Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Advertisement

Scientific Reports
  • View all journals
  • Search
  • My Account Login
  • Content Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • RSS feed
  1. nature
  2. scientific reports
  3. articles
  4. article
A robust zero-watermarking and signcryption scheme for image copyright protection and license verification
Download PDF
Download PDF
  • Article
  • Open access
  • Published: 14 February 2026

A robust zero-watermarking and signcryption scheme for image copyright protection and license verification

  • Pham Thai Hung1 &
  • Ta Minh Thanh1 

Scientific Reports , Article number:  (2026) Cite this article

We are providing an unedited version of this manuscript to give early access to its findings. Before final publication, the manuscript will undergo further editing. Please note there may be errors present which affect the content, and all legal disclaimers apply.

Subjects

  • Engineering
  • Mathematics and computing

Abstract

Zero-watermarking (ZW) presents a promising approach for safeguarding image copyright, as it does not alter the original image, a crucial feature for preserving the integrity of medical and high-fidelity visual data. Nevertheless, numerous existing ZW techniques are susceptible to geometric distortions and signal-processing attacks, thereby offering limited protection for ownership and licensing information. This paper proposes a robust and secure zero-watermarking scheme for medical and natural color images that jointly supports ownership authentication and license verification. The method combines entropy- and SIFT-based sub-region selection, DWT-DCT feature extraction, and XOR fusion between robust features and an Arnold-scrambled logo, followed by an ElGamal-style signcryption of the resulting share. Multiple local zero-watermarks are registered in a Certification Authority (CA), enabling global watermark reconstruction without altering the original image. Experimental results show that the normalized correlation (NC) between the recovered and watermark remains above 0.99 under various geometric and non-geometric attacks, confirming the robustness of the scheme. In addition, the signcryption module incurs low computational overhead, with both the encryption and joint decryption–verification processes requiring approximately 8.5 milliseconds. This overhead is small compared with the transform-based processing time and yields a favorable trade-off between enhanced cryptographic protection of ownership/license records and the computational efficiency required for practical medical imaging and large-scale copyright management systems.

Similar content being viewed by others

Robust zero-watermarking for color images using hybrid deep learning models and encryption

Article Open access 07 August 2025

A reversible-zero watermarking scheme for medical images

Article Open access 27 July 2024

Convolutional neural network and wavelet composite against geometric attacks a watermarking approach

Article Open access 26 August 2025

Data availability

The medical images used in this study were randomly selected from the publicly available The Cancer Imaging Archive (TCIA) repository and can be accessed at: [https://nbia.cancerimagingarchive.net/nbia-search/](https:/nbia.cancerimagingarchive.net/nbia-search) . In addition, three standard color images were obtained from the widely used USC-SIPI image database, available at: [http://sipi.usc.edu/database/](http:/sipi.usc.edu/database) . All datasets analysed during the current study are publicly available from the above repositories and were used in accordance with their respective terms of use.No additional permission or informed consent is required to publish or reuse the images used in this study. The medical images were obtained from The Cancer Imaging Archive (TCIA), which provides publicly available datasets that have been fully de-identified in accordance with applicable ethical and legal standards, including HIPAA. Therefore, the images do not contain any personally identifiable information. The color images were taken from the USC-SIPI standard image database, which is a publicly available benchmark dataset widely used for research and reproducibility purposes. Consequently, all images used in this study can be safely employed for reproducibility without ethical or consent-related restrictions.

Code availability

The core implementation of the proposed zero-watermarking framework is publicly available at: https://github.com/hungpt-mta/zero-watermarking-core. The provided code is sufficient to run the benchmarking procedures described in this paper. The experimental datasets are not redistributed within the code repository, but are publicly available from The Cancer Imaging Archive (TCIA) and the USC-SIPI image database, and can be obtained directly from their respective sources.

References

  1. Nha, P. T., Thanh, T. M. & Phong, N. T. Consideration of a robust watermarking algorithm for color images using improved QR decomposition. Soft. Comput. 26(11), 5069–5093. https://doi.org/10.1007/s00500-022-06975-3 (2022).

    Google Scholar 

  2. Iwakiri, M. & Thanh, T. M. Incomplete cryptography method using invariant Huffman code length for digital rights management. In Proc. IEEE Int. Conf. Advanced Information Networking and Applications (AINA), 763–770. https://doi.org/10.1109/AINA.2012.112 (2012).

  3. Gaur, S. & Barthwal, V. An extensive analysis of digital image watermarking techniques. Int. J. Intell. Syst. Appl. Eng. 12(1), 121–145 (2023).

    Google Scholar 

  4. Rana, M. S., Hasan, M. M. & Shuva, S. K. S. Digital image watermarking using discrete wavelet transform and discrete cosine transform with noise identification. In Proc. 2nd Int. Conf. Intelligent Technologies (CONIT), 1–4. https://doi.org/10.1109/CONIT55038.2022.9847745 (2022).

  5. Thanh, T. M. & Tanaka, K. A novel q-DWT for blind and robust image watermarking. In Proc. IEEE Int. Symp. Personal, Indoor and Mobile Radio Communications (PIMRC), 2061–2065. https://doi.org/10.1109/PIMRC.2014.7136511 (2014).

  6. Thanh, T. M. & Thanh, N. T. Extended DCT domain for improving the quality of watermarked images. In Proc. Int. Conf. Knowledge and Systems Engineering (KSE), 336–339. https://doi.org/10.1109/KSE.2015.70 (2015).

  7. Iwakiri, M. & Thanh, T. M. Fundamental incomplete cryptography method for digital rights management based on JPEG lossy compression. In Proc. IEEE Int. Conf. Advanced Information Networking and Applications (AINA), 755–762. https://doi.org/10.1109/AINA.2012.111 (2012).

  8. Xia, Y. et al. An adaptive blind color watermarking scheme based on Hadamard transform and information mapping system. Circuits Syst. Signal. Process. 44(5), 3432–3465. https://doi.org/10.1007/s00034-024-02971-0 (2025).

    Google Scholar 

  9. Beggari, A. S., Wali, A., Khaldi, A., Kafi, M. R. & Sahu, A. K. Secure and imperceptible medical image watermarking via multiscale QR embedding and attention-based optimization. Eng. Sci. Technol. Int. J. 73, 102250. https://doi.org/10.1016/j.jestch.2025.102250 (2026).

    Google Scholar 

  10. Sahu, A. K. & Mishra, S. (eds) Fortressing Pixels: Information Security for Images, Videos, Audio and Beyond https://doi.org/10.1049/PBSE030E (IET, 2024).

  11. Sayah, M. M., Zermi, N., Khaldi, A. & Kafi, M. R. ECG signal protection using redundant discrete wavelet transform-based data hiding. In Fortressing Pixels: Information Security for Images, Videos, Audio and Beyond (eds Deb, S. et al.) ch. 2, https://doi.org/10.1049/PBSE030E_ch2 (The Institution of Engineering and Technology (IET), 2025).

  12. Bekkari, F., Kafi, M. & Khaldi, A. Hybrid deep semantic query expansion using multi-objective fireworks-transformer optimization: a reinforcement learning approach. Evol. Intel. 18, 122. https://doi.org/10.1007/s12065-025-01109-8 (2025).

    Google Scholar 

  13. Beggari, A. S., Wali, A., Khaldi, A., Kafi, M. R. & Sahu, A. K. Robust medical image watermarking based on ridgelet transform and ant colony optimization for telemedicine security. Syst. Soft Comput. 7, 200390. https://doi.org/10.1016/j.sasc.2025.200390 (2025).

  14. Beggari, A. S., Wali, A., Khaldi, A., Kafi, M. R. & Sahu, A. K. Robust and imperceptible medical image watermarking for telemedicine applications based on transform-domain and neural clustering techniques. J. Franklin Inst. 362(15), 108039. https://doi.org/10.1016/j.jfranklin.2025.108039 (2025).

    Google Scholar 

  15. Beggari, A. S., Wali, A., Khaldi, A., Kafi, M. R. & Sahu, A. K. FDCT-based watermarking for robust and imperceptible medical image protection. Intelligence-Based Med. 12, 100280. https://doi.org/10.1016/j.ibmed.2025.100280 (2025).

    Google Scholar 

  16. Sahu, A. K. & Sahu, M. Hybrid fragile image watermarking for tamper detection, localization and dual self-recovery. Eng. Sci. Technol. Int. J. 73, 102266. https://doi.org/10.1016/j.jestch.2025.102266 (2026).

  17. Fang, Y. et al. Robust zero-watermarking algorithm for medical images based on SIFT and bandelet-DCT. Multimedia Tools Appl. 81(12), 16863–16879. https://doi.org/10.1007/s11042-022-12592-x (2022).

    Google Scholar 

  18. Su, Q., Liu, D. & Sun, Y. A robust adaptive blind color image watermarking scheme for resisting geometric attacks. Inf. Sci. 606, 194–212. https://doi.org/10.1016/j.ins.2022.05.046 (2022).

    Google Scholar 

  19. Hu, H. T. & Lee, T. T. Robust complementary dual image watermarking in subbands derived from the laplacian pyramid, discrete wavelet transform, and directional filter bank. Circuits Syst. Signal. Process. 41(7), 4090–4116. https://doi.org/10.1007/s00034-022-01975-y (2022).

    Google Scholar 

  20. Yuan, Y. et al. Robust zero-watermarking algorithm based on discrete wavelet transform and Daisy descriptors for encrypted medical images. CAAI Trans. Intell. Technol. 9(1), 40–53. https://doi.org/10.1049/cit2.12282 (2024).

    Google Scholar 

  21. Yuan, X. C. & Li, M. Local multi-watermarking method based on robust and adaptive feature extraction. Sig. Process. 149, 103–117. https://doi.org/10.1016/j.sigpro.2018.03.007 (2018).

    Google Scholar 

  22. Thanh, T. M. et al. Robust semi-blind video watermarking based on frame-patch matching. AEU – Int. J. Electron. Commun. 68(10), 1007–1015. https://doi.org/10.1016/j.aeue.2014.05.004 (2014).

    Google Scholar 

  23. Alcantarilla, P. F. et al. KAZE features, in Computer Vision – ECCV 2012, (eds Fitzgibbon, A.) 214–227 (Springer, 2012).

  24. Pham, V. Q. et al. Geometrically invariant object-based watermarking using SIFT features. In Proc. IEEE Int. Conf. Image Processing (ICIP), Vol. 5, 473–476. https://doi.org/10.1109/ICIP.2007.4379868 (2007).

  25. Hung, P. T. & Thanh, T. M. A strategy to select feature points for robust zero-watermarking algorithms. In Proc. RIVF Int. Conf. Computing and Communication Technologies, 63–67. https://doi.org/10.1109/RIVF64335.2024.11009088 (2024).

  26. Tsai, H. H., Lai, Y. S. & Lo, S. C. A zero-watermark scheme with geometrical invariants using SVM and PSO against geometric attacks. J. Syst. Softw. 86(2), 335–348. https://doi.org/10.1016/j.jss.2012.08.040 (2013).

    Google Scholar 

  27. Nawaz, S. A. et al. Medical image zero-watermarking algorithm based on dual-tree complex wavelet transform, AlexNet, and discrete cosine transform. Appl. Soft Comput. 169, 112556. https://doi.org/10.1016/j.asoc.2024.112556 (2025).

  28. Lowe, D. G. Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60(2), 91–110 (2004).

    Google Scholar 

  29. Shannon, C. E. A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379–423, 27(4), 623–656 (1948).

  30. Mallat, S. A theory for multiresolution signal decomposition: the wavelet representation. IEEE Trans. Pattern Anal. Mach. Intell. 11(7), 674–693 (1989).

    Google Scholar 

  31. Ahmed, N., Natarajan, T. & Rao, K. R. Discrete cosine transform. IEEE Trans. Computers. C-23(1), 90–93 (1974).

    Google Scholar 

  32. Arnold, V. I. & Avez, A. Ergodic Problems of Classical Mechanics(Benjamin, 1968).

  33. Liao, X., Wong, K. & Chen, S. A novel image encryption algorithm based on chaotic maps. Chaos Solitons Fractals. 36(2), 432–444 (2008).

    Google Scholar 

  34. Thanh, N. K. et al. A public-key encryption–authentication scheme based on the elgamal cryptographic algorithm. J. Sci. Technique – Inform. Communication Technol. https://doi.org/10.56651/lqdtu.jst.v12.n1.658.ict (2023).

    Google Scholar 

  35. Zheng, Y. Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost (encryption). In Advances in Cryptology – CRYPTO’97, LNCS, Vol. 1294, 165–179 (Springer, 1997).

    Google Scholar 

  36. National Institute of Standards and Technology. Digital Signature Standard (DSS), FIPS PUB 186 (U.S. Department of Commerce, 1994).

Download references

Funding

This research is funded by Vietnam National Foundation for Science and Technology Development (NAFOSTED) under grant number 04/2025/TN.

Author information

Authors and Affiliations

  1. Institute of Information and Communication Technology, 236 Hoang Quoc Viet, Cau Giay, Ha Noi, Vietnam

    Pham Thai Hung & Ta Minh Thanh

Authors
  1. Pham Thai Hung
    View author publications

    Search author on:PubMed Google Scholar

  2. Ta Minh Thanh
    View author publications

    Search author on:PubMed Google Scholar

Contributions

Ta Minh Thanh: Supervision, Investigation, Conceptualization, Methodology. Pham Thai Hung: Code, Data curation, Visualization, Investigation, Software.

Corresponding author

Correspondence to Ta Minh Thanh.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hung, P.T., Thanh, T.M. A robust zero-watermarking and signcryption scheme for image copyright protection and license verification. Sci Rep (2026). https://doi.org/10.1038/s41598-026-38991-w

Download citation

  • Received: 23 December 2025

  • Accepted: 02 February 2026

  • Published: 14 February 2026

  • DOI: https://doi.org/10.1038/s41598-026-38991-w

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Zero-watermarking
  • Scale-Invariant feature transform (SIFT)
  • Geometric attacks
  • Signcryption
  • Ownership verification
  • License distribution.
Download PDF

Advertisement

Explore content

  • Research articles
  • News & Comment
  • Collections
  • Subjects
  • Follow us on Facebook
  • Follow us on X
  • Sign up for alerts
  • RSS feed

About the journal

  • About Scientific Reports
  • Contact
  • Journal policies
  • Guide to referees
  • Calls for Papers
  • Editor's Choice
  • Journal highlights
  • Open Access Fees and Funding

Publish with us

  • For authors
  • Language editing services
  • Open access funding
  • Submit manuscript

Search

Advanced search

Quick links

  • Explore articles by subject
  • Find a job
  • Guide to authors
  • Editorial policies

Scientific Reports (Sci Rep)

ISSN 2045-2322 (online)

nature.com sitemap

About Nature Portfolio

  • About us
  • Press releases
  • Press office
  • Contact us

Discover content

  • Journals A-Z
  • Articles by subject
  • protocols.io
  • Nature Index

Publishing policies

  • Nature portfolio policies
  • Open access

Author & Researcher services

  • Reprints & permissions
  • Research data
  • Language editing
  • Scientific editing
  • Nature Masterclasses
  • Research Solutions

Libraries & institutions

  • Librarian service & tools
  • Librarian portal
  • Open research
  • Recommend to library

Advertising & partnerships

  • Advertising
  • Partnerships & Services
  • Media kits
  • Branded content

Professional development

  • Nature Awards
  • Nature Careers
  • Nature Conferences

Regional websites

  • Nature Africa
  • Nature China
  • Nature India
  • Nature Japan
  • Nature Middle East
  • Privacy Policy
  • Use of cookies
  • Legal notice
  • Accessibility statement
  • Terms & Conditions
  • Your US state privacy rights
Springer Nature

© 2026 Springer Nature Limited

Nature Briefing AI and Robotics

Sign up for the Nature Briefing: AI and Robotics newsletter — what matters in AI and robotics research, free to your inbox weekly.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing: AI and Robotics