Multimedia Tools and Applications

, Volume 76, Issue 2, pp 2267–2287 | Cite as

Fragile image watermarking scheme based on VQ index sharing and self-embedding

  • Chuan Qin
  • Ping Ji
  • Jinwei Wang
  • Chin-Chen Chang


In this paper, we propose a self-embedding fragile watermarking scheme using vector quantization (VQ) and index sharing. First, the principle contents of original image are compactly represented by a series of VQ indices. Then, after permutation, the binary bits of VQ indices are extended to generate reference-bits by a random binary matrix, which can make all reference-bits share the information of VQ index bits from different regions of the whole image. The image is embedded with watermark-bits including hash-bits for tampering localization and reference-bits for content recovery, and is transmitted to receiver side. Tampered regions in the received, suspicious image can be accurately located and then be recovered by VQ index reconstruction. Experimental results demonstrate that the proposed scheme can achieve successful content recovery for larger tampering rate and obtain better visual quality of recovered results than the reported schemes.


Fragile watermarking Vector quantization Self-embedding Tampering localization Content recovery 



This work was supported by the National Natural Science Foundation of China (61303203, 61232016, U1405254), the Natural Science Foundation of Shanghai, China (13ZR1428400), the Innovation Program of Shanghai Municipal Education Commission (14YZ087), Shanghai Engineering Center Project of Massive Internet of Things Technology for Smart Home (GCZX14014), Research Base Special Project of Hujiang Foundation (C14001), Hujiang Foundation of China (C14002), the PAPD Fund, and the Open Project Program of Shenzhen Key Laboratory of Media Security.


  1. 1.
    Bravo SS, Nandi AK (2011) Secure fragile watermarking method for image authentication with improved tampering localization and self-recovery capabilities. Signal Process 91(4):728–739CrossRefMATHGoogle Scholar
  2. 2.
    Chang CC, Chen KN, Lee CF (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462–1470CrossRefGoogle Scholar
  3. 3.
    Chang CC, Wu WC (2007) Fast planar-oriented ripple search algorithm for hyperspace VQ codebook. IEEE Trans Image Process 16(6):1538–1547MathSciNetCrossRefGoogle Scholar
  4. 4.
    Fridrich J, Goljan M (1999) Images with self-correcting capabilities. Proc IEEE Int Conf Image Process 3:792–796Google Scholar
  5. 5.
    He HJ, Chen F, Tai HM, Kalker T, Zhang JS (2012) Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Trans Inf Forensics Secur 7(1):185–196CrossRefGoogle Scholar
  6. 6.
    Huo YR, He HJ, Chen F (2012) Alterable-capacity fragile watermarking scheme with restoration capability. Opt Commun 285(7):1759–1766CrossRefGoogle Scholar
  7. 7.
    Korus P, Dziech A (2013) Efficient method for content reconstruction with self-embedding. IEEE Trans Image Process 22(3):1134–1147MathSciNetCrossRefMATHGoogle Scholar
  8. 8.
    Korus P, Dziech A (2014) Adaptive self-embedding scheme with controlled reconstruction performance. IEEE Trans Inf Forensics Secur 9(2):169–181CrossRefGoogle Scholar
  9. 9.
    Lee TY, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506MathSciNetCrossRefMATHGoogle Scholar
  10. 10.
    Li J, Li XL, Yang B, Sun XM (2015) Segmentation-based Image Copy-move Forgery Detection Scheme. IEEE Trans Inf Forensics Secur 10(3):507–518CrossRefGoogle Scholar
  11. 11.
    Lin PL, Hsieh CK, Huang PW (2005) A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 38(12):2519–2529CrossRefGoogle Scholar
  12. 12.
    Linde Y, Buzo A, Gray RM (1980) An algorithm for vector quantization design. IEEE Trans Commun 28(1):84–95CrossRefGoogle Scholar
  13. 13.
    Liu KC (2012) Color image watermarking for tamper proofing and pattern-based recovery. IET Image Process 6(5):445–454MathSciNetCrossRefGoogle Scholar
  14. 14.
    Martino FD, Sessa S (2012) Fragile watermarking tamper detection with images compressed by fuzzy transform. Inf Sci 195(13):62–90CrossRefGoogle Scholar
  15. 15.
    Nasrabadi NM, King R (1988) Image coding using vector quantization: a review. IEEE Trans Commun 36(8):957–971CrossRefGoogle Scholar
  16. 16.
    Qian ZX, Feng GR, Zhang XP (2011) Image self-embedding with high-quality restoration capability. Digital Signal Process 21(2):278–286CrossRefGoogle Scholar
  17. 17.
    Qin C, Chang CC, Chen PY (2012) Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process 92(4):1137–1150CrossRefGoogle Scholar
  18. 18.
    Qin C, Chang CC, Chen KN (2013) Adaptive self-recovery for tampered images based on VQ indexing and inpainting. Signal Process 93(4):933–946CrossRefGoogle Scholar
  19. 19.
    Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612CrossRefGoogle Scholar
  20. 20.
    Wang FH, Jain LC, Pan JS (2007) VQ-based watermarking scheme with genetic codebook partition. J Netw Comput Appl 30(1):4–23CrossRefGoogle Scholar
  21. 21.
    Wu CC, Kao SJ, Hwang MS (2011) A high quality image sharing with steganography and adaptive authentication scheme. J Syst Softw 84(12):2196–2207CrossRefGoogle Scholar
  22. 22.
    Yang SS, Qin C, Qian ZX, Xu BQ (2014) Tampering detection and content recovery for digital images using halftone mechanism. In: Proceedings of the 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Kitakyushu, Japan, pp. 130–133Google Scholar
  23. 23.
    Yang CW, Shen JJ (2010) Recover the tampered image based on VQ indexing. Signal Process 90(1):331–343CrossRefMATHGoogle Scholar
  24. 24.
    Zhang XP, Wang SZ, Qian ZX, Feng GR (2011) Reference sharing mechanism for watermark self-embedding. IEEE Trans Image Process 20(2):485–495MathSciNetCrossRefMATHGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  • Chuan Qin
    • 1
  • Ping Ji
    • 1
  • Jinwei Wang
    • 2
  • Chin-Chen Chang
    • 3
  1. 1.Shanghai Key Lab of Modern Optical System, and Engineering Research Center of Optical Instrument and System, Ministry of EducationUniversity of Shanghai for Science and TechnologyShanghaiChina
  2. 2.School of Computer and SoftwareNanjing University of Information Science & TechnologyNanjingChina
  3. 3.Department of Information Engineering and Computer ScienceFeng Chia UniversityTaichungTaiwan

Personalised recommendations