Skip to main content
Log in

Visual attention model based dual watermarking for simultaneous image copyright protection and authentication

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a visual attention model based dual watermarking scheme has been proposed for simultaneous image copyright protection and authentication. The suggested method simultaneously embeds two watermarks inside the host image. First of all, the robust watermark is embedded in the most visually salient region by Hessenberg factorization technique, which has proven to give better results in terms of imperceptibility and robustness. Subsequently, the second watermark acts as a fragile watermark for the purpose of tamper detection and localization. The fragile watermark is infused inside the image via fragile 8 Bit Plane Slicing, as we require for the watermark to be highly responsive to majority of geometric, and non-geometric impairments. The proposed scheme achieves an average Peak Signal to Noise Ratio and Structural SIMilarity Index of 46.88 dB and 0.9897 respectively. Experimental results depict that the projected scheme is extremely robust against most kinds of geometric, signal-processing, and hybrid attacks with an average Normalized Cross Correlation of 0.9401. Moreover, due to the incorporation of the fragile watermark, it can detect and localize tampering of an image with extreme accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

Data availability

All images used in this article can be found at http://decsai.ugr.es/cvg/dbimagenes/c512.php, an open-source repository of the University of Granada, Computer Vision Group.

References

  1. Abdelhakim AM, Saad MH, Sayed M, Saleh HI (2018) Optimized SVD-based robust watermarking in the fractional Fourier domain. Multimed Tools Appl 77:27895–27917. https://doi.org/10.1007/s11042-018-6014-5

    Article  Google Scholar 

  2. Abraham J, Paul V (2016) An imperceptible spatial domain color image watermarking scheme. J King Saud Univ-Comp Inf Sci 31(1):125–133. https://doi.org/10.1016/j.jksuci.2016.12.004

    Article  Google Scholar 

  3. Achanta R, Hemami S, Estrada F, Susstrunk S (2009) Frequency-tuned salient region detection. In: IEEE Conf on Comp Vis and Patt Rec, Miami, FL 1597–1604. https://doi.org/10.1109/CVPR.2009.5206596

  4. Ansari IA, Pant M, Ahn CW (2016) ABC optimized secured image watermarking scheme to find out the rightful ownership. Optik 127:5711–5721. https://doi.org/10.1016/j.ijleo.2016.03.070

    Article  Google Scholar 

  5. Arnold VI, Avez A (1968) Ergodic problems of classical mechanics. first ed. W. A. Benjamin Inc.

  6. Aytekin Ç, Ozan EC, Kiranyaz S, Gabbouj M (2015) Visual saliency by extended quantum cuts. IEEE Int Conf on Image Process, Quebec City, pp 1692–1696. https://doi.org/10.1109/ICIP.2015.7351089

    Book  Google Scholar 

  7. Aytekin Ç, Ozan EC, Kiranyaz S, Gabbouj M (2017) Extended quantum cuts for unsupervised salient object extraction. Multimed Tools Appl 76:10443–10463. https://doi.org/10.1007/s11042-016-3431-1

    Article  Google Scholar 

  8. Aytekin Ç, Iosifidis A, Gabbouj M (2018) Probabilistic saliency estimation. Pattern Recogn 74:359–372. https://doi.org/10.1016/j.patcog.2017.09.023

    Article  Google Scholar 

  9. Bal SN, Nayak MR, Sarkar SK (2018) On the implementation of a secured watermarking mechanism based on cryptography and bit pairs matching. J King Saud Univ-Comp Inf Sci. https://doi.org/10.1016/j.jksuci.2018.04.006

  10. Basu A, Sarkar SK (2013) On the implementation of robust copyright protection scheme using visual attention model. Inf Sec J: Global Persp 22(1):10–20. https://doi.org/10.1080/19393555.2013.779400

    Article  Google Scholar 

  11. Cox IJ, Kilian J, Leighton T, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE T Image Process 6(12):1673–1687. https://doi.org/10.1109/83.650120

    Article  Google Scholar 

  12. Esgandari R, Khalili M (2015) A robust image watermarking scheme based on discrete wavelet transforms. In: 2nd Int Conf on knowledge-based engineering and innovation, Tehran 988–992. https://doi.org/10.1109/KBEI.2015.7436179

  13. Ghebleh M, Kanso A, Own HS (2014) A blind chaos-based watermarking technique. Secur Commun Netw 7:800–811. https://doi.org/10.1002/sec.783

    Article  Google Scholar 

  14. Ghosh A, Koley S, Acharyya S (2019) A wavelet-based blind digital image watermarking using dynamic LSB replacement (DLSBR) and symmetric key cryptography. In: Bhattacharyya S et al (eds) Recent trends in signal and image processing. Springer, Singapore, pp 103–111. https://doi.org/10.1007/978-981-13-6783-0_10

    Chapter  Google Scholar 

  15. Golub GH, Loan CFV (1996) Matrix computation, third edn. The Johns Hopkins University Press, Baltimore and London

  16. Gonzalez RC, Woods RE (2011) Digital Image Processing. third ed. Prentice Hall

  17. Gu F, Lu ZM, Pan JS (2005) Multipurpose image watermarking in DCT domain using subsampling. In: IEEE Int Symp on Circ and Systems, Kobe, Japan 4417–4420. https://doi.org/10.1109/ISCAS.2005.1465611

  18. Gupta P, Parmar G (2017) Image watermarking using IWT-SVD and its comparative analysis with DWT-SVD. IEEE Int Conf on Comp, Comm and Electron, Jaipur, pp 527–531. https://doi.org/10.1109/COMPTELIX.2017.8004026

    Book  Google Scholar 

  19. Haghighi BB, Taherinia AH, Harati A (2018) TRLH: fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique. J Vis Commun Image R 50:49–64. https://doi.org/10.1016/j.jvcir.2017.09.017

    Article  Google Scholar 

  20. Hamidi M, Haziti ME, Cherifi H, Hassouni ME (2018) Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform. Multimed Tools Appl 77:27181–27214. https://doi.org/10.1007/s11042-018-5913-9

    Article  Google Scholar 

  21. Harel J, Koch C, Perona P (2006) Graph-based visual saliency. In: 19th Int Conf on neural information processing systems 545–552

  22. Hu HT, Hsu LY (2016) A mixed modulation scheme for blind image watermarking. AEU-Int J Electron C 70:172–178. https://doi.org/10.1016/j.aeue.2015.11.003

    Article  Google Scholar 

  23. Hurrah NN, Parah SA, Loan NA, Sheikh JA, Elhoseny M, Muhammad K (2019) Dual watermarking framework for privacy protection and content authentication of multimedia. Future Gener Comp Sy 94:654–673. https://doi.org/10.1016/j.future.2018.12.036

    Article  Google Scholar 

  24. Itti L, Koch C, Niebur E (1998) A model of saliency-based visual attention for rapid scene analysis. IEEE T Pattern Anal 20(11):1254–1259. https://doi.org/10.1109/34.730558

    Article  Google Scholar 

  25. Jia SL (2014) A novel blind color images watermarking based on SVD. Optik 125(12):2868–2874. https://doi.org/10.1016/j.ijleo.2014.01.002

    Article  Google Scholar 

  26. Jun WL, Rong Z (2013) Image defogging algorithm of single color image based on wavelet transform and histogram equalization. Appl math sciences 7:3913–3921. https://doi.org/10.12988/ams.2013.34206

  27. Koley S (2019) A feature adaptive image watermarking framework based on phase congruency and symmetric key cryptography. J King Saud Univ-Comp Inf Sciences. https://doi.org/10.1016/j.jksuci.2019.03.002

  28. Koley S, Nayak MR, Bal SN, Sarkar SK (2019) Implementation of a feature-adaptive colour image copyright protection scheme. In: Bera R et al (eds) Advances in communication, Devices and Networking. Springer, Singapore, pp 201–211. https://doi.org/10.1007/978-981-13-3450-4_23

    Chapter  Google Scholar 

  29. Kumar C, Singh AK, Kumar P (2020) Improved wavelet-based image watermarking through SPIHT. Multimed Tools Appl 79:11069–11082. https://doi.org/10.1007/s11042-018-6177-0

    Article  Google Scholar 

  30. Kutter M, Petitcolas FAP (1999) Fair benchmark for image watermarking systems. In: Wong PW et al (eds) Security and watermarking of multimedia contents. SPIE Digital Library, San Jose, pp 1–14. https://doi.org/10.1117/12.344672

    Chapter  Google Scholar 

  31. Lin CH, Yang CY (2011) Multipurpose watermarking based on blind vector quantization (BVQ). J Inf Hiding Multimed Signal Process 2(2):239–246

    Google Scholar 

  32. Liu N, Han J, Yang MH (2018) PiCANet: learning pixel-wise contextual attention for saliency detection. In: IEEE Conf on Comp Vis and Patt Rec, Salt Lake City, UT 3089–3098. https://doi.org/10.1109/CVPR.2018.00326

  33. Mallat SG (1989) A theory for multiresolution signal decomposition: the wavelet representation. IEEE T Pattern Anal 11(7):674–693. https://doi.org/10.1109/34.192463

    Article  MATH  Google Scholar 

  34. Menezes AJ, Oorschot PCV, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, Boca Raton

    MATH  Google Scholar 

  35. Nayak MR, Tudu B, Basu A, Sarkar SK (2015) On the implementation of a secured digital watermarking framework. Inf Sec J: Global Persp 24(4–6):118–126. https://doi.org/10.1080/19393555.2015.1073410

    Article  Google Scholar 

  36. Nematollahi MA, Vorakulpipat C, Rosales HG (2017) Digital watermarking techniques and trends. Springer, Germany. https://doi.org/10.1007/978-981-10-2095-7

    Book  Google Scholar 

  37. Nixon MS, Aguado AS (2008) Feature extraction and image processing. Academic Press, Elsevier.

  38. Parah SA, Sheikh JA, Assad UI, Bhat GM (2017) Realisation and robustness evaluation of a blind spatial domain watermarking technique. Int J Electron 104(4):659–672. https://doi.org/10.1080/00207217.2016.1242162

    Article  Google Scholar 

  39. Parah SA, Sheikh JA, Bhat GM (2018) StegNmark: a joint Stego-watermark approach for early tamper detection. In: Dey N et al. (ed) intelligent techniques in signal processing for multimedia security, springer, pp 427-452. https://doi.org/10.1007/978-3-319-44790-2_19

  40. Parah SA, Sheikh JA, Loan NA, Ahad F, Bhat GM (2019) Utilizing neighborhood coefficient correlation: a new image watermarking technique robust to singular and hybrid attacks. Multidim Syst Sign P 29:1095–1117. https://doi.org/10.1007/s11045-017-0490-z

    Article  MathSciNet  MATH  Google Scholar 

  41. Roy S, Pal AK (2017) A blind DCT based color watermarking algorithm for embedding multiple watermarks. AEU-Int J Electron C 72:149–161. https://doi.org/10.1016/j.aeue.2016.12.003

    Article  Google Scholar 

  42. Shen H, Chen B (2012) From single watermark to dual watermark: a new approach for image watermarking. Comput Electr Eng 38(5):1310–1324. https://doi.org/10.1016/j.compeleceng.2011.11.012

    Article  Google Scholar 

  43. Singh AK (2017) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed Tools Appl 76:8881–8900. https://doi.org/10.1007/s11042-016-3514-z

    Article  Google Scholar 

  44. Singh AK (2019) Robust and distortion control dual watermarking in LWT domain using DCT and error correction code for color medical image. Multimed Tools Appl 78:30523–30533. https://doi.org/10.1007/s11042-018-7115-x

    Article  Google Scholar 

  45. Singh L, Singh AK, Singh PK (2018) Secure data hiding techniques: a survey. Multimed Tools Appl 79:15901–15921. https://doi.org/10.1007/s11042-018-6407-5

    Article  Google Scholar 

  46. Su Q, Niu Y, Zou H, Zhao Y, Yao T (2014) A blind double color image watermarking algorithm based on QR decomposition. Multimed Tools Appl 72:987–1009. https://doi.org/10.1007/s11042-013-1653-z

    Article  Google Scholar 

  47. Su Q, Wang G, Zhang X, Lv G, Chen B (2018) A new algorithm of blind color image watermarking based on LU decomposition. Multidim Syst Sign P 29:1055–1074. https://doi.org/10.1007/s11045-017-0487-7

    Article  MathSciNet  MATH  Google Scholar 

  48. Sung M, Xiaowei L, Lee IK (2016) Visual perception based robust watermarking with integral imaging. Optik 127:11828–11839. https://doi.org/10.1016/j.ijleo.2016.09.098

    Article  Google Scholar 

  49. Swaraja K, Meenakshi K, Kora P (2020) An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine. Biomed Signal Process Control 55:101665. https://doi.org/10.1016/j.bspc.2019.101665

    Article  Google Scholar 

  50. Thakur S, Singh AK, Ghrera SP, Mohan A (2018) Chaotic based secure watermarking approach for medical images. Multimed Tools Appl 79:4263–4276. https://doi.org/10.1007/s11042-018-6691-0

    Article  Google Scholar 

  51. Tian L, Zheng N, Xue J, Li C, Wang X (2011) An integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection. Signal Process-Image 26(8–9):427–437. https://doi.org/10.1016/j.image.2011.06.001

    Article  Google Scholar 

  52. Tiwari A, Sharma M, Tamrakar RK (2017) Watermarking based image authentication and tamper detection algorithm using vector quantization approach. AEU-Int J Electron C 78:114–123. https://doi.org/10.1016/j.aeue.2017.05.027

    Article  Google Scholar 

  53. University of Granada, Computer Vision Group: ‘CVG-UGR Image Database’ (2012) http://decsai.ugr.es/cvg/dbimagenes/c512.php. Accessed 21 Jan 2019

  54. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE T on Image Process 13(4):600–612. https://doi.org/10.1109/TIP.2003.819861

    Article  Google Scholar 

  55. Wang D, Yang F, Zhang H (2016) Blind color image watermarking based on DWT and LU decomposition. J Inf Process Sys 12(4):765–778. https://doi.org/10.3745/JIPS.03.0055

    Article  Google Scholar 

  56. Zhang H, Wang C, Zhou X (2017) Fragile watermarking for image authentication using the characteristic of SVD. Algorithms 10(1):27. https://doi.org/10.3390/a10010027

    Article  MathSciNet  MATH  Google Scholar 

  57. Zhou NR, Hou WMX, Wen RH, Zou WP (2018) Imperceptible digital watermarking scheme in multiple transform domains. Multimed Tools Appl 77:30251–30267. https://doi.org/10.1007/s11042-018-6128-9

    Article  Google Scholar 

Download references

Funding

This research did not receive any specific grant from funding agencies in the public, commercial, or non-profit sectors.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Subhadeep Koley.

Ethics declarations

Conflict of interest

None.

Code availability

Available upon request.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Koley, S. Visual attention model based dual watermarking for simultaneous image copyright protection and authentication. Multimed Tools Appl 80, 6755–6783 (2021). https://doi.org/10.1007/s11042-020-09918-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09918-y

Keywords

Navigation