Multimedia Tools and Applications

, Volume 78, Issue 10, pp 14067–14089 | Cite as

Semi-fragile self-recovery watermarking scheme based on data representation through combination

  • Hanen RhaymaEmail author
  • Achraf Makhloufi
  • Habib Hamam
  • Ahmed Ben Hamida


The widely available multimedia editing tools and their large reconstruction capabilities make digital multimedia content more sensitive to malicious tampering and manipulations. Therefore, ensuring digital image integrity has become a crucial issue. Watermarking became a popular technique for image authentication. The goal of this paper is to propose a new semi-fragile watermarking scheme for image authentication, localization, and recovery, by using two different watermarks jointly. The embedded information watermark for content recovery is computed from discrete wavelet transform (DWT) approximation coefficients of second level decomposition of the original image and compressed by using Data Representation through Combination (DRC) in order to reduce watermark payload. On another hand, authentication watermark used for both authentication and localization of image tampering is computed by using the block-based watermarking algorithm. Three pseudo-random maps are generated in order to improve the security of the proposed scheme against local attack. Both watermarks are embedded into approximation sub-band of the first wavelet decomposition. Experimental results show that our proposed approach has not only an extremely high accuracy of tampering localization but also a relatively very high recovery rate. Besides, the scheme is able to detect perfectly the difference between malicious attacks and non-malicious attacks such as JPEG compression.


Semi-fragile watermarking Data representation through combination DWT Self-recovery Localization Authentication 



  1. 1.
    Boneh D, Shoup V (2015) A graduate course in applied cryptography, version 0.2Google Scholar
  2. 2.
    Chamlawi R, Khan A, Usman I (2010) Authentication and recovery of images using multiple watermarks. Comput Electr Eng 36(3):578–584CrossRefzbMATHGoogle Scholar
  3. 3.
    Cheddad A, Condell J, Curran K, Kevitt PM (2010) Digital image steganography: Survey and analysis of current methods. Signal Process 90(3):727–752CrossRefzbMATHGoogle Scholar
  4. 4.
    Cox IJIJ (2008) Digital watermarking and steganography. Morgan Kaufmann, San MateoGoogle Scholar
  5. 5.
    Di Martino F, Sessa S (2012) Fragile watermarking tamper detection with images compressed by fuzzy transform. Inform Sci 195:62–90CrossRefGoogle Scholar
  6. 6.
    Haouzia A, Noumeir R (2008) Methods for image authentication: a survey. Multimed Tools Appl 39(1):1–46CrossRefGoogle Scholar
  7. 7.
    He HJ, Zhang JS, Tai HM (2009) Self-recovery fragile watermarking using block-neighborhood tampering characterization. Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics) 5806 LNCS:132–145Google Scholar
  8. 8.
    He H, Chen F, Tai H, Member S, Kalker T, Zhang J (2012) Performance analysis of a block-neighborhood- based self-recovery fragile watermarking scheme. IEEE Trans Inf Forensics Secur 7(1):185–196CrossRefGoogle Scholar
  9. 9.
    Li C, Wang Y, Ma B, Zhang Z (2011) A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure q. Comput Electr Eng 37:927–940. [Online]. Available: CrossRefGoogle Scholar
  10. 10.
    Li C, Wang Y, Ma B, Zhang Z (2012) Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme. Computer Standards and Interfaces 34(4):367–379CrossRefGoogle Scholar
  11. 11.
    Li C, Zhang A, Liu Z, Liao L, Huang D (2015) Semi-fragile self-recoverable watermarking algorithm based on wavelet group quantization and double authentication. Multimed Tools Appl 74(23):10581–10604CrossRefGoogle Scholar
  12. 12.
    Lin C-Y, Chang S-F (2000) Semi-fragile watermarking for authenticating JPEG visual content. In: Proceedings of the SPIE security and watermarking of multimedia contents II, San Jose, pp 140–151Google Scholar
  13. 13.
    Ling C, Ur-rehman O (2015) Robust image authentication in the presence of noise. Springer, Cham, pp 43–53Google Scholar
  14. 14.
    Liu C-L (2010) A tutorial of the wavelet transform Chapter 1 Overview 1.1 IntroductionGoogle Scholar
  15. 15.
    Ouled Zaid A, Makhloufi A, Bouallegue A, Olivier C (2009) Improved QIM-based watermarking integrated to JPEG2000 coding scheme. SIViP 3(3):197–207CrossRefzbMATHGoogle Scholar
  16. 16.
    Phadikar A, Maity SP, Mandal M (2012) Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images. J Vis Commun Image Represent 23(3):454–466CrossRefGoogle Scholar
  17. 17.
    Poornima R, Iswarya R (2013) And overview of digital image steganography. International Journal of Computer Science & Engineering Survey 4(1):23–31CrossRefGoogle Scholar
  18. 18.
    Preda RO (2013) Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain. Measurement 46(1):367–373MathSciNetCrossRefGoogle Scholar
  19. 19.
    Qi X, Xin X (2011) A quantization-based semi-fragile watermarking scheme for image content authentication. J Vis Commun Image Represent 22:187–200CrossRefGoogle Scholar
  20. 20.
    Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Vis Commun Image Represent 30:312–327CrossRefGoogle Scholar
  21. 21.
    Said J, Souissi R, Hamam H (2013) A new representation of image through numbering pixel combinations. Journal of Information Security Research 4:1CrossRefGoogle Scholar
  22. 22.
    Salomon D (2007) Data compression: the complete reference. Springer, BerlinzbMATHGoogle Scholar
  23. 23.
    Salomon D (2008) A concise introduction to data compression, ser. Undergraduate topics in computer science. Springer, LondonCrossRefGoogle Scholar
  24. 24.
    Sayood K (2006) Introduction to data compression, Third edition (Morgan Kaufmann Series in multimedia information and systems)Google Scholar
  25. 25.
    Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28(3):301–308CrossRefGoogle Scholar
  26. 26.
    Tsai T, Wu C, Fang C (2014) Design and Implementation of a joint data compression and digital watermarking system in an MPEG-2 video encoder. J Sign Process Syst 74:203CrossRefGoogle Scholar
  27. 27.
    Ullah R, Khan A, Malik AS (2013) Dual-purpose semi-fragile watermark: Authentication and recovery of digital images. Comput Electr Eng 39 (7):2019–2030. [Online]. Available: CrossRefGoogle Scholar
  28. 28.
    Wang H, Ho AT, Zhao X (2012) A novel fast self-restoration semi-fragile watermarking algorithm for image content authentication resistant to JPEG compression. Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics) 7128 LNCS:72–85Google Scholar
  29. 29.
    Wang Z, Bovik AC, Sheikh HR, Member S, Simoncelli EP, Member S (2004) Image quality assessment : from error visibility to structural similarity. IEEE Trans Image Process 13(4):1–14CrossRefGoogle Scholar
  30. 30.
    Wu C-M, Shih Y-S (2013) A simple image tamper detection and recovery based on fragile watermark with one parity section and two restoration sections. Optics and Photonics Journal 03(02):103–107CrossRefGoogle Scholar
  31. 31.
    Xiao D, Shih FY (2012) An improved hierarchical fragile watermarking scheme using chaotic sequence sorting and subblock post-processing. Opt Commun 285 (10–11):2596–2606. [Online]. Available: CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.École Nationale d’Ingénieurs de Gabés (ENIG)Université de GabésGabésTunisia
  2. 2.ATMS Advanced Technologies for Medecine and Signals, EnisUniversité de SfaxSfaxTunisia
  3. 3.Faculty of EngineeringUniversité de MonctonMonctonCanada

Personalised recommendations