Abstract
High capacity, secure, reversible watermarking scheme using a color image for image authentication and tampered detection is still an important area of research. In this investigation, we have proposed a weighted matrix based reversible watermarking scheme using the color image which provides image authentication and tampered detection. Here, we decomposed the original image into R, G, B color components and partitioned into (3 × 3) pixel blocks then we performed the sum of entry-wise-multiplication operations using a modified weighted matrix to embed the watermark. The watermark embedding locations are stored within an index file to enhance security, increase data hiding capacity, gain good visual quality, achieve reversibility and confirm authenticity. The proposed watermarking scheme not only perform authentication and tampered detection but also improved both data embedding capacity up to 8.00 (bpp) as well as increase visual quality measured by PSNR, 50.03 (dB). Finally, the scheme is compared with other existing state-of-the-art methods and gives a reasonably better performance in terms of visual quality and hiding capacity. Our scheme has been evaluated through various steganographic analysis and observed that the scheme is secure and robust against various attacks.
Similar content being viewed by others
References
Abadi MAM, Danyali H, Helfroush MS (2010) Reversible watermarking based on interpolation error histogram shifting. In: 2010 5th international symposium on telecommunications (IST). IEEE, pp 840–845
Advith J, Varun KR, Manikantan K (2016) Novel digital image watermarking using DWT-DFT-SVD in YCbCr color space. In: International conference on emerging trends in engineering, technology and science (ICETETS). IEEE, pp 1–6
An L, Gao X, Li X, Tao D, Deng C, Li J (2012) Robust reversible watermarking via clustering and enhanced pixel-wise masking. IEEE Trans Image Process 21(8):3598–3611
Celik MU, Sharma G, Saber E, Tekalp AM (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11 (6):585–595
Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-LSB data embedding. IEEE Trans Image Process 14(2):253–266
Chamlawi R, Khan A (2010) Digital image authentication and recovery: employing integer transform based information embedding and extraction. Inform Sci 180(24):4909–4928
Coltuc D, Chassery JM (2007) Very fast watermarking by reversible contrast mapping. IEEE Signal Process Lett 14(4):255–258
Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687
Etemad E, Samavi S, Soroushmehr SR, Karimi N, Etemad M, Shirani S, Najarian K (2017) Robust image watermarking scheme using bit-plane of hadamard coefficients. Multimed Tools Appl 1–23. https://doi.org/10.1007/s11042-017-5543-7
Fan L, Gao T, Cao Y (2013) Improving the embedding efficiency of weight matrix-based steganography for grayscale images. Comput Electr Eng 39(3):873–881
Fridrich J (1998) Image watermarking for tamper detection. In: 1998 international conference on image processing, 1998. ICIP 98. Proceedings, vol 2. IEEE, pp 404–408
Fridrich J, Goljan M, Baldoza AC (2000) New fragile authentication watermark for images. In: 2000 international conference on image processing, 2000. Proceedings, vol 1. IEEE, pp 446–449
Funt et al. HDR Dataset Computational Vision Lab Computing Science, Simon Fraser University, Burnaby, BC, Canada. http://www.cs.sfu.ca/colour/data/funt_hdr. Accessed 20 Sept 2017
Johnson M, Cherian R (2017) Survey on image tampering detection and recovery techniques. Int J Comput Appl 161(4):18–20
He HJ, Zhang JS, Tian L (2005) A fragile watermarking scheme with discrimination of tampers on image or watermark. Acta Electron Sin 33(9):1557
Holliman M, Memon N (2000) Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans Image Process 9(3):432–441
Hu MC, Lou DC, Chang MC (2007) Dual-wrapped digital watermarking scheme for image copyright protection. Comput Secur 26(4):319–330
Hu Y, Lee HK, Li J (2009) DE-based reversible data hiding with improved overflow location map. IEEE Trans Circuits Syst Video Technol 19(2):250–260
Hsia SC, Jou IC, Hwang SM (2002) A gray level watermarking algorithm using double layer hidden approach. IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences 85(2):463–471
Hwang J, Kim J, Choi J (2006) A reversible watermarking based on histogram shifting. In: International workshop on digital watermarking. Springer, Berlin Heidelberg, pp 348–361
Jana B (2016) High payload reversible data hiding scheme using weighted matrix. Optik-International Journal for Light and Electron Optics 127(6):3347–3358
Jung KH (2017) Authenticable reversible data hiding scheme with less distortion in dual stego-images. Multimed Tools Appl 1–17. https://doi.org/10.1007/s11042-017-4533-0
Kundur D, Hatzinakos D (1999) Digital watermarking for telltale tamper proofing and authentication. Proc IEEE 87(7):1167–1180
Kuo WC, Kuo SH, Wang CC, Wuu LC (2016) High capacity data hiding scheme based on multi-bit encoding function. Optik-International Journal for Light and Electron Optics 127(4):1762–1769
Lee TY, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506
Li KF, Chen TS, Wu SC (2001) Image tamper detection and recovery system based on discrete wavelet transformation. In: 2001 IEEE pacific rim conference on communications, computers and signal processing, 2001. PACRIM, vol 1. IEEE, pp 164–167
Lin PL, Huang PW, Peng AW (2004) A fragile watermarking scheme for image authentication with localization and recovery. In: IEEE sixth international symposium on multimedia software engineering, 2004. Proceedings. IEEE, pp 146–153
Lin PL, Hsieh CK, Huang PW (2005) A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 38(12):2519–2529
Lu CS, Huang SK, Sze CJ, Liao HY (2001) A new watermarking technique for multimedia protection. Multimedia Image and Video Processing 507–530
Lou DC, Liu JL, Chang MC (2003) Digital watermarking using multiresolution wavelet transform. In: IEEE 37th annual 2003 international Carnahan conference on security technology, 2003. Proceedings. IEEE, pp 370–377
Lou DC, Liu JL, Tso HK, Chang MC (2005) A grayscale watermarking scheme based on pixel mapping. In: Proceedings of the 18th IPPR conference on computer vision, graphics and image processing (CVGIP 2005), Taipei, Taiwan, ROC, pp 1082-9
Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 5 (1):187–193
Nemade HS, Kelkar V (2016) Reversible watermarking for colored medical images using histogram shifting method. In: 2016 3rd international conference on computing for sustainable global development (INDIACom). IEEE, pp 2664–2668
Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. Circuits and Systems for Video Technology 16(3):354–362
Nottingham Trent University, UK, “UCID Image Database”. http://jasoncantarella.com/downloads/ucid. Accessed 12 Oct 2017
Pal P, Chowdhuri P, Jana B (2017) Reversible watermarking scheme using PVD-DE. In: International conference on computational intelligence, communications, and business analytics. Springer, Singapore, pp 511–524
Panchal UH, Srivastava R (2015) A comprehensive survey on digital image watermarking techniques. In: 2015 fifth international conference on communication systems and network technologies (CSNT). IEEE, pp 591–595
Potdar VM, Han S, Chang E (2005) A survey of digital image watermarking techniques. In: 2005 3rd IEEE international conference on industrial informatics, 2005. INDIN’05. IEEE, Chicago , pp 709–716
Roldan LR, Hernandez MC, Chao J, Miyatake MN, Meana HP (2016) Watermarking-based color image authentication with detection and recovery capability. IEEE Lat Am Trans 14(2):1050–1057
Shieh JM, Lou DC, Chang MC (2005) A robust image watermarking technique based on singular value decomposition. In: Proceedings of the first international conference on information management and business (IMB 2005), Taipei, Taiwan, ROC, pp 346–55
Soleymani SH, Taherinia AH (2016) High capacity image steganography on sparse message of scanned document image (SMSDI). Multimed Tools Appl 76(20):20847–20867
Sreenivas K, Prasad VK (2017) Fragile watermarking schemes for image authentication: a survey. Int J Mach Learn Cybern 1–26. https://doi.org/10.1007/s13042-017-0641-4.
Suthaharan S (2004) Fragile image watermarking using a gradient image for improved localization and security. Pattern Recogn Lett 25(16):1893–1903
Tseng YC, Chen YY, Pan HK (2002) A secure data hiding scheme for binary images. IEEE Trans Commun 50(8):1227–1231
University of Southern California, “The USC-SIPI Image Database”. http://sipi.usc.edu/database/database.php. Accessed 15 Dec 2016
University of California, San Diego, “STARE Image Database”. https://cecas.clemson.edu/ahoover/stare. Accessed 10 Sept 2017
Vaishnavi D, Subashini TS (2015) Robust and invisible image watermarking in RGB color space using SVD. Procedia Computer Science 46:1770–1777
Wang CL, Hwang RH, Chen TS, Lee HY (2005) Detecting and restoring system of tampered image based on discrete wavelet transformation and block truncation coding. In: 19th international conference on advanced information networking and applications, 2005. AINA 2005, vol 2. IEEE, pp 79–82
Wo Y, Han GQ, Zhang B (2005) New feature-based image content authentication algorithm. Jisuanji Xuebao (Chin J Comput) 28(1):105–112
Wong PW (1998) A public key watermark for image verification and authentication. In: 1998 international conference on image processing, 1998. ICIP 98. Proceedings, vol 1. IEEE, pp 455–459
Wong PW, Memon ND (2000) Secret and public key authentication watermarking schemes that resist vector quantization attack. In: Security and watermarking of multimedia contents II, vol 3971. International Society for Optics and Photonics, pp 417–428
Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10 (10):1593–1601
Yang CN, Hsu SC, Kim C (2017) Improving stego image quality in image interpolation based data hiding. Computer Standards & Interfaces 50:209–215
Yin M (2017) Multimedia authentication for copyright protection. In: IOP conference series: earth and environmental science, vol 69, no 1. IOP Publishing, p 012160
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Pal, P., Chowdhuri, P. & Jana, B. Weighted matrix based reversible watermarking scheme using color image. Multimed Tools Appl 77, 23073–23098 (2018). https://doi.org/10.1007/s11042-017-5568-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-5568-y