Multimedia Tools and Applications

, Volume 73, Issue 3, pp 1291–1321 | Cite as

A robust multimedia authentication and restoration scheme in digital photography

  • Sidra Riaz
  • Sang-Woong LeeEmail author


Image authentication and restoration is an important area of modern research. In digital photography, copyright protection is very crucial. Visible signatures distract from the meaning of the photograph as well as they are easy to be removed by using advanced softwares. Invisible watermarks provide protection, offer a better look to photographs than visible watermarking, and prevent the photographs from unauthorized manipulations. A robust multiple watermarking scheme is required which could invisibly protect the content and also should survive the manipulations for later verification and restoration. In this paper, a robust and imperceptible multimedia authentication and restoration scheme is proposed. The security of Advanced Encryption Standard (AES) is utilized to make an encrypted watermark. The encrypted watermark is then embedded into photographs in the salient regions by proposed Feature-Closest Point Transform (F-CPT) algorithm. The second watermark is generated by wavelet decomposition and embedded in the second and third level wavelet sub-bands of the cover photographs. Several security attacks are performed e.g. noise attack, compression attack, resizing attack, rotation attack, collage attack, and cropping attack on multiple watermarked photographs to examine the system robustness by normalized cross correlation (NCC) for retrieved authentication watermarks. Result of PSNR, MSE, and SSIM show the high imperceptibility of our technique and aesthetic score (AS) shows the aesthetic quality of watermarked photographs (WPs).


Multimedia authentication Image restoration Multimedia security Multiple watermarking 


  1. 1.
    Ali Al-Haj M (2010) Two spatial watermarking techniques for digital images. In: Advance techniques in multimedia watermarking: image, video, and audio applications. IGI Global Snippet, ch. 1, pp. 2–5Google Scholar
  2. 2.
    Ali H-M, Abdellatif M, Bourennane E-B (2011) A watermarking of medical image: method based “LSB”. In: Journal of Emerging Trends in Computing and Information Science, vol. 2, no. 12, December, pp. 714-721Google Scholar
  3. 3.
    Alomari R-S, Al-Jaber A (2004) A fragile watermarking algorithm for content authentication. In: IEEE Trans. JCIS Journal of Computing and Information Science, vol. 2, no. 1, pp. 27–37Google Scholar
  4. 4.
    Barnes C, Goldman D-B, Shechtman E, Finkelstein A (2011) The patchmatch randomized correspondence algorithm for structural image manipulation. In: Communication of the ACM, vol. 54, issue. 11, November, pp. 103–111Google Scholar
  5. 5.
    Chamlawi R, Asifullah K, Adris I, Zahid M (2007) A secure semi-fragile watermarking scheme for authentication and recovery of image based on wavelet transform. In: Journal of Computer Science and Technology, vol. 2, no. 6, November, pp. 795–804Google Scholar
  6. 6.
    Chamlawi R, Asifullah K, Imran U (2010) Authentication and recovery of images using multiple watermarks. In: Computers & Electrical Engineering, vol. 36, issue. 3, May, pp. 578–584Google Scholar
  7. 7.
    Chamlawi R, Khan A, Idris A (2007) Wavelet based image authentication and recovery. In: Journal of Computer Science and Technology, vol. 22, no. 6, November, pp. 795–804Google Scholar
  8. 8.
    Christof P, Jan P (2010) Introduction to cryptography and data security. In: Understanding cryptography: a textbook for students and practitioners, reprint. Springer, Germany, ch. 1, sec. 1.1, pp. 2–4Google Scholar
  9. 9.
    Chuan Q, Chang C-C, Chen P-Y (2012) Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. In: Journal of Signal Processing, ACM, vol. 92, issue, 4, April, pp. 1137–1150Google Scholar
  10. 10.
    Datta R, Joshi D, Li J, Wang J-Z (2006) Studying aesthetics in photographic images using computational approach. In: Proc. of European Conference on Computer Vision (ECCV), May, pp. 288–301Google Scholar
  11. 11.
    Dobbertin H, Knudsen L, Robshaw M (2005) The cryptanalysis of the AES – a brief survey. In: Advanced encryption standard-AES. Springer, India, vol. 3373, ch. 1, sec. 2, pp. 1–10Google Scholar
  12. 12.
    Furht B, Kirovski D (2006) Protection of multimedia content in distribution networks. In: Multimedia watermarking techniques and applications. CRC Press, Taylor and Francis Groups, USA, ch. 1, pp. 1–60Google Scholar
  13. 13.
    Huang W, Ho T-SA, Pankajakshan V (2008) Watermarking-based content authentication of motion-JPEG sequences. In: Proc. of VIE visual information engineering. p. 813–818Google Scholar
  14. 14.
    Hung K-M, Chen T-W, Su W-K (2012) Automatic image authentication and recovery using multiple watermarks. In: ICIDT information science and digital content technology, vol. 3, June, pp. 730–735Google Scholar
  15. 15.
    Jeng-Shyang P, Hsiang-Cheh L, Jain LC (2004) Advanced watermarking techniques. In: Intelligent watermarking techniques, 4th ed. World Scientific, USA and London, UK, part 3, ch. 12-18, pp. 351–515Google Scholar
  16. 16.
    Li C-T, Lou D-C, Liu J-L (2003) Image integrity and authenticity verification via content-based watermarks and a public key cryptosystem. In: Journal of Chinese Institute of Electrical Engineering, vol. 10, no. 1, pp. 99–106Google Scholar
  17. 17.
    Lin C-Y, Chang S-F (2000) Semi-fragile watermarking for authenticating JPEG visual content. In: Proc. of SPIE, security and watermarking of multimedia contents, vol. 2971, pp. 140–151Google Scholar
  18. 18.
    Lin ET, Podilchuk CI, Delp EJ (2000) Detection of image alterations using semi-fragile watermarks. In: Proc. of SPIE security and watermarking of multimedia contents, vol. 3971. San Jose, California, January, pp. 23–28Google Scholar
  19. 19.
    LinP-L, Hsieh C-K, Huang P-W (2005) A hierarchical digital watermarking method for image tamper detection and recovery. In: Journal of Pattern Recognition, ELSEVIER, vol. 38, issue. 12, December, pp. 2519–2529Google Scholar
  20. 20.
    Pan H-K, Chen Y-Y, Tseng Y-C (2000) A secure data hiding scheme for two-color images. In: Proc. of IEEE Symposium on Computers and Communications, pp. 750–755Google Scholar
  21. 21.
    Radharani S, Valarmathi M-L (2010) A study on watermarking schemes for image authentication. In: International Journal of Computer Applications, vol. 2, no. 4, June, p. 24–32Google Scholar
  22. 22.
    Randall A (2011) A novel semi-fragile watermarking scheme with iterative restoration. Available: (URL)
  23. 23.
    Rubner Y, Tomasi C, Guibas L-J (2000) The earth mover’s distance as a metric for image retrieval. In: Journal of Computer Vision, vol. 40, no. 2, pp. 99–121Google Scholar
  24. 24.
    Sathik M-M, Sujatha S-S (2010) An improved invisible watermarking technique for image authentication. In: International Journal of Advanced Science and Technology, vo. 24, November, pp. 61–73Google Scholar
  25. 25.
    Sencar HT, Ramkumar M, Akansu AN (2004) Communication with side information and data hiding. In: Data hiding fundamentals and applications: content security in digital media. ELSEVIER Academic Press, London, UK, ch. 3, sec. 3.3, pp. 35–39Google Scholar
  26. 26.
    Shelly GB, Vermaat ME, Quasney JJ, Sebok SL, Jeffrey J (2008) Multimedia and content sharing. In: Discovering computers 2009: complete. Cengage Learning, Boston, USA, ch. 5, sec. ‘Special Features’, pp. 294–297Google Scholar
  27. 27.
    Shih FY (2012) “Watermarking,” and “Steganography,”. In: Multimedia security: watermarking, steganography, and forensics. CRC Press, Taylor and Francis Group, USA, ch. 2 and ch. 3, pp. 67–181, and pp. 201–215Google Scholar
  28. 28.
    Sidra R, Lee K-H, Lee S-W (2012) Aesthetic score assessment based on generic features in digital photography. In: AUN/SEED-Net regional conference on information and communication technology, Manila, Philippine, October, pp. 76–79Google Scholar
  29. 29.
    Somayeh S, Sajjad D, Azizah A-M (2012) Efficient digital image authentication and tamper localization techniques using 3Lsb watermarking. In: IJCSI International Journal Of Computer Science, vol. 9, issue. 1, January, pp. 1–8Google Scholar
  30. 30.
    Tai W-L, Yeh C-M, Chang C-C (2009) Reversible data hiding based on histogram modification of pixel differences. In: IEEE Trans. on Circuits and Systems for Video Technology, vol. 19, no. 6, June, pp. 906–910Google Scholar
  31. 31.
    Tian J (2002) Wavelet-based reversible watermarking for authentication. In: Proc. of SPIE 4675, Security and Watermarking of Multimedia Contents IV, vol. 4675, April, pp. 679–690Google Scholar
  32. 32.
    Tseng Y-C, Pan H-K (2001) Secure and invisible data hiding in 2 - color images. In: Proc. of IEEE Computer and Communication Societies, vol. 2, pp. 887–896Google Scholar
  33. 33.
    TsihrintzisGA, Jain LC (2008) Cryptography and data hiding for media security. In: Multimedia services in intelligent environments: advanced tools and methodologies. Springer, Berlin, Germany, ch. 9, sec. 9.1, pp. 227–228Google Scholar
  34. 34.
    Wu Y, Qiu B, Bao F (2007) Evaluating OUDA’s tamper-localization watermarking scheme. In: Proc. of IEEE Conference on Multimedia and Expo, July, pp. 843–846Google Scholar
  35. 35.
    Yang H, Sun X (2007) Semi-fragile watermarking for image authentication and tamper detection using HVS model. In: IEEE conference on multimedia and ubiquitous engineering, April, pp. 26–28Google Scholar
  36. 36.
    Zhang X, Wang S (2008) Fragile watermarking with error-free restoration capability. In: IEEE Trans. on Multimedia, vol. 10, no. 8, December, pp.1490–1499Google Scholar
  37. 37.
    Zoran D, Michael J, Sushil J (2005) Information hiding: steganography and steganalysis. In: Handbook of statistics 24: data mining and data visualization. USA: Elsevier, ch. 6, sec. 3, pp. 174–179Google Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  1. 1.Department of Computer EngineeringChosun UniversityGwangjuSouth Korea

Personalised recommendations