New Paradigm for Self-embedding Image Watermarking with Poisson Equation

  • Fang Cao
  • Tianwei Wu
  • Chuan QinEmail author
  • Zhenxing Qian
  • Xinpeng Zhang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 12022)


In this paper, we propose a new self-embedding image watermarking scheme based on reference sharing and Poisson equation. With Laplacian operator, the relationship of each pixel and its neighborhood in original image is established and can be converted to compression bits. Then, after scrambling, compression bits are interleaved through the reference sharing mechanism, which can introduce more redundancy into the reference bits to be embedded for future content recovery. Thus, the relationship between each compression bit and each reference bit is constructed so that the recoverable area for tampered image can be increased effectively. Tampered contents can be recovered with the Laplacian values of tampered blocks and the boundary values around tampered blocks based on tampering localization and Poisson equation solver. Experimental results demonstrate the effectiveness of the proposed scheme.


Self-embedding Reference sharing Poisson equation Tampering recovery 



This work was supported by the National Natural Science Foundation of China (61902239, 61672354). The authors would like to thank the anonymous reviewers for their valuable suggestions.


  1. 1.
    Fridrich, J., Goljan, M.: Images with self-correcting capabilities. In: Proceedings of IEEE International Conference on Image Processing, pp. 792–796 (1999)Google Scholar
  2. 2.
    Chang, C.C., Hu, Y.S., Lu, T.C.: A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn. Lett. 27(5), 439–446 (2006)CrossRefGoogle Scholar
  3. 3.
    Lin, P.L., Hsieh, C.K., Huang, P.W.: A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn. 38(12), 2519–2529 (2005)CrossRefGoogle Scholar
  4. 4.
    Lee, T.Y., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recogn. 41(11), 3497–3506 (2008)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Zhang, X.P., Wang, S.Z., Qian, Z.X., Feng, G.R.: Reference sharing mechanism for watermark self-embedding. IEEE Trans. Image Process. 20(2), 485–495 (2011)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Yang, C.W., Shen, J.J.: Recover the tampered image based on VQ indexing. Sig. Process. 90(1), 331–343 (2010)CrossRefGoogle Scholar
  7. 7.
    Korus, P., Dziech, A.: Adaptive self-embedding scheme with controlled reconstruction performance. IEEE Trans. Inf. Forensics Secur. 9(2), 169–181 (2014)CrossRefGoogle Scholar
  8. 8.
    Qin, C., Ji, P., Chang, C.C., Dong, J., Sun, X.M.: Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery. IEEE Multimedia 25(3), 36–48 (2018)CrossRefGoogle Scholar
  9. 9.
    Perez, P., Gangnet, M., Blake, A.: Poisson image editing. ACM Trans. Graph. 22(3), 313–318 (2003)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Fang Cao
    • 1
  • Tianwei Wu
    • 2
  • Chuan Qin
    • 2
    Email author
  • Zhenxing Qian
    • 3
  • Xinpeng Zhang
    • 3
  1. 1.College of Information EngineeringShanghai Maritime UniversityShanghaiChina
  2. 2.School of Optical-Electrical and Computer EngineeringUniversity of Shanghai for Science and TechnologyShanghaiChina
  3. 3.School of Computer ScienceFudan UniversityShanghaiChina

Personalised recommendations