection. Multimed Tools Appl 72:123–149

    Article  Google Scholar 

  12. Korus P, Dziech A (2013) Efficient method for content reconstruction with self-embedding. IEEE Trans Image Process 22(3):1134–1147

    Article  MathSciNet  Google Scholar 

  13. Li J, Li X, Yang B, Sun X (2015) Segmentation-based images copy-move forgery detection scheme. IEEE Trans Inform Forensics Sec 10(3):507–518

    Article  Google Scholar 

  14. Lin WH, Horng SJ, Kao TW, Chen RJ, Chen YH, Lee CL, Tersno T (2009) Image copyright protection with forward error correction. Expert Syst Appl (SCI 1/64, 2596) 36(9):11888–11894

    Article  Google Scholar 

  15. Lin WH, Horng SJ, Kao TW, Fan PZ, Lee CL, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimed (SCI 12/86, 2288) 10(5):746–757

    Article  Google Scholar 

  16. Lin WH, Wang YR, Horng SJ, Kao TW, Pan Y (2009) A blind watermarking method using maximum wavelet coefficient quantization. Expert Syst Appl (SCI 1/64, 2596) 36(9):11509–11516, copyright protection

    Article  Google Scholar 

  17. Lin WH, Wang YR, Horng SJ (2009) A wavelet-tree-based watermarking method using distance vector of binary cluster. Expert Syst Appl (SCI 1/64, 2596) 36(6):9869–9878

    Article  Google Scholar 

  18. Luis RR, Manuel CH, Mariko NM, Hector PM, Brian K (2013) Watermarking-based image authentication with recovery capability using halftoning technique. Signal Process Image Commun 28:69–83

    Article  Google Scholar 

  19. Mendoza NJ, Kurkoski B, Nakano MM, Perez MM (2010) Halftoning-based self-embedding watermarking for image authentication and recovery. Proc 53rd IEEE Int Midwest Symp Circ Syst, Seattle, USA

  20. Pan JS, Hsin YC, Huang HC, Huang KC (2004) Robust image watermarking based on multiple description vector quantisation. Electron Lett 40(22):1409–1410

    Article  Google Scholar 

  21. Phadikar A, Maity SP, Mandal M (2012) Novel wavelet-based QIM data hiding technique for tamper detection and correctionof digital images. J Vis Commun Image R 23:454–466

    Article  Google Scholar 

  22. Preda RQ (2013) Semi-fragile watermarking for image authentuication with sensitive tamper localization in the wavelet domain. Measurement 46:367–373

    Article  Google Scholar 

  23. Qin C, Chang C, Chen KN (2013) Adaptive self-recovery for tampered images based on VQ indexing and inpainting. Signal Process 93(4):933–946

    Article  Google Scholar 

  24. Rafi U, Asifullah K, Aamir SM (2013) Dual-purpose semi-fragile watermark: authentication and recovery of digital images. Comput Electr Eng 39:2019–2030

    Article  Google Scholar 

  25. Rafiullah C, Asifullah K (2010) Digital image authentication and recovery: employing integer transform based information embedding and extraction. Inf Sci 180:4909–4928

    Article  MathSciNet  Google Scholar 

  26. Saxena A, Fernandes C (2013) DCT/DST-based transform coding for intra prediction in image/video coding. IEEE Trans Image Process 22(10):3974–3981

    Article  MathSciNet  Google Scholar 

  27. Sun HM, Weng CY, Wang SJ, Yang CH (2013) Data embedding in image-media using weight-function on modulo operations. ACM Trans Embed Comput Syst 12(2):1–12

    Article  Google Scholar 

  28. Wang H, Anthony TH, Zhao X (2011) A novel fast self-restoration semi-fragile watermarking algorithm for image content authentication resistant to JPEG compression. Proc 10th Int Workshop Digital-Forensics Watermarking, Atlantic City, USA 72–85

  29. Wang S, Miyauchi R, Unoki M, Kim NS (2015) Tampering detection scheme for speech signals using formant enhancement based watermarking. J Inform Hiding Multimed Sign Process 6(6):1264–1283

    Google Scholar 

  30. Xia Z, Wang X, Sun X, Liu Q, Xiong N (2014) Steganalysis of LSB matching using differences between nonadjacent pixels, Multimed Tools Appl 11 (Published online) doi: 10.1007/s11042-014-2381-8

  31. Xia ZH, Wang XH, Sun XM, Wang BW (2014) Steganalysis of least significant bit matching using multi-order differences. Sec Commun Netw 7(8):1283–1291

    Article  Google Scholar 

  32. Yan B, Wang YF, Song LY, Yang HM (2015) Power spectrum compliant QIM watermarking for autoregressive host signals. J Inform Hiding Multimed Sign Process 6(5):882–888

    Google Scholar 

  33. Zhang X, Qian Z, Ren Y, Feng G (2011) Watermarking with flexible self-recovery quality based oncompressive sensing and compositive reconstruction. IEEE Trans Inform Forensics Sec 6(4):1223–1232

    Article  Google Scholar 

  34. Zhang H, Wu B, Pengetal Q (2007) Digital image inpainting based on p-harmonic energy minimization. Chin J Elecron 16(3):525–530

    Google Scholar 

Download references

Acknowledgments

This work is supported in part by the National Natural Science Foundation of China (Grant No.61373180, 61461047), the Science and Technique Foundation of Tibet Autonomous Region (2012), the Science and Technology Innovation Talent Project of Sichuan Province (No.2014-058). Thanks authors of reference [18] for providing us the source codes.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fan Chen.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, F., He, H. & Huo, Y. Self-embedding watermarking scheme against JPEG compression with superior imperceptibility. Multimed Tools Appl 76, 9681–9712 (2017). https://doi.org/10.1007/s11042-016-3574-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3574-0

Keywords

Navigation