Open Access Open Access  Restricted Access Subscription Access

IS-BRW: Image Security using Blind Reverse Watermarking with Various Attacks


Affiliations
1 Jain Institute of Technology, Davangere and Department of CSE Sathyabama University, Chennai - 600119, Tamil Nadu, India
2 Eranad Knowledge City-Technical Campus, Manjeri – 676122, Kerala, India
 

Objective: In the advanced digital world, images are widely transmitted in many applications including health care. Robust blind watermarking is implemented for digital image content security and confidentiality. Statistical Analysis: The existing mechanism requires new benchmarking performance metric along with its response to the various attacks on digitally watermarked images. The proposed evaluation framework for image security using blind watermarking namely IS-BRW takes cover image along with secret image of varying resolution by applying different level of Fast Fourier Transformation (FFT) as well frequency, time, and wavelet transformation. The method adopts varying data embedding size of the watermark image. Findings: The efficiency of the IS-BW is estimated by measuring Peak-to-Signal-to-Noise (PSNR), Correlation Coefficient (CCR) and Bit Error Ratio (BER). A comparative analysis is done for various attacks which include JPEG compression, Median filter, Wiener filter, Gaussian filter, Image cropping, Image rotation and Image resize. The metric parameters evaluated before and after various attacks do not changes and it remains same which shows the efficiency of the proposed algorithm with other existing systems. Applications: The proposed system is more suitable in the healthcare system where it involves the transmission of scanned medical images over the internet which strictly prohibits the modifications.
User

  • Podilchuk CI. Digital watermarking: algorithms and applications. IEEE Signal Processing Magazine. 2001 July;18(4):33–46. https://doi.org/10.1109/79.939835
  • Kundur D. Enabling security technologies for digital rights management. Proceedings of the IEEE. 2004Jun; 92(6):879– 882. https://doi.org/10.1109/JPROC.2004.827336
  • MACQ B. Benchmarking of image watermarking algorithms for digital rights management. Proceedings of the IEEE. 2004 Jun; 92(6):971–84. https://doi.org/10.1109/JPROC.2004.827361
  • Lang J. Blind digital watermarking method in the fractional Fourier transform domain. Optics and Lasers in Engineering. 2014; 53:112–21. https://doi.org/10.1016/j.optlaseng.2013.08.021
  • Zong T. Robust histogram shape-based method for image watermarking. IEEE Transactions on Circuits and Systems for Video Technology. 2015 May; 25(5):717–29. https://doi.org/10.1109/TCSVT.2014.2363743
  • Siddiqa A. High capacity reversible image watermarking using error expansion and context-dependent embedding. Electronics Letters. 2015 Jun; 51(13):985–7. https://doi.org/10.1049/el.2015.0247
  • Eswaraiah R. Robust medical image watermarking technique for accurate detection of tampers inside region of interest and recovering original region of interest. IET Image Processing. 2015 Aug; 9(8):615–25. https://doi.org/10.1049/iet-ipr.2014.0986
  • Muhammad N. Digital image watermarking using partial pivoting lower and upper triangular decomposition into the wavelet domain. IET Image Processing. 2015 Sep; 9(9):795–803. https://doi.org/10.1049/iet-ipr.2014.0395
  • Andalibi M. Digital image watermarking via adaptive logo texturization. IEEE Transactions on Image Processing. 2015; 24(12):5060–73. https://doi.org/10.1109/TIP.2015.2476961 PMid:26353371
  • Makbol NM. Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics. IET Image Processing. 2016 Jan; 10(1):34–52. https://doi.org/10.1049/iet-ipr.2014.0965
  • Zong, T. Rank-based image watermarking method with high embedding capacity and robustness. IEEE Access. 2016; 4:1689–99. https://doi.org/10.1109/ACCESS.2016.2556723
  • Wang S. Quantum cosine transform based watermarking scheme for quantum images. Chinese Journal of Electronics. 2015 Apr; 24(2):321–5. https://doi.org/10.1049/cje.2015.04.016
  • Liu X. Fractional krawtchouk transform with an application to image watermarking. IEEE Transactions on Signal Processing. 2017 Apr; 65(7):1894–908. https://doi.org/10.1109/TSP.2017.2652383
  • Su Q. Novel blind colour image watermarking technique using Hessen berg decomposition. IET Image Processing. 2016 Nov; 10(11):817–29. https://doi.org/10.1049/ietipr.2016.0048
  • Bhowmik D. Visual attention-based image watermarking. IEEE Access .2016; 4:8002–18. https://doi.org/10.1109/ACCESS.2016.2627241
  • Guo Y. Optimised blind image watermarking method based on firefly algorithm in DWT-QR transform domain. IET Image Processing. 2017 Jun; 11(6):406–15. https://doi.org/10.1049/iet-ipr.2016.0515
  • KimWH. Blind curvelet watermarking method for highquality images. Electronics Letters. 2017 Sep; 53(19):1302–4. https://doi.org/10.1049/el.2017.0955
  • Liu S. Digital image watermarking method based on DCT and fractal encoding. IET Image Processing. 2017 Oct; 11(10):815–21. https://doi.org/10.1049/iet-ipr.2016.0862
  • Licks V. Geometric attacks on image watermarking systems. IEEE Multimedia. 2005Jul-Sep; 12(3):68–78. https:// doi.org/10.1109/MMUL.2005.46
  • Wang S. A novel DIBR 3D image watermarking algorithm resist to geometrical attacks. Chinese Journal of Electronics. 2017; 26(6):1184–93. https://doi.org/10.1049/ cje.2017.09.025
  • Vellaisamy S. Inversion attack resilient zero-watermarking scheme for medical image authentication. IET Image Processing. 2014 Dec; 8(12):718–27. https://doi.org/10.1049/iet-ipr.2013.0558
  • Wang X. A new digital image watermarking algorithm resilient to desynchronization attacks. IEEE Transactions on Information Forensics and Security. 2007 Dec; 2(4):655–63. https://doi.org/10.1109/TIFS.2007.908233
  • Lin CH. Histogram-oriented watermarking algorithm: Colour image watermarking scheme robust against geometric attacks and signal processing. IEEE Proceedings- Vision, Image and Signal Processing. 2006 Aug; 153(4):483–92.
  • Chun-Shien L. Media hash-dependent image watermarking resilient against both geometric attacks and estimation attacks based on false positive-oriented detection. IEEE Transactions on Multimedia.2006 Aug, 8(4), pp. 668-685. https://doi.org/10.1109/TMM.2006.876300
  • Agung IW.Method for combating random geometric attack on image watermarking. Electronics Letters. 2001 Mar; 37(7):420–1. https://doi.org/10.1049/el:20010277
  • Lang J. Blind digital watermarking method in the fractional Fourier transform domain. Optics and Lasers in Engineering. 2014; 53:112–21. https://doi.org/10.1016/j.optlaseng.2013.08.021
  • Qingtang S. Robust color image watermarking technique in the spatial domain. Soft Computing. 2018; 22(1):91–106. https://doi.org/10.1007/s00500-017-2489-7
  • Srivastava M. Digital watermarking using spatial domain and triple DES. 3rd International Conference on Computing for Sustainable Global Development; New Delhi. 2016. p. 3031–35.
  • Maity S. Robust and blind spatial watermarking in digital image. ICVGIP Proceedings of the 3rd Indian Conference on Computer Vision, Graphics and Image Processing; 2002.
  • Sarkar T. Digital watermarking techniques in spatial and frequency domain. ArXiv: 1406.2146; 2014.
  • Sebe F. Spatial-domain image watermarking robust against compression, filtering, cropping, and scaling. International Workshop on Information Security; 2000. p. 44–53. https://doi.org/10.1007/3-540-44456-4_4
  • Goos G. Information security. ISW: International Workshop on Information Security. Berlin, Heidelberg: Springer; 2000. https://doi.org/10.1007/3-540-44456-4
  • Nana Z. Watermarking algorithm of spatial domain image based on SVD. International Conference on Audio, Language and Image Processing (ICALIP); 2016. p. 361–5. https://doi.org/10.1109/ICALIP.2016.7846588
  • Alirezanejad M. Improving the performance of spatial domain image watermarking with high boost filter. Indian Journal of Science and Technology. 2014; 7(12):2133.
  • NikolaidisaI N, Pitasb I. Robust image watermarking in the spatial domain. Journal Signal Processing. 1998; 66(3):385– 403. https://doi.org/10.1016/S0165-1684(98)00017-6
  • GoliMS. Introducing a new method robust against crop attack in digital image watermarking using twostep Sudoku. 3rd International Conference on Pattern Recognition and Image Analysis (IPRIA); 2017. p. 237–42. https://doi.org/10.1109/PRIA.2017.7983054
  • Sujatha CN. Analysis of robust watermarking techniques: A retrospective. International Conference on Communication and Signal Processing (ICCSP); 2016. p. 0336–41. https://doi.org/10.1109/ICCSP.2016.7754151
  • Wang T. A novel scrambling digital image watermark algorithm based on double transform domains. Mathematical Problems in Engineering; 2015. p. 1–13. https://doi.org/10.1155/2015/281681
  • Zhang C. Digital image watermarking algorithm with double encryption by arnold transform and logistic. 4th International Conference on Networked Computing and Advanced Information Management; 2008. p. 329–34. https://doi.org/10.1109/NCM.2008.121
  • Malonia M. Digital Image watermarking using Discrete Wavelet Transform and Arithmetic Progression technique. 2016 IEEE Students’ Conference on Electrical, Electronics and Computer Science (SCEECS); 2016. p. 1–6.
  • Chen WY. Digital watermarking using DCT transformation. Department of Electronic Engineering National ChinYi Institute of Technology; 2000.
  • Pun CM. A Novel DFT-based digital watermarking system for images. 8th international Conference on Signal Processing; 2006. p. 1–9.
  • Ashourian M. Using space-time coding for watermarking color images. International Conference Image Analysis and Recognition; 2006. p. 580–6. https://doi.org/10.1007/11867586_54
  • KarybaliI G. Improved embedding of multiplicative watermarks via space-time block coding. 13th European Signal Processing Conference; 2005. p. 1–4.
  • Stankovic S. Watermarking in the space/spatial-frequency domain using two-dimensional Radon-Wigner distribution. IEEE Transactions on Image Processing. 2001 Apr; 10(4):650–8. https://doi.org/10.1109/83.913599 PMid:18249654
  • Nguyen BP. Perceptual watermarking robust to JPEG compression attack. 5th International Symposium on Communications, Control and Signal Processing; 2012. p. 1–4. https://doi.org/10.1109/ISCCSP.2012.6217798
  • Lee JC. Analysis of attacks on common watermarking techniques. IEEE, Electrical and Computer Engineering; 2017. p. 1–7.
  • Song C. A spatial and frequency domain analysis of the effect of removal attacks on digital image watermarks. 11th of Post Graduate Network Symposium; 2010 Jun. p. 119–24.
  • Hiroshi I. A local Wiener attack for additive watermarks. IEEE 13th International Symposium on Consumer Electronics; 2009. p. 507–10. https://doi.org/10.1109/ ISCE.2009.5156830
  • Samcovic A, et al. Attacks on digital wavelet image watermarks. Journal of Electrical Engineering. 2008; 59(3):131–8.
  • Lee JS. Self-recognized image protection technique that resists large-scale cropping. IEEE Multimedia. 2014 JanMar; 21(1):60–73. https://doi.org/10.1109/MMUL.2014.14
  • Nini B. Security analysis of a three-dimensional rotationbased image encryption. IET Image Processing. 2015 Aug; 9(8):680–9. https://doi.org/10.1049/iet-ipr.2014.0702
  • Taherinia AH. A new watermarking attack based on content-aware image resizing. International Multimedia, Signal Processing and Communication Technologies. 2009; 177–80. https://doi.org/10.1109/MSPCT.2009.5164204

Abstract Views: 295

PDF Views: 0




  • IS-BRW: Image Security using Blind Reverse Watermarking with Various Attacks

Abstract Views: 295  |  PDF Views: 0

Authors

K. J. Kavitha
Jain Institute of Technology, Davangere and Department of CSE Sathyabama University, Chennai - 600119, Tamil Nadu, India
B. Priestly Shan
Eranad Knowledge City-Technical Campus, Manjeri – 676122, Kerala, India

Abstract


Objective: In the advanced digital world, images are widely transmitted in many applications including health care. Robust blind watermarking is implemented for digital image content security and confidentiality. Statistical Analysis: The existing mechanism requires new benchmarking performance metric along with its response to the various attacks on digitally watermarked images. The proposed evaluation framework for image security using blind watermarking namely IS-BRW takes cover image along with secret image of varying resolution by applying different level of Fast Fourier Transformation (FFT) as well frequency, time, and wavelet transformation. The method adopts varying data embedding size of the watermark image. Findings: The efficiency of the IS-BW is estimated by measuring Peak-to-Signal-to-Noise (PSNR), Correlation Coefficient (CCR) and Bit Error Ratio (BER). A comparative analysis is done for various attacks which include JPEG compression, Median filter, Wiener filter, Gaussian filter, Image cropping, Image rotation and Image resize. The metric parameters evaluated before and after various attacks do not changes and it remains same which shows the efficiency of the proposed algorithm with other existing systems. Applications: The proposed system is more suitable in the healthcare system where it involves the transmission of scanned medical images over the internet which strictly prohibits the modifications.

References





DOI: https://doi.org/10.17485/ijst%2F2018%2Fv11i32%2F126951