banner

An effective application of watermarking techniques in the transform domain for content authentication

Sunil Kumar Vishwakarma, Birendra Kumar Sharma, Syed Qamar Abbas

Abstract


Internet media consumption, especially in the forms of audio and video, has become ubiquitous in modern life. Multimedia signals, data alterations, and backup copies are all more likely to occur with digital data. This creates a security risk in digital systems, making sensitive data vulnerable. Due to security flaws, it is now a danger in the realm of digital technology. The most difficult issues to solve in the digital age are authentication and copyright protection. The use of digital watermarking to secure online content is an exciting development. Watermarking is a technique wherein an organization’s logo or ownership information is permanently embedded into the original data without degrading the quality of the data itself. With the right decoding method, a watermark can be recovered from the host image while remaining imperceptible to the human eye. By dispersing the embedded data throughout the original image, the watermarking is made more secure. The watermarked image is also treated by combining the red and green planes using inverse DWT. The watermark can be retrieved thanks to an extraction technique that is the inverse of the one used to embed it. Known as a non-blind watermarking technology, the suggested detector is given access to all information collected by the encoder. The method is vulnerable to image degradation when confronted with Salt & Pepper noise or Gamma noise.


Keywords


DWT; SVD; watermarking; NC; PSNR

Full Text:

PDF

References


1. Jadhav AA, Babar RV, Gaikwad MS. Hardware implementation of digital watermarking system for real time captured image transmitting. 2015 International Conference on Pervasive Computing (ICPC). Published online January 2015. doi: 10.1109/pervasive.2015.7087148

2. Shanmugam M, Chokkalingam A. Performance analysis of 2 level DWT-SVD based non blind and blind video watermarking using range conversion method. Microsystem Technologies. 2018, 24(12): 4757-4765. doi: 10.1007/s00542-018-3870-x

3. Joshi AM, Mishra V, Patrikar RM. FPGA prototyping of video watermarking for ownership verification based on H.264/AVC. Multimedia Tools and Applications. 2015, 75(6): 3121-3144. doi: 10.1007/s11042-014-2426-z

4. Rajkumar VF. Entropy based Robust Watermarking Scheme using HADAMARD Transformation Technique. International Journal of Computer Applications. 2011, 12(9): 14-21. doi: 10.5120/1712-2293

5. Garimella A, Satyanarayan MVVK, Murugesh PS, Niranjan UC. VLSI Implementation of Online Digital Watermarking Techniques with Difference Encoding for the 8-bit Gray Scale Images’. In: Proceedings of the IEEE International Conference on VLSI Design; 2003. pp. 283-288.

6. Roy V, Shukla S. Effective EEG Motion Artifacts Elimination Based on Comparative Interpolation Analysis. Wireless Personal Communications. 2017, 97(4): 6441-6451. doi: 10.1007/s11277-017-4846-3

7. Shahdoosti HR, Salehi M. Transform‐based watermarking algorithm maintaining perceptual transparency. IET Image Processing. 2018, 12(5): 751-759. doi: 10.1049/iet-ipr.2017.0898

8. Makbol NM, Khoo BE, Rassem TH. Block‐based discrete wavelet transform‐singular value decomposition image watermarking scheme using human visual system characteristics. IET Image Processing. 2016, 10(1): 34-52. doi: 10.1049/iet-ipr.2014.0965

9. Narwade NS, Deshmane NP, Elchatwar P, Pande PL. Robust watermarking for Geometric Attacks using DFT. International Journal of Emerging Trends and Technology in Computer Science. 2013, 2(2): 20-25.

10. Mohanarathinam A, Kamalraj S, Prasanna Venkatesan GKD, et al. Digital watermarking techniques for image security: a review. Journal of Ambient Intelligence and Humanized Computing. 2019, 11(8): 3221-3229. doi: 10.1007/s12652-019-01500-1

11. Kumar S, Gupta U, Singh AK, et al. Artificial Intelligence. Journal of Computers, Mechanical and Management. 2023, 2(3): 31-42. doi: 10.57159/gadl.jcmm.2.3.23064

12. Liu X, Li F, Wen B, et al. Removing Backdoor-Based Watermarks in Neural Networks with Limited Data. 2020 25th International Conference on Pattern Recognition (ICPR). Published online January 10, 2021. doi: 10.1109/icpr48806.2021.9412684

13. Lee YS, Seo YH, Kim DW. Blind Image Watermarking Based on Adaptive Data Spreading in n-Level DWT Subbands. Security and Communication Networks. 2019, 2019: 1-11. doi: 10.1155/2019/8357251

14. Li C, Zhang Z, Wang Y, et al. Dither modulation of significant amplitude difference for wavelet based robust watermarking. Neurocomputing. 2015, 166: 404-415. doi: 10.1016/j.neucom.2015.03.039

15. Roy V. An Improved Image Encryption Consuming Fusion Transmutation and Edge Operator. Journal of Cybersecurity and Information Management. 2021, 8(1): 42-52. doi: 10.54216/jcim.080105

16. Kandi H, Mishra D, Gorthi SRKS. Exploring the learning capabilities of convolutional neural networks for robust image watermarking. Computers & Security. 2017, 65: 247-268. doi: 10.1016/j.cose.2016.11.016

17. Kumar S. Reviewing Software Testing Models and Optimization Techniques: An Analysis of Efficiency and Advancement Needs. Journal of Computers, Mechanical and Management. 2023, 2(1): 32-46. doi: 10.57159/gadl.jcmm.2.1.23041

18. Naranjo-Torres J, Mora M, Hernández-García R, et al. A Review of Convolutional Neural Network Applied to Fruit Image Processing. Applied Sciences. 2020, 10(10): 3443. doi: 10.3390/app10103443

19. Shukla S, Roy V, Prakash A. Wavelet Based Empirical Approach to Mitigate the Effect of Motion Artifacts from EEG Signal. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). Published online April 2020. doi: 10.1109/csnt48778.2020.9115761

20. Senan EM, Alzahrani A, Alzahrani MY, et al. Automated Diagnosis of Chest X-Ray for Early Detection of COVID-19 Disease. Hemanth J, ed. Computational and Mathematical Methods in Medicine. 2021, 2021: 1-10. doi: 10.1155/2021/6919483

21. Dhillon A, Verma GK. Convolutional neural network: a review of models, methodologies and applications to object detection. Progress in Artificial Intelligence. 2019, 9(2): 85-112. doi: 10.1007/s13748-019-00203-0

22. Alzahrani A. Enhanced Invisibility and Robustness of Digital Image Watermarking Based on DWT-SVD. Algalil FA, ed. Applied Bionics and Biomechanics. 2022, 2022: 1-13. doi: 10.1155/2022/5271600




DOI: https://doi.org/10.32629/jai.v7i5.1051

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Sunil Kumar Vishwakarma, Birendra Kumar Sharma, Syed Qamar Abbas

License URL: https://creativecommons.org/licenses/by-nc/4.0/