Skip to main content
Log in

Commutative fragile zero-watermarking and encryption for image integrity protection

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With the increasing demands of privacy protection and integrity protection of digital images, attention has been drawn to the commutativity of watermarking and encryption. In some of the existing works, watermarking and image encryption are commutative, but watermark detection and image decryption are not commutative. Meanwhile, in some other schemes, watermark detection and image decryption are commutative, but the order of watermarking and image encryption is fixed. The existing schemes cannot meet the requirement of commutativity. Therefore, we propose a novel commutative zero-watermarking and encryption scheme, in which the commutativity is equipped in both the phases of watermarking and image encryption and the phases of watermark detection and image decryption. The proposed scheme is fragile, and the zero-watermarking will not cause any modification of the image. Experiments show that the proposed scheme is effective and feasible. The illegal tampered area of the zero-watermarked image can be accurately detected and located.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Bravo-Solorio S, Calderon F, Li CT, Nandi AK (2018) Fast fragile watermark embedding and iterative mechanism with high self-restoration performance. Digital Signal Processing 73:83–92

    Article  MathSciNet  Google Scholar 

  2. Cancellaro M, Battisti F, Carli M, Boato G, De Natale FGB, Neri A (2011) A commutative digital image watermarking and encryption method in the tree structuredHaar transform domain. Signal Process Image Commun 26(1):1–12

    Article  Google Scholar 

  3. Fan M, Wang H (2018) An enhanced fragile watermarking scheme to digital image protection and self-recovery. Signal Process Image Commun 66:19–29

    Article  Google Scholar 

  4. Hua Z, Zhou Y, Pun CM, Chen P (2015) 2D Sine Logistic modulation map for image encryption. Inf Sci 297:80–94

    Article  Google Scholar 

  5. Jiang L, Xu Z, Xu Y (2014) Commutative encryption and watermarking based on orthogonal decomposition. Multimed Tools Appl 70(3):1617–1635

    Article  Google Scholar 

  6. Khan A, Husain SA (2013) A fragile zero watermarking scheme to detect and characterize malicious modifications in database relations. Sci World J 2013:796726

    Google Scholar 

  7. Lian S (2009) Quasi-commutative watermarking and encryption for secure media content distribution. Multimed Tools Appl 43(1):91–107

    Article  MathSciNet  Google Scholar 

  8. Liu S, Hennelly BM, Guo C, Sheridan JT (2015) Robustness of double random phase encoding spread-space spread-spectrum watermarking technique. Signal Process 109(43):345–361

    Article  Google Scholar 

  9. Liu Y, Tian S, Hu W, Xing C (2012) Design and statistical analysis of a new chaotic block cipher for wireless sensor networks. Commun Nonlinear Sci Numer Simul 17(8):3267–3278

    Article  MathSciNet  Google Scholar 

  10. Liu X, Zhao R, Li F, Liao S, Ding Y, Zou B (2017) Novel robust zero-watermarking scheme for digital rights management of 3D videos. Signal Process Image Commun 54:140–151

    Article  Google Scholar 

  11. Liu Y, Zhu Y, Xin G (2015) A zero-watermarking algorithm based on merging features of sentences for chinese text. J Chin Inst Eng 38(3):391–398

    Article  Google Scholar 

  12. Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption. IEEE Transactions on Information Forensics and Security 8(3):553–562

    Article  Google Scholar 

  13. Mondal B, Kumar P, Singh S (2018) A chaotic permutation and diffusion based image encryption algorithm for secure communications. Multimed Tools Appl 77(23):31177–31198

    Article  Google Scholar 

  14. Nazari M, Sharif A, Mollaeefar M (2017) An improved method for digital image fragile watermarking based on chaotic maps. Multimed Tools Appl 76(15):16107–16123

    Article  Google Scholar 

  15. Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280–293

    Article  Google Scholar 

  16. Savelonas MA, Chountasis S (2010) Noise-resistant watermarking in the fractional fourier domain utilizing moment-based image representation. Signal Process 90(8):2521–2528

    Article  MATH  Google Scholar 

  17. Simitopoulos D, Zissis N, Georgiadis P, Emmanouilidis V, Strintzis MG (2003) Encryption and watermarking for the secure distribution of copyrighted MPEG video on DVD. Multimedia Systems 9(3):217–227

    Article  Google Scholar 

  18. Subramanyam A, Emmanuel S, Kankanhalli MS (2012) Robust watermarking of compressed and encrypted JPEG2000 images. IEEE Transactions on Multimedia 14(3):703–716

    Article  Google Scholar 

  19. Tang X, Ma Z, Niu X, Yang Y (2015) Compressive sensing-based audio semi-fragile zero-watermarking algorithm. Chin J Electron 24(3):492–497

    Article  Google Scholar 

  20. Thanh TM, Tanaka K (2017) An image zero-watermarking algorithm based on the encryption of visual map feature with watermark information. Multimed Tools Appl 76(11):13455–13471

    Article  Google Scholar 

  21. Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18

    Article  Google Scholar 

  22. Wang CP, Wang XY, Chen XJ, Zhang C (2017) Robust zero-watermarking algorithm based on polar complex exponential transform and logistic mapping. Multimed Tools Appl 76(24):26355–26376

    Article  Google Scholar 

  23. Wang C, Wang X, Xia Z, Zhang C (2019) Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm. Inf Sci 470:109–120

    Article  Google Scholar 

  24. Xiang L, Li Y, Hao W, Yang P, Shen X (2018) Reversible natural language watermarking using synonym substitution and arithmetic coding. Computers, Materials and Continua (CMC) 55(3):541–559

    Google Scholar 

  25. Yang C, Luo X, Lu J, Liu F (2018) Extracting hidden messages of MLSB steganography based on optimal stego subset. Science China Inf Sci 61(11):119103

    Article  Google Scholar 

  26. Yu Y, Lei M, Liu X, Qu Z, Wang C (2016) Novel zero-watermarking scheme based on DWT-DCT. China Communications 13(7):122–126

    Article  Google Scholar 

  27. Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Transactions on Information Forensics and Security 7(2):826–832

    Article  Google Scholar 

  28. Zhang X (2013) Commutative reversible data hiding and encryption. Security and Communication Networks 6(11):1396–1403

    Article  Google Scholar 

Download references

Acknowledgements

The work was funded by the National Natural Science Foundation of China (Grant Nos. 61602158, 61572089, 61502399, 61772176), the Natural Science Foundation of Chongqing Science and Technology Commission (Grant No. cstc2017jcyjBX0008), the Guangxi Key Laboratory of Trusted Software, the Science and Technology Research Project of Henan Province (182102210374), the Science Foundation for the Excellent Youth Scholars of Henan Normal University (YQ201607) and the Chongqing Postgraduate Education Reform Project (Grant No. yjg183018).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Di Xiao.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, M., Xiao, D., Zhu, Y. et al. Commutative fragile zero-watermarking and encryption for image integrity protection. Multimed Tools Appl 78, 22727–22742 (2019). https://doi.org/10.1007/s11042-019-7560-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-7560-1

Keywords

Navigation