Skip to main content
Log in

A secure image authentication scheme based on dual fragile watermark

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Both security and tamper localization are essential for fragile watermarking techniques. Embedded fragile watermark should be sensitive enough to cover images. But high sensitivity maybe bring inaccurate tamper localization, and both high sensitivity and accurate tamper localization seem contradictory. This paper proposes a watermark scheme based on dual fragile watermark: diffusion watermark and authentication watermark. The diffusion watermark is determined by a cover image, a secret key and two random numbers via nonlinear transformations, and the authentication watermark is generated from the cover image, the diffusion watermark and another secret key. The diffusion watermark and the authentication watermark have high sensitivity to cover images and at meantime the authentication watermark can verify the integrity of images and localize tampered area. The scrambled authentication watermark and the diffusion watermark are arbitrarily embedded into the two lowest significant bit layers of the cover image through a random sequence controlled by a secret key. The design aims to enhance the security of fragile watermarking, and the statistical results and security analysis show that this scheme can resist chosen cover-image attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Barreto PSLM, Kim HY, Rijmen V (2002) Toward a secure public-key blockwise fragile authentication watermarking. In: International conference on image processing, 2001. Proceedings, vol 2, pp 494–497

  2. Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: a survey. Digit Investig 10(3):226–245

    Article  Google Scholar 

  3. Botta M, Cavagnino D, Pomponiu V (2015) A successful attack and revision of a chaotic system based fragile watermarking scheme for image tamper detection. AEUE - Int J Electron Commun 69(1):242–245

    Article  Google Scholar 

  4. Caragata D, Mucarquer JA, Koscina M, Assad SE (2016) Cryptanalysis of an improved fragile watermarking scheme. AEUE - Int J Electron Commun 70(6):777–785

    Article  Google Scholar 

  5. Chaluvadi SB, Prasad MVNK (2010) Efficient image tamper detection and recovery technique using dual watermark. In: 2009 world congress on nature & biologically inspired computing, pp 993–998

  6. Chang CC, Hu YS, Lu TC (2006) A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn Lett 27(5):439–446

    Article  Google Scholar 

  7. Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos Solitons Fractals 21(3):749–761

    Article  MathSciNet  MATH  Google Scholar 

  8. Chen WC, Wang MS (2009) A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Syst Appl 36(2):1300–1307

    Article  Google Scholar 

  9. Di X, Chang Y, Tao X, Bai S (2017) A watermarking algorithm in encrypted image based on compressive sensing with high quality image reconstruction and watermark performance. Multimed Tools & Appl 76(7):9265–9296

    Article  Google Scholar 

  10. Ding W, Yi X, Wang Y (2018) Image authentication and tamper localization based on relative difference between dct coefficient and its estimated value. Multimed Tools Appl (4): 1–24

  11. Doyoddorj M, Rhee KH (2012) Design and analysis of a fragile watermarking scheme based on block-mapping

  12. Enayatifar R, Abdullah AH, Isnin IF, Altameem A, Lee M (2017) Image encryption using a synchronous permutation-diffusion technique. Optics & Lasers in Engineering 90:146–154

    Article  Google Scholar 

  13. Fridrich J (2002) Security of fragile authentication watermarks with localization. Spie Proceedings 4675:691–700

    Article  Google Scholar 

  14. Fridrich J, Goljan M, Baldoza AC (2000) New fragile authentication watermark for images. International Conference on Image Processing, 2000. Proceedings 1, 446–449

  15. Gul E, Ozturk S (2019) A novel hash function based fragile watermarking method for image integrity. Multimed Tools Appl (10): 1–18

  16. Haouzia A, Noumeir R (2008) Methods for image authentication: a survey. Kluwer Academic Publishers

  17. He HJ, Chen F, Tai HM, Kalker T, Zhang J (2012) Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Transactions on Information Forensics & Security 7(1):185–196

    Article  Google Scholar 

  18. Holliman M, Memon N (2000) Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans Image Process 9(3):432–441

    Article  Google Scholar 

  19. Hsu CS, Tu SF (2016) Image tamper detection and recovery using adaptive embedding rules. Measurement 88:287–296

    Article  Google Scholar 

  20. Hua Z, Zhou Y (2017) Design of image cipher using block-based scrambling and image filtering. Inf Sci 396:97–113

    Article  MATH  Google Scholar 

  21. Lazarov N, Ilcheva Z (2016) A fragile watermarking algorithm for image tamper detection based on chaotic maps. In: 2016 IEEE 8th international conference on intelligent systems, pp. 723–728

  22. Lee TY, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506

    Article  MathSciNet  MATH  Google Scholar 

  23. Lin ET, Podilchuk CI, Delp EJ (2000) Detection of image alterations using semi-fragile watermarks. Proc Spie 3971:152–163

    Article  Google Scholar 

  24. Lin PL, Hsieh CK, Huang PW (2005) A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 38(12):2519–2529

    Article  Google Scholar 

  25. Lin T, Wang X, Wang X (2013) Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme. AEUE - Int J Electron Commun 67 (6):540–547

    Article  Google Scholar 

  26. Lisha M, Lei C, Shihong W (2019) Security analysis of a reversible watermarking algorithm for encrypted images in wavelet domain. Multimed Tools Appl 78:9827–9843

    Article  Google Scholar 

  27. Liu SH, Yao HX, Gao W, Liu YL (2007) An image fragile watermark scheme based on chaotic image pattern and pixel-pairs. Appl Math Comput 185(2):869–882

    MATH  Google Scholar 

  28. Liu XL, Lin CC, Chang CC, Yuan SM (2016) A survey of fragile watermarking-based image authentication techniques. Journal of Information Hiding and Multimedia Signal Processing 7:1282–1292

    Google Scholar 

  29. Lo CC, Hu YC (2014) A novel reversible image authentication scheme for digital images. Signal Process 98(5):174–185

    Article  Google Scholar 

  30. Nguyen TS, Chang CC, Yang XQ (2016) A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. AEUE - Int J Electronics Commun 70(8):1055–1061

    Article  Google Scholar 

  31. Pan TG, Li DY (2011) A new algorithm of image encryption based on 3d arnold cat. Advanced Engineering Forum 1:183–187

    Article  Google Scholar 

  32. Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding-a survey. Proc IEEE 87(7):1062–1078

    Article  Google Scholar 

  33. Phan CW (2008) Tampering with a watermarking-based image authentication scheme. Elsevier Science Inc

  34. Ping WW (1998) A watermark for image integrity and ownership verification. In: Pics 1998: is&t’s 1998 image processing, image quality, image capture, systems conference, Portland, Oregon, USA, May, pp 374–379

  35. Qin C, Ji P, Wang J, Chang CC (2017) Fragile image watermarking scheme based on vq index sharing and self-embedding. Multimed Tools Appl 76(2):2267–2287

    Article  Google Scholar 

  36. Qin C, Ping J, Zhang X, Jing D, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280–293

    Article  Google Scholar 

  37. Qin C, Wang H, Zhang X, Sun X (2016) Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode. Inf Sci 373:233–250

    Article  Google Scholar 

  38. Rawat S, Raman B (2011) A chaotic system based fragile watermarking scheme for image tamper detection. AEUE - Int J Electron Commun 65(10):840–847

    Article  Google Scholar 

  39. Schyndel RGV, Tirkel AZ, Osborne CF (2002) A digital watermark. In: IEEE international conference image processing, 1994. Proceedings. ICIP-94, vol 2, pp 86–90

  40. Singh D, Singh SK (2015) Dct based efficient fragile watermarking scheme for image authentication and restoration. Multimed Tools Appl 76(1):1–25

    MathSciNet  Google Scholar 

  41. Sreenivas K, Prasad VK (2017) Fragile watermarking schemes for image authentication: a survey. Int J Machine Learning and Cybernetics 9(7):1193–1218

    Article  Google Scholar 

  42. Trivedy S, Pal AK (2017) A logistic map-based fragile watermarking scheme of digital images with tamper detection. Iranian Journal of Science & Technology Transactions of Electrical Engineering 41(2):103–113

    Article  Google Scholar 

  43. Xinhui G, Feng YXZSW Security analysis of a self-embedding fragile image watermark scheme. arXiv:1812.11735v2

  44. Yeung MM, Mintzer F (1997) An invisible watermarking technique for image verification. In: International conference on image processing, 1997. Proceedings, vol 2, pp 680–683

  45. Zhang X, Qian Z, Ren Y, Feng G (2011) Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans Inform Forensics & Secur 6(4):1223–1232

    Article  Google Scholar 

Download references

Acknowledgments

Thank anonymous reviewers for their comments on our work and constructive suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shihong Wang.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gong, X., Chen, L., Yu, F. et al. A secure image authentication scheme based on dual fragile watermark. Multimed Tools Appl 79, 18071–18088 (2020). https://doi.org/10.1007/s11042-019-08594-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08594-x

Keywords

Navigation