Skip to main content
Log in

An efficient self-embedding fragile watermarking scheme for image authentication with two chances for recovery capability

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A self-embedding block-wise fragile image watermarking scheme is proposed in this paper for authentication, localization, and recovery with enhanced accuracy. In this introduced scheme, the cover image is split into non-overlapping blocks with a size of 2 × 2, and each block, ten restoration bits and two authentication bits are calculated from the five MSBs planes. In the watermarked image, each block contains restoration bits of the other two partner blocks and authentication bits itself. These ways two copies of restoration bits for each block are embedded into the host image. Therefore, we will get the second opportunity for block restoration in the situation one copy is not able to extract. The proposed scheme is also beneficial because three-level hierarchical tampered detection methods verify the authenticity of each block. So the authentication of each block can be confirmed with a significant possibility. The experimental outcomes prove that the intended scheme is capable of performing a high- quality restoration. The recovery is feasible with high Peak Signal to Noise Ratio and Normalized Correlation Coefficient up to 50% tampering rate. The proposed scheme also eliminates the blocking artefacts and enhances the precision of tampered localization because of the minimal size non-overlapping blocks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19

Similar content being viewed by others

References

  1. Celik MU, Sharma G, Saber E, Tekalp AM (2002) Hierarchical watermarking for secure image authentication with localization. Image Process IEEE Trans 11(6):585–595

    Article  Google Scholar 

  2. Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan Kaufmann

  3. Korus P, Dziech A (2013) Efficient method for content reconstruction with self-embedding. Image Process, IEEE Trans 22(3):1134–1147

    Article  MathSciNet  MATH  Google Scholar 

  4. Lee TY, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recognit 41(11):3497–3506. https://doi.org/10.1016/j.patcog.2008.05.003. http://www.sciencedirect.com/science/article/pii/S003132030800174X

    Article  MathSciNet  MATH  Google Scholar 

  5. Li C, Zhang A, Liu Z, Liao L, Huang D (2014) Semi-fragile self-recoverable watermarking algorithm based on wavelet group quantization and double authentication. Multimed Tools Appl:1–24

  6. Lin PL, Hsieh CK, Huang PW (2005) A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognit 38 (12):2519–2529. https://doi.org/10.1016/j.patcog.2005.02.007. http://www.sciencedirect.com/science/article/pii/S0031320305000890

    Article  Google Scholar 

  7. Lu CS, Liao HY (2003) Structural digital signature for image authentication: an incidental distortion resistant scheme. Multimedia, IEEE Trans 5 (2):161–173. https://doi.org/10.1109/TMM.2003.811621

    Article  Google Scholar 

  8. Maeno K, Sun Q, Chang SF, Suto M (2006) New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization. Multimedia, IEEE Trans 8(1):32–45

    Article  Google Scholar 

  9. Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. Journal of visual communication and image representation

  10. Qian Z, Feng G, Zhang X, Wang S (2011) Image self-embedding with high-quality restoration capability. Digital Signal Processing 21 (2):278–286. https://doi.org/10.1016/j.dsp.2010.04.006. http://www.sciencedirect.com/science/article/pii/S1051200410000916

    Article  Google Scholar 

  11. Qian Z, Feng G, Zhang X, Wang S (2011) Image self-embedding with high-quality restoration capability. Digit Signal Process 21(2):278–286

    Article  Google Scholar 

  12. Singh D, Shivani S, Agarwal S (2013) Quantization-based fragile watermarking using block-wise authentication and pixel-wise recovery scheme for tampered image. Int J Image Graph 13(02):1340,002. https://doi.org/10.1142/S0219467813400020. http://www.worldscientific.com/doi/abs/10.1142/S0219467813400020

    Article  Google Scholar 

  13. Singh D, Shivani S, Agarwal S (2013) Self-embedding pixel wise fragile watermarking scheme for image authentication. In: Intelligent interactive technologies and multimedia. Springer, pp 111–122

  14. Singh D, Singh SK (2016) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J Vis Commun Image Represent 38:775–789. https://doi.org/10.1016/j.jvcir.2016.04.023. http://www.sciencedirect.com/science/article/pii/S1047320316300566

    Article  Google Scholar 

  15. Singh D, Singh SK (2017) Dct based efficient fragile watermarking scheme for image authentication and restoration. Multimed Tools Appl 76(1):953–977

    Article  Google Scholar 

  16. Singh D, Singh SK (2017) Dwt-svd and dct based robust and blind watermarking scheme for copyright protection. Multimed Tools Appl 76 (11):13,001–13,024. https://doi.org/10.1007/s11042-016-3706-6

    Article  Google Scholar 

  17. Stallings W (2007) Network security essentials: applications and standards. Pearson education India

  18. Sun Q, Chang SF (2005) A secure and robust digital signature scheme for jpeg2000 image authentication. Multimed, IEEE Trans 7(3):480–494

    Article  Google Scholar 

  19. Wang J, Lian S, Liu G, Dai Y, Liu Z, Ren Z (2008) Secure multimedia watermarking authentication in wavelet domain. J Electron Imaging 17 (3):033,010

    Article  Google Scholar 

  20. Zhang X, Qian Z, Ren Y, Feng G (2011) Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. Information Forensics and Security. IEEE Trans 6(4):1223–1232

    Google Scholar 

  21. Zhang X, Wang S (2008) Fragile watermarking with error-free restoration capability. Multimed, IEEE Trans 10(8):1490–1499

    Article  Google Scholar 

  22. Zhang X, Wang S, Feng G (2009) Fragile watermarking scheme with extensive content restoration capability. Springer Berlin Heidelberg, Berlin, Heidelberg, pp 268–278. https://doi.org/10.1007/978-3-642-03688-0_24

  23. Zhang X, Wang S, Qian Z, Feng G (2011) Reference sharing mechanism for watermark self-embedding. Image Process, IEEE Trans 20(2):485–495

    Article  MathSciNet  MATH  Google Scholar 

  24. Zhang X, Wang S, Qian Z, Feng G (2011) Self-embedding watermark with flexible restoration quality. Multimed Tools Appl 54(2):385–395 . https://doi.org/10.1007/s11042-010-0541-z

    Article  Google Scholar 

  25. Zhang X, Xiao Y, Zhao Z (2014) Self-embedding fragile watermarking based on dct and fast fractal coding. Multimed Tools Appl:1–20

  26. Zhu X, Ho AT, Marziliano P (2007) A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. Signal Process: Image Commun 22(5):515–528. https://doi.org/10.1016/j.image.2007.03.004. http://www.sciencedirect.com/science/article/pii/S0923596507000434

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Durgesh Singh.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, D., Singh, S.K. & Udmale, S.S. An efficient self-embedding fragile watermarking scheme for image authentication with two chances for recovery capability. Multimed Tools Appl 82, 1045–1066 (2023). https://doi.org/10.1007/s11042-022-13270-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13270-8

Keywords

Navigation