Keywords

1 Introduction

Digital watermarking schemes protect the integrity and authenticity of the digital images. The watermarking schemes are broadly categorized as robust, fragile and semi-fragile. Robust watermarks are designed to resist attempts to remove or destroy the watermark. The fragile watermarks are designed to be easily destroyed for the minor manipulation on the watermarked image. A semi-fragile watermark combines the properties of fragile and robust watermarks [2]. The semi-fragile watermarks are robust against most of the incidental attacks and fragile to the intentional attacks. Many efforts on semi-fragile watermarking schemes were found in literature. Chang et al. [3] proposed a semi-fragile watermarking technique to improve the tamper detection sensitivity by analyzing and observing the impact of various image manipulations on the wavelet transformed coefficients. In [46], semi-fragile watermarking schemes based on the Computer Generated Hologram coding techniques were described. Maeno et al. [7] presented a semi-fragile watermarking scheme for extracting content-based image features from the approximation sub-band in the wavelet domain, to generate two complementary watermarks. A blind semi-fragile watermarking scheme for medical images was discussed in [8]. Wu et al. [9] proposed a semi-fragile watermarking scheme through parameterized Integer Wavelet transform.

A new watermarking approach based on Discrete Curvelet Transforms (DCLT) [10] was developed in [1]. In this method, a logo watermark is embedded into first level DCLT coefficients using an additive embedding scheme controlled by visibility parameter. The existing method [1] has many limitations. The Normalized Correlation Coefficient (NCC) values drops after a variance of 0.05 for the noise attacks. The existing method [1] is not completely blind as the first level coarse DCLT coefficients and visibility factor needs to be communicated to the receiver. In this paper, a blind semi-fragile watermarking is proposed that addresses all the afore-mentioned limitations. The authentication is performed based on the fact that incidental attacks do not change information content and the average energy in a block substantially. The rest of the paper is organized as follows: The proposed methodology is explained in Sect. 2. Section 3 presents the experimental results and comparative analysis. Discussions are carried out in Sect. 4. The conclusions are summarized in Sect. 5.

2 Proposed Semi-fragile Watermarking Scheme

Curvelet transform has been developed to overcome the limitations of wavelet and Gabor filters [11]. To achieve a complete coverage of the spectral domain and to capture more orientation details, curvelet transform has been developed [12]. The Digital Curvelet Transform (DCLT) is usually implemented in the frequency domain for higher efficiency reasons [13]. The implementation of DCLT is performed either using wrapping or unequally spaced fast Fourier transform (USFFT) algorithms [14]. In this paper, a novel method for semi-fragile watermarking using DCLT for authentication and tamper detection of digital images is presented.

2.1 Watermark Embedding

The process of generating and embedding watermark is depicted in Fig. 1. The input image is a gray scale image and is transformed using DCLT. The watermark is generated from the first level coarse DCLT coefficients.

Fig. 1
figure 1

Semi-fragile watermark embedding process

These coefficients are quantized into four bits and embedded into the first level coarse DCLT coefficients at the locations determined using pseudo random method [15]. Subsequently, inverse DCLT is applied to get watermarked image. Suppose the size of the input image is N × N, then the number of scales used in DCLT is varied from \( 2\;{\text{to}}\;{ \log }_{2} (N) \). The perceptual quality of the watermarked image is measured using Peak Signal to Noise Ratio (PSNR) [16]. The average PSNR values of all the images in the corpus for different dimensions of the input image at different scales used in DCLT are shown in Table 1. It is observed from the values shown in Table 1 that, if the number of scales is less than or equal to \( ({ \log }_{2} (N) - 3) \), there is a significant increase in PSNR values.

Table 1 PSNR values of the watermarked image at different scales of DCLT

The coarse coefficients of first level DCLT are extracted. The coefficients are quantized into 4 bits. The number of Least Significant Bits (LSBs) to be used is a tradeoff between accuracy of tamper detection and imperceptibility of the watermarked image. The accuracy of tamper detection is evaluated using the following equation:

$$ Accuracy\,of\,Tamper\,Detection = \frac{Average\,Number\,of\,bits\,identified\,as\,tampered}{Average\,Number\,of\,bits\,actually\,tampered} $$
(1)

It can be observed from the values shown in Table 2 that the accuracy of tamper detection values is more than 90 % for the number of bits used for quantization is above 3. It can also be inferred from the computed PSNR values that imperceptibility of the image and high accuracy of tamper detection decreases in large amount after 4 bits.

Table 2 Accuracy of the tamper detection and PSNR of the watermarked image

Each of the first level coarse DCLT coefficient is quantized to 4 bits and embedded into a coarse coefficient, whose location is decided by a pseudo random permutation [15]. The embedding of the watermark is done according to the Eq. (2) as follows:

$$ D_{{l_{k} }} (m,n) = D_{{l_{k} }}^{q} (i,j)\,k = 1 \ldots 4 $$
(2)

where, \( D_{{l_{k} }} (m,n) \)—kth LSB of the coarse first level DCLT coefficient at (m, n), \( D_{{l_{k} }}^{q} (i,j) \)—kth LSB of the quantized coarse first level DCLT coefficient at (i, j).

2.2 Watermark Extraction

The watermarked image may be subjected to incidental or intentional attacks during transmission. Checking the integrity and authenticity of the watermarked image are carried out during watermark extraction process. The process of watermark extraction is shown in Fig. 2. The watermarked image is transformed using first level DCLT.

Fig. 2
figure 2

Semi-fragile watermark extraction process

The watermark is extracted from four LSBs of each first level DCLT coarse coefficient. It is inversely permuted and dequantized. At the receiver, tamper assessment is carried out by dividing the dequantized and generated first level coarse DCLT coefficients into blocks of uniform size. We have conducted experiments to determine the appropriate size of block for tamper assessment. The average accuracy and processing time required for tamper detection for all the images in the corpus is shown in Table 3. It can be observed from the values in Table 3 that, the tamper detection accuracy and processing time decreases with increase in the size of the block. We have arrived to the decision that the size of the block is set to 3 × 3 which is enough to achieve better (94 %) tamper assessment with reasonable processing time.

Table 3 Accuracy of tamper detection and processing time for varying size of the blocks

The energy of the dequantized and first level coarse DCLT coefficients are computed using the Eqs. (3) and (4) as follows:

$$ E_{1} = \frac{1}{N \times N}\mathop \sum \limits_{i = 1}^{N} \mathop \sum \limits_{j = 1}^{N} \left| {D(i,j)} \right| $$
(3)
$$ E_{2} = \frac{1}{N \times N}\mathop \sum \limits_{i = 1}^{N} \mathop \sum \limits_{j = 1}^{N} \left| {D_{e} (i,j)} \right| $$
(4)

where, N = 3, size of each block, \( E_{1} \)—energy of each block of the first level DCLT coarse coefficients of the watermarked image, \( E_{2} \)—corresponding energy from the watermarked image, D(i, j)—generated first level DCLT coarse coefficient at (i, j) from the watermarked image, and De(i, j)—extracted first level DCLT coarse coefficient at location (i, j) from the watermarked image. The tamper assessment is performed using the Eqs. (5) and (6) as below:

$$ T = \frac{{\left| {E_{1} - E_{2} } \right|}}{{\text{MAX}_{E} }} $$
(5)
$$ a(i) = \left\{ {\begin{array}{*{20}l} {{\text{tampered}},} \hfill & {T > 0.4} \hfill \\ {^{\prime\prime}\text{not}\,\text{tampered}^{\prime\prime} ,} \hfill & {otherwise} \hfill \\ \end{array} } \right. $$
(6)

where, MAXE—Maximum energy possible in first level coarse DCLT coefficient and T- tamper value and a(i)—Authentication status of each block i.

3 Experimental Results

We have created a corpus of different types of images for testing the proposed semi-fragile watermarking system. The corpus consist of various categories of images like Cheque, ID cards, Bills, Certificates, Marks cards and few images taken from the standard image database USC-SIPI [17]. The existing method [1] and the proposed method has been tested for tamper detection of all the images in the corpus. The results of tamper detection for the two sample cases which involves tampering of text and image respectively is shown in Fig. 3. It is evident from the visual inspection of results shown in Fig. 3 that the detection of tampered locations is more accurate in the case of proposed method.

Fig. 3
figure 3

Results of tamper detection. a Text tampering. b Image tampering

4 Discussions

A comparative analysis of fragility and robustness of the existing [1] and proposed method are performed and are discussed in detail in the following subsections.

4.1 Robustness Analysis

The robustness is evaluated using the parameter Normalization Correlation Coefficient (NCC) [16] between the extracted and received first level DCLT coarse coefficients. The NCC values are computed for both existing method [1] and proposed method by varying the variance parameter of the noise. The graph is plotted for NCC values for each type of noise and is shown in Fig. 4. It is evident from Fig. 4 that the NCC values drop substantially for the existing method [1] for variance greater than 5. The watermarked image is also subjected to JPEG compression by varying the amount of compression. A plot depicting the robustness performance of the existing [1] and proposed schemes in terms of NCC values is shown in Fig. 5. It is observed from Fig. 5 that for quality factors from 15  to 5 %, NCC values are better for proposed scheme than the existing scheme [1].

Fig. 4
figure 4

Robustness under noise attacks

Fig. 5
figure 5

Robustness against JPEG compression

4.2 Fragility Analysis

The fragility is decided based on the tamper assessment capabilities of a semi-fragile watermarking scheme. We have tested all the images in the corpus for different types of tampering namely (i) inserting a new content (ii) deleting the existing content (iii) modifying an existing content and (iv) performing multiple attacks in the same image.

The performance of detection of tampered regions for both existing method [1] and proposed method is measured in terms of parameter accuracy of tamper detection using Eq. (3). The tamper detection values in Table 4 reveals that, the proposed method results in better accuracy than the existing method [1]. The average accuracy of tamper detection is around 94 % and at least 10 % more than existing method [1]. However, there is a failure of around 6 % in accurate detection and localization of tamper.

Table 4 Analysis of tamper detection against various intentional attacks

5 Discussions

A blind semi-fragile watermarking scheme based on DCLT has been proposed in this paper. From the results, it is inferred that this method exhibits higher NCC values and thus, more robust than the existing method [1]. The proposed approach leads to significant improvement in detection of tampered regions in the watermarked image compared to the existing method [1]. The proposed work can be further enhanced by using more sophisticated measures for evaluating tamper detection in an image. By embedding into selected curvelet coefficients, it could be possible to improve the accuracy of tamper detection and at the same time the embedding process could be made inexpensive. The selection of curvelet coefficients is considered as future work of the current study.