Skip to main content

A Novel Invisible Watermarking Approach for Double Authentication of Image Content

  • Conference paper
  • First Online:
Machine Learning, Image Processing, Network Security and Data Sciences (MIND 2020)

Abstract

Nowadays, digital watermarking approaches are proposed for content authentication of digital images. Digital watermarking is a technique that is used to embed watermarks into a digital image. In this work, a novel double authentication mechanism is proposed to ensure the authenticity of image content based on the hash function and signature value. The suggested technique is capable of finding malicious image manipulation even if simple image processing operations have unintentionally corrupted them. Using the hash function, the difficulty level of finding embedded bits is increased and this scheme also withstands any kind of attacks. Moreover, the proposed technique is simple which is based on modifying a single pixel value in the host image itself using the surrounding pixels i.e., neighboring pixels. Experimental results are shown to illustrate the system’s capability to detect unauthorized image alteration.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. AEU - Int. J. Electron. Commun. 70(8), 1055–1061 (2016)

    Google Scholar 

  2. Abdelhakim, A., Saleh, H.I., Abdelhakim, M.: Fragile watermarking for image tamper detection and localization with effective recovery capability using k-means clustering. Multimed. Tools Appl. 78(22), 32523–32563 (2019). https://doi.org/10.1007/s11042-019-07986-3

    Article  Google Scholar 

  3. Abdulrahman, A.K., Ozturk, S.: A novel hybrid DCT and DWT based robust watermarking algorithm for color images. Multimed. Tools Appl. 78(12), 17027–17049 (2019). https://doi.org/10.1007/s11042-018-7085-z

    Article  Google Scholar 

  4. Ali, M., Ahn, C.W., Pant, M.: An efficient lossless robust watermarking scheme by integrating redistributed invariant wavelet and fractional fourier transforms. Multimed. Tools Appl. 77(10), 11751–11773 (2018). https://doi.org/10.1007/s11042-017-4815-6

    Article  Google Scholar 

  5. Ali, S.A., Jawad, M.J., Naser, M.A.: A semi-fragile watermarking based image authentication. J. Eng. Appl. Sci. 12(6), 1582–1589 (2017)

    Google Scholar 

  6. Cox, I.J., Miller, M.L., Bloom, J.A.: Watermarking applications and their properties. In: Proceedings of the International Conference on Information Technology: Coding and Computing, pp. 6–10. IEEE (2000)

    Google Scholar 

  7. Gul, E., Ozturk, S.: A novel hash function based fragile watermarking method for image integrity. Multimed. Tools Appl. 78(13), 17701–17718 (2019). https://doi.org/10.1007/s11042-018-7084-0

    Article  Google Scholar 

  8. Hsu, C.T., Wu, J.L.: Hidden digital watermarks in images. IEEE Trans. Image Process. 8(1), 58–68 (1999)

    Article  Google Scholar 

  9. Li, C., Zhang, A., Liu, Z., Liao, L., Huang, D.: Semi-fragile self-recoverable watermarking algorithm based on wavelet group quantization and double authentication. Multimed. Tools Appl. 74(23), 10581–10604 (2014). https://doi.org/10.1007/s11042-014-2188-7

    Article  Google Scholar 

  10. Lu, C.S., Liao, H.Y.: Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Trans. Multimed. 5(2), 161–173 (2003)

    Article  Google Scholar 

  11. Merkle, R.C.: One way hash functions and DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 428–446. Springer, New York (1990). https://doi.org/10.1007/0-387-34805-0_40

    Chapter  Google Scholar 

  12. Moosazadeh, M., Ekbatanifard, G.: A new DCT-based robust image watermarking method using teaching-learning-based optimization. J. Inf. Secur. Appl. 47, 28–38 (2019)

    Google Scholar 

  13. Nazari, M., Sharif, A., Mollaeefar, M.: An improved method for digital image fragile watermarking based on chaotic maps. Multimed. Tools Appl. 76(15), 16107–16123 (2016). https://doi.org/10.1007/s11042-016-3897-x

    Article  Google Scholar 

  14. Nguyen, T.S., Chang, C.C., Yang, X.Q.: A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. AEU-Int. J. Electron. Commun. 70(8), 1055–1061 (2016)

    Article  Google Scholar 

  15. Parekh, M., Bidani, S., Santhi, V.: Spatial domain blind watermarking for digital images. In: Pattnaik, P.K., Rautaray, S.S., Das, H., Nayak, J. (eds.) Progress in Computing, Analytics and Networking. AISC, vol. 710, pp. 519–527. Springer, Singapore (2018). https://doi.org/10.1007/978-981-10-7871-2_50

    Chapter  Google Scholar 

  16. Patel, H.A., Divecha, N.H.: A feature-based semi-fragile watermarking algorithm for digital color image authentication using hybrid transform. In: Bhatia, S.K., Mishra, K.K., Tiwari, S., Singh, V.K. (eds.) Advances in Computer and Computational Sciences. AISC, vol. 554, pp. 455–465. Springer, Singapore (2018). https://doi.org/10.1007/978-981-10-3773-3_44

    Chapter  Google Scholar 

  17. Qianli, Y., Yanhong, C.: A digital image watermarking algorithm based on discrete wavelet transform and discrete cosine transform. In: 2012 International Symposium on Information Technology in Medicine and Education (ITME), vol. 2, pp. 1102–1105. IEEE (2012)

    Google Scholar 

  18. Qin, C., Ji, P., Wang, J., Chang, C.C.: Fragile image watermarking scheme based on VQ index sharing and self-embedding. Multimed. Tools Appl. 76(2), 2267–2287 (2017). https://doi.org/10.1007/s11042-015-3218-9

    Article  Google Scholar 

  19. Qin, C., Wang, H., Zhang, X., Sun, X.: Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode. Inf. Sci. 373, 233–250 (2016)

    Article  Google Scholar 

  20. Singh, A.K.: Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed. Tools Appl. 76(6), 8881–8900 (2016). https://doi.org/10.1007/s11042-016-3514-z

    Article  Google Scholar 

  21. Singh, D., Singh, S.K.: DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimed. Tools Appl. 76(1), 953–977 (2017). https://doi.org/10.1007/s11042-015-3010-x

    Article  Google Scholar 

  22. Sreenivas, K., Kamkshi Prasad, V.: Fragile watermarking schemes for image authentication: a survey. Int. J. Mach. Learn. Cybern. 9(7), 1193–1218 (2017). https://doi.org/10.1007/s13042-017-0641-4

    Article  Google Scholar 

  23. Verma, V.S., Jha, R.K., Ojha, A.: Significant region based robust watermarking scheme in lifting wavelet transform domain. Expert Syst. Appl. 42(21), 8184–8197 (2015)

    Article  Google Scholar 

  24. Wu, X., Li, J., Tu, R., Cheng, J., Bhatti, U.A., Ma, J.: Contourlet-DCT based multiple robust watermarkings for medical images. Multimed. Tools Appl. 78(7), 8463–8480 (2019). https://doi.org/10.1007/s11042-018-6877-5

    Article  Google Scholar 

  25. Yang, C.W., Shen, J.J.: Recover the tampered image based on VQ indexing. Sig. Process. 90(1), 331–343 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Brindha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Vidhya, R., Brindha, M. (2020). A Novel Invisible Watermarking Approach for Double Authentication of Image Content. In: Bhattacharjee, A., Borgohain, S., Soni, B., Verma, G., Gao, XZ. (eds) Machine Learning, Image Processing, Network Security and Data Sciences. MIND 2020. Communications in Computer and Information Science, vol 1240. Springer, Singapore. https://doi.org/10.1007/978-981-15-6315-7_27

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-6315-7_27

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-6314-0

  • Online ISBN: 978-981-15-6315-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics