Advertisement

A watermarking scheme based on rotating vector for image content authentication

  • Jianjing FuEmail author
  • Jiafa Mao
  • Dawen Xue
  • Deren Chen
Focus
  • 9 Downloads

Abstract

Semi-fragile watermarking technique for digital image, as a technology for content authentication, aims at telling malicious tampering from content-preserving operators. However, with the resolution of imaging sensors increasing and the explosive growth of digital images on the internet, before authorization, watermarked images tend to undergo such double-compression environments as: first compression (JPEG/JPEG2000) for release, decoding, application processing (conventional signal processing such as nosing, filtering, cropping, and scaling/security attack/malicious tampering), and second compression (JPEG2000/JPEG) for release again. In this paper, based on rotating vector, we propose a novel watermarking expression method that can describe carrier semantics to a certain extent and its modulation algorithm for digital image, and analyze the stability of the watermarked data theoretically. Then, a semi-fragile watermarking scheme is proposed for image content authentication to effectively distinguish malicious content manipulation from content-preserving operations in the double-compression application environment, which expands the application scope of content authentication based on watermarking technology.

Keywords

Content authentication JPEG JPEG2000 Semi-fragile watermark Tampering localization 

Notes

Acknowledgements

This work was supported in part by the Zhejiang Provincial Natural Science Foundation of China under Grant LY18F020003, and in part by the Key Research and Development Program of Zhejiang Province in China under Grant 2019C03138.

Compliance with ethical standards

Conflict of interest

The authors declare that they have no conflict of interest.

References

  1. Al-Haj A, Amer A (2014) Secured telemedicine using region-based watermarking with tamper localization. J Digit Imaging 27:737–750CrossRefGoogle Scholar
  2. Ali M, Ahn CW (2018) An optimal image watermarking approach through cuckoo search algorithm in wavelet domain. Int J Syst Assur Eng Manag 9(3):602–611CrossRefGoogle Scholar
  3. Chen ST, Huang HN, Kung WM, Hsu CY (2016) Optimization-based image watermarking with integrated quantization embedding in the wavelet domain. Multimed Tools Appl 75:5493–5511CrossRefGoogle Scholar
  4. Das C, Panigrahi S, Sharma VK, Mahapatra KK (2014) A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. AEU Int J Electron Commun 68:244–253CrossRefGoogle Scholar
  5. Fridrich J, Goljan M, Memon N (2002) Cryptanalysis of the Yeung–Mintzer fragile watermarking technique. J Electron Imaging 11(2):262–274CrossRefGoogle Scholar
  6. Goléa N, Kamal EM (2019) ROI-based fragile watermarking for medical image tamper detection. IJHPCN 13(2):199–210CrossRefGoogle Scholar
  7. Guo J, Zheng P, Huang J (2015) Secure watermarking scheme against watermark attacks in the encrypted domain. J Vis Commun Image Represent 30:125–135CrossRefGoogle Scholar
  8. Holliman M, Memon N (2000) Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans Image Process 9(3):432–441CrossRefGoogle Scholar
  9. Hsu LY, Hu HT (2017) Robust blind image watermarking using crisscross inter-block prediction in the DCT domain. J Vis Commun Image Represent 46:33–47CrossRefGoogle Scholar
  10. Huang H, Xie DQ, Qi K (2018) A watermarking-based authentication and image restoration in multimedia sensor networks. Int J High Perform Comput Netw 12(1):65–73CrossRefGoogle Scholar
  11. Imran S, Kumar DP, S. Tetsuya (2017) A semi-fragile watermarking method using slant transform and LU decomposition for image authentication. In: ECCE 2017—international conference on electrical, computer and communication engineering. Cox’s Bazar, Bangladesh, pp 881–885Google Scholar
  12. Maeno K, Sun Q, Chang S, Suto M (2006) New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization. IEEE Trans Multimed 8(1):32–45CrossRefGoogle Scholar
  13. Mehta R, Rajpal N, Vishwakarma VP (2017) Robust and efficient image watermarking scheme based on Lagrangian SVR and lifting wavelet transform. Int J Mach Learn Cybernet 8:379–395CrossRefGoogle Scholar
  14. Ourique F, Licks V, Jordan R, Perez G (2005) Angle QIM: a novel watermark embedding scheme robust against amplitude scaling distortions. In: Proceedings of 30th IEEE international conference on acoustics, speech, and signal processing, Philadelphia, vol 1–5, pp 797–800Google Scholar
  15. Patra JC, Phua JE, Bornand C (2010) A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Dig Sig Process 20:1597–1611CrossRefGoogle Scholar
  16. Preda RO (2013) Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain. Measurement 46:367–373CrossRefGoogle Scholar
  17. Qi XJ, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Vis Commun Image Represent 30:312–327CrossRefGoogle Scholar
  18. Shabir A et al (2018) Utilizing neighborhood coefficient correlation: a new image watermarking technique robust to singular and hybrid attacks. Multidimed Syst Sign Process 29:1095–1117MathSciNetCrossRefGoogle Scholar
  19. SIPI Image Database <http://sipi.usc.edu/database/>
  20. Verma VS, Jha RK, Ojha A (2015) Digital watermark extraction using support vector machine with principal component analysis based feature reduction. J Vis Commun Image Represent 31:75–85CrossRefGoogle Scholar
  21. Wang Y, Pearmain A (2004) Blind image data hiding based on self reference. Pattern Recognit Lett 25:1681–1689CrossRefGoogle Scholar
  22. Wang Z, Bovik AC, Sheikh HR, Simoncell EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612CrossRefGoogle Scholar
  23. Wang X, Cao J, Wang J (2016) A dynamic cloud service selection strategy using adaptive learning agents. Int J High Perform Comput Netw 9(1-2):70–81CrossRefGoogle Scholar
  24. Zhang X, Cui L, Shao L (2012) A fast semi-fragile watermarking scheme based on quantizing the weighted mean of integer Haar wavelet coefficients. In: Proceedings of symposium on photonics and optoelectronics, pp 1–4Google Scholar
  25. Zhang M, Duan Z, Li Q, Chu H (2016) Transformation from business process models to BPEL with overlapped patterns involved. Int J High Perform Comput Netw 9(1-2):82–92CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2019

Authors and Affiliations

  1. 1.College of New MediaCommunication University of ZhejiangHangzhouChina
  2. 2.College of Computer Science and TechnologyZhejiang University of TechnologyHangzhouChina
  3. 3.School of Electronics and Information EngineeringNingbo University of TechnologyNingboChina
  4. 4.College of Computer Science and TechnologyZhejiang UniversityHangzhouChina

Personalised recommendations