A self recoverable dual watermarking scheme for copyright protection and integrity verification

Dual watermarking implies embedding of robust as well as fragile watermarks into the same cover image. It facilitates integration of copyright protection and integrity verification into the same scheme. However, most of such existing state of art approaches either lacked the feature of tamper detection and original content recovery or provided an approximation using coarser block level approach. The proposed self recoverable dual watermarking scheme integrates all the aforementioned functionalities of copyright protection, tamper detection and recovery into one scheme. The scheme is independent of the order of embedding of robust and fragile watermarks as these are embedded in different regions of the cover image. It performs tamper detection and recovery, both at the pixel level. The scheme obtains recovery information for each 2×2 image block in just eight bits which are further encoded to only four bits via mapping table. This reduction in recovery bits allows efficient embedding of copyright information which is tested against comprehensive set of attacks. The scheme is found to be robust against noises, filtering, histogram equalization, rotation, jpeg compression, motion blur etc. Besides the normalized cross correlation value, the evaluation of the extracted copyright information is also being done using various objective error metrics based on mutual relation between pixels, their values and locations respectively. The imperceptibility and visual quality of the watermarked as well as recovered image is found to be satisfactorily high. Three major categories of images: natural, texture as well as satellite have been tested in the proposed scheme. Even minute alterations can be chalked out as the detection accuracy rate has been enumerated on pixel basis. The scheme can tolerate tampering ratios upto 50 percent though the visual quality of the recovered image deteriorates with increasing tampering ratio. Comparative results based on normalized cross correlation, probability of false acceptance, probability of false rejection and peak signal to noise ratio metrics validate the efficacy of the proposed scheme over other existing state of art approaches.

[1]  Shi-Jinn Horng,et al.  An improved SVD-based watermarking technique for copyright protection , 2012, Expert Syst. Appl..

[2]  C. Das,et al.  A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation , 2014 .

[3]  Guoqiang Ren,et al.  Rate pre-allocated compression for mapping image based on wavelet and rate-distortion theory , 2013 .

[4]  Liang Bin Zheng,et al.  A DWT-DCT based blind watermarking algorithm for copyright protection , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[5]  Baifeng Wu,et al.  A self-embedded watermarking scheme based on relationship function of corresponding inter-blocks DCT coefficient , 2009, 2009 13th International Conference on Computer Supported Cooperative Work in Design.

[6]  Fan Chen,et al.  Alterable-capacity fragile watermarking scheme with restoration capability , 2012 .

[7]  Zhoufeng Liu,et al.  Semi-fragile self-recoverable watermarking algorithm based on wavelet group quantization and double authentication , 2014, Multimedia Tools and Applications.

[8]  SANJAY RAWAT,et al.  A Chaos-Based Robust Watermarking Algorithm for Rightful Ownership Protection , 2011, Int. J. Image Graph..

[9]  Pingzhi Fan,et al.  Copyright Protection for E-Government Document Images , 2012, IEEE MultiMedia.

[10]  J.M. Ferryman,et al.  PETS Metrics: On-Line Performance Evaluation Service , 2005, 2005 IEEE International Workshop on Visual Surveillance and Performance Evaluation of Tracking and Surveillance.

[11]  Minyi Guo,et al.  A blind image copyright protection scheme for e-government , 2013, J. Vis. Commun. Image Represent..

[12]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[13]  Pingzhi Fan,et al.  An adaptive watermarking scheme for e-government document images , 2013, Multimedia Tools and Applications.

[14]  Chih-Hsien Hsia,et al.  Efficient modified directional lifting-based discrete wavelet transform for moving object detection , 2014, Signal Process..

[15]  B. Chandra Mohan,et al.  A Robust Image Watermarking Scheme using Singular Value Decomposition , 2008, J. Multim..

[16]  Asifullah Khan,et al.  Digital image authentication and recovery: Employing integer transform based information embedding and extraction , 2010, Inf. Sci..

[17]  Suneeta Agarwal,et al.  An efficient fragile watermarking scheme with multilevel tamper detection and recovery based on dynamic domain selection , 2015, Multimedia Tools and Applications.

[18]  Wilhelm Burger,et al.  Digital Image Processing - An Algorithmic Introduction using Java , 2008, Texts in Computer Science.

[19]  Amit Phadikar,et al.  Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images , 2012, J. Vis. Commun. Image Represent..

[20]  Shutian Liu,et al.  Watermarking based on discrete fractional random transform , 2007 .

[21]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[22]  Min-Jen Tsai,et al.  Authentication and recovery for wavelet-based semifragile watermarking , 2008 .

[23]  Heng-Ming Tai,et al.  Block-Chain Based Fragile Watermarking Scheme with Superior Localization , 2008, Information Hiding.

[24]  Santa Agreste,et al.  A new approach to pre-processing digital image for wavelet-based watermark , 2008 .

[25]  Zhenxing Qian,et al.  Reference Sharing Mechanism for Watermark Self-Embedding , 2011, IEEE Transactions on Image Processing.

[26]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[27]  Ming-Shi Wang,et al.  A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography , 2009, Comput. Stand. Interfaces.

[28]  Jean-Christophe Lapayre,et al.  A new scheme of robust image watermarking: the double watermarking algorithm , 2007, SCSC.

[29]  Balasubramanian Raman,et al.  Visual-cryptography-based blind watermarking scheme for copyright protection , 2013 .

[30]  Wenbo Liu,et al.  Color image authentication based on spatiotemporal chaos and SVD , 2008 .

[31]  Pingzhi Fan,et al.  A low cost fragile watermarking scheme in H.264/AVC compressed domain , 2014, Multimedia Tools and Applications.

[32]  Ioannis Pitas,et al.  Robust image watermarking in the spatial domain , 1998, Signal Process..

[33]  Bin Ma,et al.  Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme , 2012, Comput. Stand. Interfaces.

[34]  Lama Rajab,et al.  A Robust-Fragile Dual Watermarking System in the DCT Domain , 2005, KES.

[35]  Young-Chang Hou,et al.  Copyright protection scheme for digital images using visual cryptography and sampling methods , 2005 .

[36]  Heng-Ming Tai,et al.  Chaos-based self-embedding fragile watermarking with flexible watermark payload , 2012, Multimedia Tools and Applications.

[37]  김인택 [서평]「Information Hiding Techniques for Steganography and Digital Watermarking」 , 2000 .

[38]  Pingzhi Fan,et al.  An Efficient Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization , 2008, IEEE Transactions on Multimedia.

[39]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[40]  Gang Chen,et al.  Full 4-D quaternion discrete Fourier transform based watermarking for color images , 2014, Digit. Signal Process..

[41]  Shi-Jinn Horng,et al.  A blind reversible method for watermarking relational databases based on a time-stamping protocol , 2012, Expert Syst. Appl..

[42]  Haiping Lu,et al.  Distance-reciprocal distortion measure for binary document images , 2004, IEEE Signal Processing Letters.

[43]  Shinfeng D. Lin,et al.  Dual watermark for image tamper detection and recovery , 2008, Pattern Recognit..