Affiliation:
1. Computer Engineering Department, Üsküdar University, Istanbul 34662, Turkey
2. College of Engineering and Technology, American University of the Middle East, Egaila 54200, Kuwait
Abstract
Image watermarking is most often used to prove that an image belongs to someone and to make sure that the image is the same as was originally produced. The type of watermarking used for the detection of originality and tampering is known as authentication-type watermarking. In this paper, a blind semi-fragile authentication watermarking method is introduced. Although the main concern in this paper is authenticating the image, watermarking for proving ownership is additionally implemented. The method considers the image as two main parts: an inner part and an outer part. The inner and outer parts are divided into non-overlapping blocks. The block size of the inner and outer part are different. The outer blocks have a greater area than the inner blocks so that their watermark-holding capacity is greater, providing enough robustness for semi-fragility. The method is semi-fragile and the watermarked image is authenticated despite the JPEG being compressed to 75% quality. The embedded watermark also survives innocent types of image operations, such as intensity adjustment, histogram equalization and gamma correction. Semi-fragile and selectively fragile authentication is valuable and in high demand specifically because it survives these innocent image operations while detecting ill-intentioned tampering. In this work, we embed a binary watermark into the inner and outer parts of images using a scrambling algorithm, discrete wavelet transform (DWT) and discrete cosine transform (DCT) in the blocks. The proposed methodology has high image quality after watermarking, with a PSNR value of 40.577, and high quality is also achieved after JPEG compression. The embedding process provides acceptable image quality after tamper attacks, including JPEG compression, Gaussian noise, average filtering, and scaling attacks with PSNR values greater than 29. Experimental results obtained show that the proposed semi-fragile watermarking algorithm is more robust, secure and resistant than other algorithms in the literature.
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference37 articles.
1. Cox, I.J., Miller, M.L., and Bloom, J.A. (2002). Digital Watermarking, Morgan Kaufmann.
2. A DWT-based robust semi-blind image watermarking algorithm using two bands;Delp;Security, Steganography, and Watermarking of Multimedia Contents VIII, Proceedings of the Electronic Imaging, San Jose, CA, USA, 15–19 January 2006,2006
3. Jane, O., İlk, H.G., and Elbaşı, E. (2013, January 28–30). A secure and robust watermarking algorithm based on the combination of DWT, SVD, and LU decomposition with Arnold’s Cat Map approach. Proceedings of the 8th International Conference on Electrical and Electronics Engineering (ELECO), Bursa, Turkey.
4. Efficient Watermarking Method Based on Maximum Entropy Blocks Selection in Frequency Domain for Color Images;Singh;IEEE Access,2022
5. Privacy-Preserving Image Watermark Embedding Method Based on Edge Computing;Cheng;IEEE Access,2022
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献