Skip to main content
Log in

Block Truncation Coding based effective watermarking scheme for image authentication with recovery capability

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Due to the advancement of photo-editing software, powerful computers and high resolution capturing devices, it has become tough to prevent the digital image from tampering. So, in these days just by looking a digital image we cannot say whether it is a genuine or not. This is why digital image authentication, as well as restoration, has become the essential issues, especially when it is utilized in medical science, evidence of court, and forensic science. This paper proposes an effective self-embedding fragile watermarking technique for the digital image authentication as well as recovery. The watermark is generated by quantization, and block truncation coding (BTC) of each 2 × 2 non-overlapping block and embedded in three least significant bits (LSBs) of the corresponding mapped block. The recovery bits are derived from most significant bits (MSBs) of the host image, and the authentication bits are derived from recovery bits, the spatial location of pixels and watermark keys. Even if tempering rate is 50%, the reconstruction of tampered image is achieved with high peak signal-to-noise ratio (PSNR) and normalized correlation coefficient (NCC). The experimental results demonstrate that the proposed scheme not only outperforms high-quality recovery fidelity but also negotiate the blocking artifacts additionally it improves the accuracy of tamper localization due to the use of very small size blocks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

We’re sorry, something doesn't seem to be working properly.

Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Bhatnagar G, Wu QJ, Raman B (2013) A new aspect in robust digital watermarking. Multimedia Tools Appl 66(2):179–200

    Article  Google Scholar 

  2. Chang CC, Lin CY, Fan YH (2008) Lossless data hiding for color images based on block truncation coding. Pattern Recogn 41(7):2347–2357

    Article  Google Scholar 

  3. Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan Kaufmann

  4. Delp EJ, Mitchell OR (1979) Image compression using block truncation coding. IEEE Trans Commun 27(9):1335–1342

    Article  Google Scholar 

  5. Dhara BC, Chanda B (2004) Block truncation coding using pattern fitting. Pattern Recogn 37(11):2131–2139

    Article  Google Scholar 

  6. Elshazly EH, Faragallah OS, Abbas AM, Ashour MA, El-Rabaie E-SM, Kazemian H, Alshebeili SA, Abd El-Samie FE, El-sayed HS (2015) Robust and secure fractional wavelet image watermarking. SIViP 9(1):89–98. ISSN: 1863-1711. https://doi.org/10.1007/s11760-014-0684-x

  7. Franti P, Nevalainen O (1995) Block truncation coding with entropy coding. IEEE Trans Commun 43(2/3/4):1677–1685

    Article  Google Scholar 

  8. Hartung F, Kutter M (1999) Multimedia watermarking techniques. Proc IEEE 87(7):1079–1107

    Article  Google Scholar 

  9. He HJ, Zhang JS, Chen F (2009) Adjacent-block based statistical detection method for self-embedding watermarking techniques. Signal Process 89(8):1557–1566

    Article  Google Scholar 

  10. Korus P, Dziech A (2013) Efficient method for content reconstruction with self-embedding. IEEE Trans Image Process 22(3):1134–1147

    Article  MathSciNet  Google Scholar 

  11. Lee TY, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506

    Article  MathSciNet  Google Scholar 

  12. Lema M, Mitchell OR (1984) Absolute moment block truncation coding and its application to color images. IEEE Trans Commun 32(10):1148–1157

    Article  Google Scholar 

  13. Nasir I, Weng Y, Jiang J, Ipson S (2010) Multiple spatial watermarking technique in color images. SIViP 4(2):145–154

    Article  Google Scholar 

  14. Patra JC, Phua JE, Bornand C (2010) A novel dct domain crt-based watermarking scheme for image authentication surviving jpeg compression. Digital Signal Process 20(6):1597–1611

    Article  Google Scholar 

  15. Peng F, Guo RS, Li CT, Long M (2010) A semi-fragile watermarking algorithm for authenticating 2d cad engineering graphics based on log-polar transformation. Comput Aided Des 42(12):1207–1216

    Article  Google Scholar 

  16. Preda RO (2013) Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain. Measurement 46(1):367–373

    Article  MathSciNet  Google Scholar 

  17. Qi X, Xin X (2011) A quantization-based semi-fragile watermarking scheme for image content authentication. J Vis Commun Image Represent 22(2):187–200

    Article  Google Scholar 

  18. Qian Z, Feng G, Zhang X, Wang S (2011) Image self-embedding with high-quality restoration capability. Digital Signal Process 21(2):278–286

    Article  Google Scholar 

  19. Singh D, Singh SK (2016) Dwt-svd and dct based robust and blind watermarking scheme for copyright protection. In: Multimedia Tools and Applications

  20. Singh D, Singh SK (2016) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J Vis Commun Image Represent 38:775–789. https://doi.org/10.1016/j.jvcir.2016.04.023. http://www.sciencedirect.com/science/article/pii/S1047320316300566

    Article  Google Scholar 

  21. Singh D, Singh SK (2017) Dct based efficient fragile watermarking scheme for image authentication and restoration. Multimedia Tools Appl 76(1):953–977. https://doi.org/10.1007/s11042-015-3010-x

    Article  Google Scholar 

  22. Singh D, Shivani S, Agarwal S (2013) Quantization-based fragile watermarking using block-wise authentication and pixel-wise recovery scheme for tampered image. IJIG 13(02):1340002(01)–1340002(11)

  23. Singh D, Shivani S, Agarwal S (2013) Self-embedding pixel wise fragile watermarking scheme for image authentication. In: Intelligent interactive technologies and multimedia, pp 111–122. Springer, Berlin, Heidelberg, New York

  24. Song C, Sudirman S, Merabti M (2009) Recent advances and classification of watermarking techniques in digital images Proceedings of post graduate network symposium

  25. Song C, Sudirman S, Merabti M (2012) A robust region-adaptive dual image watermarking technique. J Vis Commun Image Represent. 23(3):549–568

    Article  Google Scholar 

  26. Walia E, Suneja A (2014) A robust watermark authentication technique based on webers descriptor. SIViP 8(5):859–872

    Article  Google Scholar 

  27. Wang S, Zheng D, Zhao J, Tam WJ, Speranza F (2014) Adaptive watermarking and tree structure based image quality estimation. IEEE Trans Multimedia 16(2):311–325

    Article  Google Scholar 

  28. Wu Y, Coll DC (1991) Btc-vq-dct hybrid coding of digital images. IEEE Trans Commun 39(9):1283–1287

    Article  Google Scholar 

  29. Wu M, Liu B (1998) Watermarking for image authentication ICIP (2), pp 437–441

  30. Zhang X, Wang S (2008) Fragile watermarking with error-free restoration capability. IEEE Trans Multimedia 10(8):1490–1499

    Article  Google Scholar 

  31. Zhang X, Wang S (2009) Fragile watermarking scheme using a hierarchical mechanism. Signal Process 89(4):675–679

    Article  Google Scholar 

  32. Zhang X, Qian Z, Ren Y, Feng G (2011) Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans Inf Forensics Secur 6(4):1223–1232

    Article  Google Scholar 

  33. Zhang X, Wang S, Qian Z, Feng G (2011) Reference sharing mechanism for watermark self-embedding. IEEE Trans Image Process 20(2):485–495

    Article  MathSciNet  Google Scholar 

  34. Zhang X, Wang S, Qian Z, Feng G (2011) Self-embedding watermark with flexible restoration quality. Multimedia Tools Appl 54(2):385–395

    Article  Google Scholar 

  35. Zhu X, Ho AT, Marziliano P (2007) A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. Signal Process Image Commun 22(5):515–528

    Article  Google Scholar 

Download references

Acknowledgements

The authors would like to thank Dr. Sushila Maheshkar, Department of Computer Science & Engineering, Indian Institute of Technology (ISM) Dhanbad - 826004, Jharkhand, India, for fruitful discussions and suggestions. The authors would also thank the anonymous reviewers whose valuable suggestion resulted in improving the quality of this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Durgesh Singh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, D., Singh, S.K. Block Truncation Coding based effective watermarking scheme for image authentication with recovery capability. Multimed Tools Appl 78, 4197–4215 (2019). https://doi.org/10.1007/s11042-017-5454-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-5454-7

Keywords

Navigation