[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

Weighted matrix based reversible watermarking scheme using color image

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

High capacity, secure, reversible watermarking scheme using a color image for image authentication and tampered detection is still an important area of research. In this investigation, we have proposed a weighted matrix based reversible watermarking scheme using the color image which provides image authentication and tampered detection. Here, we decomposed the original image into R, G, B color components and partitioned into (3 × 3) pixel blocks then we performed the sum of entry-wise-multiplication operations using a modified weighted matrix to embed the watermark. The watermark embedding locations are stored within an index file to enhance security, increase data hiding capacity, gain good visual quality, achieve reversibility and confirm authenticity. The proposed watermarking scheme not only perform authentication and tampered detection but also improved both data embedding capacity up to 8.00 (bpp) as well as increase visual quality measured by PSNR, 50.03 (dB). Finally, the scheme is compared with other existing state-of-the-art methods and gives a reasonably better performance in terms of visual quality and hiding capacity. Our scheme has been evaluated through various steganographic analysis and observed that the scheme is secure and robust against various attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Abadi MAM, Danyali H, Helfroush MS (2010) Reversible watermarking based on interpolation error histogram shifting. In: 2010 5th international symposium on telecommunications (IST). IEEE, pp 840–845

  2. Advith J, Varun KR, Manikantan K (2016) Novel digital image watermarking using DWT-DFT-SVD in YCbCr color space. In: International conference on emerging trends in engineering, technology and science (ICETETS). IEEE, pp 1–6

  3. An L, Gao X, Li X, Tao D, Deng C, Li J (2012) Robust reversible watermarking via clustering and enhanced pixel-wise masking. IEEE Trans Image Process 21(8):3598–3611

    Article  MathSciNet  MATH  Google Scholar 

  4. Celik MU, Sharma G, Saber E, Tekalp AM (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11 (6):585–595

    Article  Google Scholar 

  5. Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-LSB data embedding. IEEE Trans Image Process 14(2):253–266

    Article  Google Scholar 

  6. Chamlawi R, Khan A (2010) Digital image authentication and recovery: employing integer transform based information embedding and extraction. Inform Sci 180(24):4909–4928

    Article  MathSciNet  Google Scholar 

  7. Coltuc D, Chassery JM (2007) Very fast watermarking by reversible contrast mapping. IEEE Signal Process Lett 14(4):255–258

    Article  Google Scholar 

  8. Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687

    Article  Google Scholar 

  9. Etemad E, Samavi S, Soroushmehr SR, Karimi N, Etemad M, Shirani S, Najarian K (2017) Robust image watermarking scheme using bit-plane of hadamard coefficients. Multimed Tools Appl 1–23. https://doi.org/10.1007/s11042-017-5543-7

  10. Fan L, Gao T, Cao Y (2013) Improving the embedding efficiency of weight matrix-based steganography for grayscale images. Comput Electr Eng 39(3):873–881

    Article  Google Scholar 

  11. Fridrich J (1998) Image watermarking for tamper detection. In: 1998 international conference on image processing, 1998. ICIP 98. Proceedings, vol 2. IEEE, pp 404–408

  12. Fridrich J, Goljan M, Baldoza AC (2000) New fragile authentication watermark for images. In: 2000 international conference on image processing, 2000. Proceedings, vol 1. IEEE, pp 446–449

  13. Funt et al. HDR Dataset Computational Vision Lab Computing Science, Simon Fraser University, Burnaby, BC, Canada. http://www.cs.sfu.ca/colour/data/funt_hdr. Accessed 20 Sept 2017

  14. Johnson M, Cherian R (2017) Survey on image tampering detection and recovery techniques. Int J Comput Appl 161(4):18–20

    Google Scholar 

  15. He HJ, Zhang JS, Tian L (2005) A fragile watermarking scheme with discrimination of tampers on image or watermark. Acta Electron Sin 33(9):1557

    Google Scholar 

  16. Holliman M, Memon N (2000) Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans Image Process 9(3):432–441

    Article  Google Scholar 

  17. Hu MC, Lou DC, Chang MC (2007) Dual-wrapped digital watermarking scheme for image copyright protection. Comput Secur 26(4):319–330

    Article  Google Scholar 

  18. Hu Y, Lee HK, Li J (2009) DE-based reversible data hiding with improved overflow location map. IEEE Trans Circuits Syst Video Technol 19(2):250–260

    Article  Google Scholar 

  19. Hsia SC, Jou IC, Hwang SM (2002) A gray level watermarking algorithm using double layer hidden approach. IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences 85(2):463–471

    Google Scholar 

  20. Hwang J, Kim J, Choi J (2006) A reversible watermarking based on histogram shifting. In: International workshop on digital watermarking. Springer, Berlin Heidelberg, pp 348–361

  21. Jana B (2016) High payload reversible data hiding scheme using weighted matrix. Optik-International Journal for Light and Electron Optics 127(6):3347–3358

    Article  Google Scholar 

  22. Jung KH (2017) Authenticable reversible data hiding scheme with less distortion in dual stego-images. Multimed Tools Appl 1–17. https://doi.org/10.1007/s11042-017-4533-0

  23. Kundur D, Hatzinakos D (1999) Digital watermarking for telltale tamper proofing and authentication. Proc IEEE 87(7):1167–1180

    Article  Google Scholar 

  24. Kuo WC, Kuo SH, Wang CC, Wuu LC (2016) High capacity data hiding scheme based on multi-bit encoding function. Optik-International Journal for Light and Electron Optics 127(4):1762–1769

    Article  Google Scholar 

  25. Lee TY, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506

    Article  MathSciNet  MATH  Google Scholar 

  26. Li KF, Chen TS, Wu SC (2001) Image tamper detection and recovery system based on discrete wavelet transformation. In: 2001 IEEE pacific rim conference on communications, computers and signal processing, 2001. PACRIM, vol 1. IEEE, pp 164–167

  27. Lin PL, Huang PW, Peng AW (2004) A fragile watermarking scheme for image authentication with localization and recovery. In: IEEE sixth international symposium on multimedia software engineering, 2004. Proceedings. IEEE, pp 146–153

  28. Lin PL, Hsieh CK, Huang PW (2005) A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 38(12):2519–2529

    Article  Google Scholar 

  29. Lu CS, Huang SK, Sze CJ, Liao HY (2001) A new watermarking technique for multimedia protection. Multimedia Image and Video Processing 507–530

  30. Lou DC, Liu JL, Chang MC (2003) Digital watermarking using multiresolution wavelet transform. In: IEEE 37th annual 2003 international Carnahan conference on security technology, 2003. Proceedings. IEEE, pp 370–377

  31. Lou DC, Liu JL, Tso HK, Chang MC (2005) A grayscale watermarking scheme based on pixel mapping. In: Proceedings of the 18th IPPR conference on computer vision, graphics and image processing (CVGIP 2005), Taipei, Taiwan, ROC, pp 1082-9

  32. Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 5 (1):187–193

    Article  Google Scholar 

  33. Nemade HS, Kelkar V (2016) Reversible watermarking for colored medical images using histogram shifting method. In: 2016 3rd international conference on computing for sustainable global development (INDIACom). IEEE, pp 2664–2668

  34. Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. Circuits and Systems for Video Technology 16(3):354–362

    Article  Google Scholar 

  35. Nottingham Trent University, UK, “UCID Image Database”. http://jasoncantarella.com/downloads/ucid. Accessed 12 Oct 2017

  36. Pal P, Chowdhuri P, Jana B (2017) Reversible watermarking scheme using PVD-DE. In: International conference on computational intelligence, communications, and business analytics. Springer, Singapore, pp 511–524

  37. Panchal UH, Srivastava R (2015) A comprehensive survey on digital image watermarking techniques. In: 2015 fifth international conference on communication systems and network technologies (CSNT). IEEE, pp 591–595

  38. Potdar VM, Han S, Chang E (2005) A survey of digital image watermarking techniques. In: 2005 3rd IEEE international conference on industrial informatics, 2005. INDIN’05. IEEE, Chicago , pp 709–716

  39. Roldan LR, Hernandez MC, Chao J, Miyatake MN, Meana HP (2016) Watermarking-based color image authentication with detection and recovery capability. IEEE Lat Am Trans 14(2):1050–1057

    Article  Google Scholar 

  40. Shieh JM, Lou DC, Chang MC (2005) A robust image watermarking technique based on singular value decomposition. In: Proceedings of the first international conference on information management and business (IMB 2005), Taipei, Taiwan, ROC, pp 346–55

  41. Soleymani SH, Taherinia AH (2016) High capacity image steganography on sparse message of scanned document image (SMSDI). Multimed Tools Appl 76(20):20847–20867

    Article  Google Scholar 

  42. Sreenivas K, Prasad VK (2017) Fragile watermarking schemes for image authentication: a survey. Int J Mach Learn Cybern 1–26. https://doi.org/10.1007/s13042-017-0641-4.

  43. Suthaharan S (2004) Fragile image watermarking using a gradient image for improved localization and security. Pattern Recogn Lett 25(16):1893–1903

    Article  Google Scholar 

  44. Tseng YC, Chen YY, Pan HK (2002) A secure data hiding scheme for binary images. IEEE Trans Commun 50(8):1227–1231

    Article  Google Scholar 

  45. University of Southern California, “The USC-SIPI Image Database”. http://sipi.usc.edu/database/database.php. Accessed 15 Dec 2016

  46. University of California, San Diego, “STARE Image Database”. https://cecas.clemson.edu/ahoover/stare. Accessed 10 Sept 2017

  47. Vaishnavi D, Subashini TS (2015) Robust and invisible image watermarking in RGB color space using SVD. Procedia Computer Science 46:1770–1777

    Article  Google Scholar 

  48. Wang CL, Hwang RH, Chen TS, Lee HY (2005) Detecting and restoring system of tampered image based on discrete wavelet transformation and block truncation coding. In: 19th international conference on advanced information networking and applications, 2005. AINA 2005, vol 2. IEEE, pp 79–82

  49. Wo Y, Han GQ, Zhang B (2005) New feature-based image content authentication algorithm. Jisuanji Xuebao (Chin J Comput) 28(1):105–112

    Google Scholar 

  50. Wong PW (1998) A public key watermark for image verification and authentication. In: 1998 international conference on image processing, 1998. ICIP 98. Proceedings, vol 1. IEEE, pp 455–459

  51. Wong PW, Memon ND (2000) Secret and public key authentication watermarking schemes that resist vector quantization attack. In: Security and watermarking of multimedia contents II, vol 3971. International Society for Optics and Photonics, pp 417–428

  52. Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10 (10):1593–1601

    Article  MATH  Google Scholar 

  53. Yang CN, Hsu SC, Kim C (2017) Improving stego image quality in image interpolation based data hiding. Computer Standards & Interfaces 50:209–215

    Article  Google Scholar 

  54. Yin M (2017) Multimedia authentication for copyright protection. In: IOP conference series: earth and environmental science, vol 69, no 1. IOP Publishing, p 012160

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Biswapati Jana.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pal, P., Chowdhuri, P. & Jana, B. Weighted matrix based reversible watermarking scheme using color image. Multimed Tools Appl 77, 23073–23098 (2018). https://doi.org/10.1007/s11042-017-5568-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-5568-y

Keywords

Navigation