10 research outputs found

    Robust Watermarking Using FFT and Cordic QR Techniques

    Get PDF
    Digital media sharing and access in today鈥檚 world of the internet is very frequent for every user. The management of digital rights may come into threat easily as the accessibility of data through the internet become wide. Sharing digital information under security procedures can be easily compromised due to the various vulnerabilities floating over the internet. Existing research has been tied to protecting internet channels to ensure the safety of digital data. Researchers have investigated various encryption techniques to prevent digital rights management but certain challenges including external potential attacks cannot be avoided that may give unauthorized access to digital media. The proposed model endorsed the concept of watermarking in digital data to uplift media security and ensure digital rights management. The system provides an efficient procedure to conduct over-watermarking in digital audio signals and confirm the avoidance of ownership of the host data. The proposed technique uses a watermark picture as a signature that has been initially encrypted with Arnold's cat map and cyclic encoding before being embedded. The upper triangular R-matrix component of the energy band was then created by using the Fast Fourier transform and Cordic QR procedures to the host audio stream. Using PN random sequences, the encrypted watermarking image has been embedded in the host audio component of the R-matrix. The same procedure has been applied to extract the watermark image from the watermarked audio. The proposed model evaluates the quality of the watermarked audio and extracted watermark image. The average PSNR of the watermarked audio is found to be 37.01 dB. It has also been seen that the average PSNR, Normal cross-correlation, BER, SSMI (structure similarity index matric) value for the extracted watermark image is found to be 96.30 dB, 0.9042 units, 0.1033 units, and 0.9836 units respectively. Further, the model has been tested using various attacks to check its robustness. After applying attacks such as noising, filtering, cropping, and resampling on the watermarked audio, the watermark image has been extricated and its quality has been checked under the standard parameters. It has been found that the quality of the recovered watermark image satisfying enough to justify the digital ownership of the host audio. Hence, the proposed watermarking model attains a perfect balance between imperceptibility, payload, and robustness

    A novel multipurpose watermarking scheme capable of protecting and authenticating images with tamper detection and localisation abilities

    Get PDF
    Technologies that fall under the umbrella of Industry 4.0 can be classified into one of its four significant components: cyber-physical systems, the internet of things (IoT), on-demand availability of computer system resources, and cognitive computing. The success of this industrial revolution lies in how well these components can communicate with each other, and work together in finding the most optimised solution for an assigned task. It is achieved by sharing data collected from a network of sensors. This data is communicated via images, videos, and a variety of other signals, attracting unwanted attention of hackers. The protection of such data is therefore pivotal, as is maintaining its integrity. To this end, this paper proposes a novel image watermarking scheme with potential applications in Industry 4.0. The strategy presented is multipurpose; one such purpose is authenticating the transmitted image, another is curtailing the illegal distribution of the image by providing copyright protection. To this end, two new watermarking methods are introduced, one of which is for embedding the robust watermark, and the other is related to the fragile watermark. The robust watermark's embedding is achieved in the frequency domain, wherein the frequency coefficients are selected using a novel mean-based coefficient selection procedure. Subsequently, the selected coefficients are manipulated in equal proportion to embed the robust watermark. The fragile watermark's embedding is achieved in the spatial domain, wherein self-generated fragile watermark(s) is embedded by directly altering the pixel bits of the host image. The effective combination of two domains results in a hybrid scheme and attains the vital balance between the watermarking requirements of imperceptibility, security and capacity. Moreover, in the case of tampering, the proposed scheme not only authenticates and provides copyright protection to images but can also detect tampering and localise the tampered regions. An extensive evaluation of the proposed scheme on typical images has proven its superiority over existing state-of-the-art methods

    Secure medical image watermarking based on reversible data hiding with Arnold's cat map

    Get PDF
    The process of restoring medical images to their original form after the extraction process in application watermarking is crucial for ensuring their authenticity. Inaccurate diagnoses can occur due to distortions in medical images from conventional data embedding applications. To address this issue, reversible data hiding (RDH) method has been proposed by several researchers in recent years to embed data in medical images. After the extraction process, images can be restored to their original form with a reversible data-hiding method. In the past few years, several RDH methods have been rapidly developed, which are based on the concept of difference expansion (DE). However, it is crucial to pay attention to the security of the medical image watermarking method, the embedded data with RDH method can be easily modified, accessed, and altered by unauthorized individuals if they know the employed method. This research suggests a new approach to secure the RDH method through the use of Chaotic Map-based Arnold's Cat Map algorithms on the medical images. Data embedding was performed on random medical images using a DE method. Four gray-scale medical image modalities were used to assess the proposed method's efficacy. In our approach, we can incorporate capacity up to 0.62 bpp while maintaining a visual quality up to 41.02 dB according to PSNR and 0.9900 according to SSIM. The results indicated that it can enhance the security of the RDH method while retaining the ability to embed data and preserving the visual appearance of the medical images

    Efficiency of LSB steganography on medical information

    Get PDF
    The development of the medical field had led to the transformation of communication from paper information into the digital form. Medical information security had become a great concern as the medical field is moving towards the digital world and hence patient information, disease diagnosis and so on are all being stored in the digital image. Therefore, to improve the medical information security, securing of patient information and the increasing requirements for communication to be transferred between patients, client, medical practitioners, and sponsors is essential to be secured. The core aim of this research is to make available a complete knowledge about the research trends on LSB Steganography Technique, which are applied to securing medical information such as text, image, audio, video and graphics and also discuss the efficiency of the LSB technique. The survey findings show that LSB steganography technique is efficient in securing medical information from intruder

    A single watermark based scheme for both protection and authentication of identities

    Get PDF
    The security of a watermarking scheme is mainly categorised as either robust or fragile. The former can withstand an authorised alteration/attack, primarily used in copyright protection. The latter follows a zero tolerance towards any modification, used primarily in content authentication processes. The existing literature in the field projects that two separate watermarks are required to make a watermarking scheme robust and fragile, thus making the overall process cumbersome and complex. A novel image watermarking scheme that uses only one watermark while achieving both goals of copyright protection and authentication of identities is presented. An unconventional concept of checkpointing is introduced, which equips the proposed scheme to be either robust or fragile, making it superior in its application versatility. First, watermark embedding within the host/original image is achieved by a combination of transform domain techniques along with a novel median-based embedding block selection procedure. Second, checkpointing is performed in the spatial domain. The watermarked image in the absence of an attack is correlated to the one that is being attacked, using the template energy comparison-based approach. In the case of the robust watermark, such checkpointing can establish whether the carried out attack is authorised or not, determining the successful recovery of the watermark or vice-versa. Moreover, in the case of the fragile watermark, a sole confirmation of the occurrence of an attack is sufficient to make the watermark recovery impossible. Finally, the experimental analysis of the proposed scheme illustrates its excellent performance and superiority over state-of-the-art methods within the field

    Robust color image watermarking using Discrete Wavelet Transform, Discrete Cosine Transform and Cat Face Transform

    Get PDF
    The primary concern in color image watermarking is to have an effective watermarking method that can be robust against common image processing attacks such as JPEG compression, rotation, sharpening, blurring, and salt and pepper attacks for copyright protection purposes. This research examined the existing color image watermarking methods to identify their strengths and weaknesses, and then proposed a new method and the best embedding place in the host image to enhance and overcome the existing gap in the color image watermarking methods. This research proposed a new robust color image watermarking method using Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), and Cat Face Transform. In this method, both host and watermark images decomposed into three color channels: red, green, and blue. The second level DWT was applied to each color channel of the host image. DWT decomposed the image into four sub-band coefficients: Low-pass filter in the row, Low-pass filter in the column (LL) signifies approximation coefficient, High-pass filter in the row, Low-pass filter in the column (HL) signifies horizontal coefficient, Low-pass filter in the row, High-pass filter in the column (LH) signifies vertical coefficient, and High-pass filter in the row, High-pass filter in the column (HH) signifies diagonal coefficient. Then, HL2 and LH2 were chosen as the embedding places to improve the robustness and security, and they were divided into 4脳4 non-overlapping blocks, then DCT was applied on each block. DCT turned a signal into the frequency domain, which is effective in image processing, specifically in JPEG compression due to good performance. On the other hand, the Cat Face Transform method with a private key was used to enhance the robustness of the proposed method by scrambling the watermark image before embedding. Finally, the second private key was used to embed the watermark in the host image. The results show enhanced robustness against common image processing attacks: JPEG compression (3.37%), applied 2% salt and pepper (0.4%), applied 10% salt and pepper (2%), applied 1.0 radius sharpening (0.01%), applied 1.0 radius blurring (8.1%), and can withstand rotation attack. In sum, the proposed color image watermarking method indicates better robustness against common image processing attacks compared to other reviewed methods

    Application and Theory of Multimedia Signal Processing Using Machine Learning or Advanced Methods

    Get PDF
    This Special Issue is a book composed by collecting documents published through peer review on the research of various advanced technologies related to applications and theories of signal processing for multimedia systems using ML or advanced methods. Multimedia signals include image, video, audio, character recognition and optimization of communication channels for networks. The specific contents included in this book are data hiding, encryption, object detection, image classification, and character recognition. Academics and colleagues who are interested in these topics will find it interesting to read

    Design of a secure architecture for the exchange of biomedical information in m-Health scenarios

    Get PDF
    El paradigma de m-Salud (salud m贸vil) aboga por la integraci贸n masiva de las m谩s avanzadas tecnolog铆as de comunicaci贸n, red m贸vil y sensores en aplicaciones y sistemas de salud, para fomentar el despliegue de un nuevo modelo de atenci贸n cl铆nica centrada en el usuario/paciente. Este modelo tiene por objetivos el empoderamiento de los usuarios en la gesti贸n de su propia salud (p.ej. aumentando sus conocimientos, promocionando estilos de vida saludable y previniendo enfermedades), la prestaci贸n de una mejor tele-asistencia sanitaria en el hogar para ancianos y pacientes cr贸nicos y una notable disminuci贸n del gasto de los Sistemas de Salud gracias a la reducci贸n del n煤mero y la duraci贸n de las hospitalizaciones. No obstante, estas ventajas, atribuidas a las aplicaciones de m-Salud, suelen venir acompa帽adas del requisito de un alto grado de disponibilidad de la informaci贸n biom茅dica de sus usuarios para garantizar una alta calidad de servicio, p.ej. fusionar varias se帽ales de un usuario para obtener un diagn贸stico m谩s preciso. La consecuencia negativa de cumplir esta demanda es el aumento directo de las superficies potencialmente vulnerables a ataques, lo que sit煤a a la seguridad (y a la privacidad) del modelo de m-Salud como factor cr铆tico para su 茅xito. Como requisito no funcional de las aplicaciones de m-Salud, la seguridad ha recibido menos atenci贸n que otros requisitos t茅cnicos que eran m谩s urgentes en etapas de desarrollo previas, tales como la robustez, la eficiencia, la interoperabilidad o la usabilidad. Otro factor importante que ha contribuido a retrasar la implementaci贸n de pol铆ticas de seguridad s贸lidas es que garantizar un determinado nivel de seguridad implica unos costes que pueden ser muy relevantes en varias dimensiones, en especial en la econ贸mica (p.ej. sobrecostes por la inclusi贸n de hardware extra para la autenticaci贸n de usuarios), en el rendimiento (p.ej. reducci贸n de la eficiencia y de la interoperabilidad debido a la integraci贸n de elementos de seguridad) y en la usabilidad (p.ej. configuraci贸n m谩s complicada de dispositivos y aplicaciones de salud debido a las nuevas opciones de seguridad). Por tanto, las soluciones de seguridad que persigan satisfacer a todos los actores del contexto de m-Salud (usuarios, pacientes, personal m茅dico, personal t茅cnico, legisladores, fabricantes de dispositivos y equipos, etc.) deben ser robustas y al mismo tiempo minimizar sus costes asociados. Esta Tesis detalla una propuesta de seguridad, compuesta por cuatro grandes bloques interconectados, para dotar de seguridad a las arquitecturas de m-Salud con unos costes reducidos. El primer bloque define un esquema global que proporciona unos niveles de seguridad e interoperabilidad acordes con las caracter铆sticas de las distintas aplicaciones de m-Salud. Este esquema est谩 compuesto por tres capas diferenciadas, dise帽adas a la medidas de los dominios de m-Salud y de sus restricciones, incluyendo medidas de seguridad adecuadas para la defensa contra las amenazas asociadas a sus aplicaciones de m-Salud. El segundo bloque establece la extensi贸n de seguridad de aquellos protocolos est谩ndar que permiten la adquisici贸n, el intercambio y/o la administraci贸n de informaci贸n biom茅dica -- por tanto, usados por muchas aplicaciones de m-Salud -- pero no re煤nen los niveles de seguridad detallados en el esquema previo. Estas extensiones se concretan para los est谩ndares biom茅dicos ISO/IEEE 11073 PHD y SCP-ECG. El tercer bloque propone nuevas formas de fortalecer la seguridad de los tests biom茅dicos, que constituyen el elemento esencial de muchas aplicaciones de m-Salud de car谩cter cl铆nico, mediante codificaciones novedosas. Finalmente el cuarto bloque, que se sit煤a en paralelo a los anteriores, selecciona herramientas gen茅ricas de seguridad (elementos de autenticaci贸n y criptogr谩ficos) cuya integraci贸n en los otros bloques resulta id贸nea, y desarrolla nuevas herramientas de seguridad, basadas en se帽al -- embedding y keytagging --, para reforzar la protecci贸n de los test biom茅dicos.The paradigm of m-Health (mobile health) advocates for the massive integration of advanced mobile communications, network and sensor technologies in healthcare applications and systems to foster the deployment of a new, user/patient-centered healthcare model enabling the empowerment of users in the management of their health (e.g. by increasing their health literacy, promoting healthy lifestyles and the prevention of diseases), a better home-based healthcare delivery for elderly and chronic patients and important savings for healthcare systems due to the reduction of hospitalizations in number and duration. It is a fact that many m-Health applications demand high availability of biomedical information from their users (for further accurate analysis, e.g. by fusion of various signals) to guarantee high quality of service, which on the other hand entails increasing the potential surfaces for attacks. Therefore, it is not surprising that security (and privacy) is commonly included among the most important barriers for the success of m-Health. As a non-functional requirement for m-Health applications, security has received less attention than other technical issues that were more pressing at earlier development stages, such as reliability, eficiency, interoperability or usability. Another fact that has contributed to delaying the enforcement of robust security policies is that guaranteeing a certain security level implies costs that can be very relevant and that span along diferent dimensions. These include budgeting (e.g. the demand of extra hardware for user authentication), performance (e.g. lower eficiency and interoperability due to the addition of security elements) and usability (e.g. cumbersome configuration of devices and applications due to security options). Therefore, security solutions that aim to satisfy all the stakeholders in the m-Health context (users/patients, medical staff, technical staff, systems and devices manufacturers, regulators, etc.) shall be robust and, at the same time, minimize their associated costs. This Thesis details a proposal, composed of four interrelated blocks, to integrate appropriate levels of security in m-Health architectures in a cost-efcient manner. The first block designes a global scheme that provides different security and interoperability levels accordingto how critical are the m-Health applications to be implemented. This consists ofthree layers tailored to the m-Health domains and their constraints, whose security countermeasures defend against the threats of their associated m-Health applications. Next, the second block addresses the security extension of those standard protocols that enable the acquisition, exchange and/or management of biomedical information | thus, used by many m-Health applications | but do not meet the security levels described in the former scheme. These extensions are materialized for the biomedical standards ISO/IEEE 11073 PHD and SCP-ECG. Then, the third block proposes new ways of enhancing the security of biomedical standards, which are the centerpiece of many clinical m-Health applications, by means of novel codings. Finally the fourth block, with is parallel to the others, selects generic security methods (for user authentication and cryptographic protection) whose integration in the other blocks results optimal, and also develops novel signal-based methods (embedding and keytagging) for strengthening the security of biomedical tests. The layer-based extensions of the standards ISO/IEEE 11073 PHD and SCP-ECG can be considered as robust, cost-eficient and respectful with their original features and contents. The former adds no attributes to its data information model, four new frames to the service model |and extends four with new sub-frames|, and only one new sub-state to the communication model. Furthermore, a lightweight architecture consisting of a personal health device mounting a 9 MHz processor and an aggregator mounting a 1 GHz processor is enough to transmit a 3-lead electrocardiogram in real-time implementing the top security layer. The extra requirements associated to this extension are an initial configuration of the health device and the aggregator, tokens for identification/authentication of users if these devices are to be shared and the implementation of certain IHE profiles in the aggregator to enable the integration of measurements in healthcare systems. As regards to the extension of SCP-ECG, it only adds a new section with selected security elements and syntax in order to protect the rest of file contents and provide proper role-based access control. The overhead introduced in the protected SCP-ECG is typically 2{13 % of the regular file size, and the extra delays to protect a newly generated SCP-ECG file and to access it for interpretation are respectively a 2{10 % and a 5 % of the regular delays. As regards to the signal-based security techniques developed, the embedding method is the basis for the proposal of a generic coding for tests composed of biomedical signals, periodic measurements and contextual information. This has been adjusted and evaluated with electrocardiogram and electroencephalogram-based tests, proving the objective clinical quality of the coded tests, the capacity of the coding-access system to operate in real-time (overall delays of 2 s for electrocardiograms and 3.3 s for electroencephalograms) and its high usability. Despite of the embedding of security and metadata to enable m-Health services, the compression ratios obtained by this coding range from ' 3 in real-time transmission to ' 5 in offline operation. Complementarily, keytagging permits associating information to images (and other signals) by means of keys in a secure and non-distorting fashion, which has been availed to implement security measures such as image authentication, integrity control and location of tampered areas, private captioning with role-based access control, traceability and copyright protection. The tests conducted indicate a remarkable robustness-capacity tradeoff that permits implementing all this measures simultaneously, and the compatibility of keytagging with JPEG2000 compression, maintaining this tradeoff while setting the overall keytagging delay in only ' 120 ms for any image size | evidencing the scalability of this technique. As a general conclusion, it has been demonstrated and illustrated with examples that there are various, complementary and structured manners to contribute in the implementation of suitable security levels for m-Health architectures with a moderate cost in budget, performance, interoperability and usability. The m-Health landscape is evolving permanently along all their dimensions, and this Thesis aims to do so with its security. Furthermore, the lessons learned herein may offer further guidance for the elaboration of more comprehensive and updated security schemes, for the extension of other biomedical standards featuring low emphasis on security or privacy, and for the improvement of the state of the art regarding signal-based protection methods and applications
    corecore