546 research outputs found

    A novel multipurpose watermarking scheme capable of protecting and authenticating images with tamper detection and localisation abilities

    Get PDF
    Technologies that fall under the umbrella of Industry 4.0 can be classified into one of its four significant components: cyber-physical systems, the internet of things (IoT), on-demand availability of computer system resources, and cognitive computing. The success of this industrial revolution lies in how well these components can communicate with each other, and work together in finding the most optimised solution for an assigned task. It is achieved by sharing data collected from a network of sensors. This data is communicated via images, videos, and a variety of other signals, attracting unwanted attention of hackers. The protection of such data is therefore pivotal, as is maintaining its integrity. To this end, this paper proposes a novel image watermarking scheme with potential applications in Industry 4.0. The strategy presented is multipurpose; one such purpose is authenticating the transmitted image, another is curtailing the illegal distribution of the image by providing copyright protection. To this end, two new watermarking methods are introduced, one of which is for embedding the robust watermark, and the other is related to the fragile watermark. The robust watermark's embedding is achieved in the frequency domain, wherein the frequency coefficients are selected using a novel mean-based coefficient selection procedure. Subsequently, the selected coefficients are manipulated in equal proportion to embed the robust watermark. The fragile watermark's embedding is achieved in the spatial domain, wherein self-generated fragile watermark(s) is embedded by directly altering the pixel bits of the host image. The effective combination of two domains results in a hybrid scheme and attains the vital balance between the watermarking requirements of imperceptibility, security and capacity. Moreover, in the case of tampering, the proposed scheme not only authenticates and provides copyright protection to images but can also detect tampering and localise the tampered regions. An extensive evaluation of the proposed scheme on typical images has proven its superiority over existing state-of-the-art methods

    Validation and Data Repairing of Document Image using Steganography Method

    Get PDF
    This paper attempts to propose a novel technique of blind authentication based on the method of secret in addition to data repair capability for grayscale document images through the use of the Portable Network Graphics (PNG) image. For every block of a grayscale document image, an authentication signal is generated, which, along with the block content in binary, is transformed into numerous shares using the Shamir secret sharing scheme. The parameters involved are carefully selected so that as many shares as possible can be generated and embedded into an alpha channel plane. After this, the alpha channel plane is combined with the original grayscale image to yield a PNG image. During this process, the computed share values are recorded as a range of alpha channel values near their maximum value of 255 to return a transparent stego-image with a disguised effect. In the image authentication process, marking of an image block is done as tampered, if the authentication signal computed from the current block content does not match the one extracted from the shares embedded in the alpha channel plane. Each tampered block is then subjected to data repairing by a reverse Shamir scheme after collecting two shares from unmarked blocks. Procedures to protect the safety of the data that lies concealed in the alpha channel have been proposed. Decent experimental results demonstrate the efficiency of the proposed method

    The Most Common Characteristics of Fragile Video Watermarking: A Review

    Get PDF
    The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject should not be forgotten so studying old research will give a clear idea of the topic. To aid future researchers in this subject, we give a review of fragile watermarking approaches and some related papers presented in recent years. This paper presents a comparison of many relevant works in this field based on some of the outcomes and improvements gained in these studies, which focuses on the common characteristics that increase the effect of watermarking techniques such as invisibility, tamper detection, recovery, and security &nbsp

    Three layer authentications with a spiral block mapping to prove authenticity in medical images

    Get PDF
    Digital medical image has a potential to be manipulated by unauthorized persons due to advanced communication technology. Verifying integrity and authenticity have become important issues on the medical image. This paper proposed a self-embedding watermark using a spiral block mapping for tamper detection and restoration. The block-based coding with the size of 3x3 was applied to perform selfembedding watermark with two authentication bits and seven recovery bits. The authentication bits are obtained from a set of condition between sub-block and block image, and the parity bits of each sub-block. The authentication bits and the recovery bits are embedded in the least significant bits using the proposed spiral block mapping. The recovery bits are embedded into different sub-blocks based on a spiral block mapping. The watermarked images were tested under various tampered images such as blurred image, unsharp-masking, copy-move, mosaic, noise, removal, and sharpening. The experimental results show that the scheme achieved a PSNR value of about 51.29 dB and a SSIM value of about 0.994 on the watermarked image. The scheme showed tamper localization with accuracy of 93.8%. In addition, the proposed scheme does not require external information to perform recovery bits. The proposed scheme was able to recover the tampered image with a PSNR value of 40.45 dB and a SSIM value of 0.994

    AuSR1 : Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking

    Get PDF
    With the rapid development of multimedia technology, editing and manipulating digital images have become more accessible than ever. This paper proposed color image authentication based on blind fragile image watermarking for tamper detection and self-recovery named AuSR1. The AuSR1 divides each channel of the cover image into non-overlapping blocks with the size of 2 × 2 pixels. The authentication data is embedded into the original block location, while the recovery data is embedded into the distant location from the original location based on the block mapping algorithm. The watermark data is then embedded into the 2 LSB to achieve high quality of the recovered image under tampering attacks. In addition, the permutation algorithm is applied to ensure the security of the watermark data. The AuSR1 utilizes a three-layer authentication algorithm to achieve a high detection rate. The experimental results show that the scheme produced a PSNR value of 45.57 dB and an SSIM value of 0.9972 of the watermarked images. Furthermore, the AuSR1 detected the tampered area of the images with a high precision value of 0.9943. In addition, the recovered image achieved a PSNR value of 27.64 dB and an SSIM value of 0.9339 on a 50% tampering rate

    Digital watermarking by utilizing the properties of self-organization map based on least significant bit and most significant bit

    Get PDF
    Information security is one of the most important branches concerned with maintaining the confidentiality and reliability of data and the medium for which it is transmitted. Digital watermarking is one of the common techniques in this field and it is developing greatly and rapidly due to the great importance it represents in the field of reliability and security. Most modern watermarking systems, however, use the self-organization map (SOM), which is safer than other algorithms because an unauthorized user cannot see the result of the SOM's training. Our method presents a semi-fragile watermark under spatial domain using least significant bit (LSB) and by relying on most significant bit (MSB) when the taken values equal to (2 or 4 bits) depending on the characteristics of SOM through developing the so-called best matching unit (BMU) which working to determine the best location for concealment. As a result, it shows us the ability of the proposed method to maintain the quality of the host with the ability to retrieve data, whether it is a binary image or a secret message

    A HARMONIC SECRET SHARING AND PERMUTATION BASED DOCUMENT IMAGE AUTHENTICATION

    Get PDF
    ABSTRACT In this paper, we are presenting blind authentication method which is based on harmonic secret sharing technique and permutation with data repair capability and error localization for document image and verification of its owner, with the use of the PNG image. We are generating a block based authentication from document image, and transform it into several shares using the Shamir secret sharing scheme, and embedding these shares into an alpha channel plane. The alpha channel plane is permuted with secret key and combined with the original image to form a PNG image. In the process of document image authentication, if the authentication signal computed from the current block content does not match the one extracted from the shares embedded in the alpha channel plane, a document image block localize as tamper block ,then a repairing process is implement else a document image block is authentic. In the repairing process a reverse Shamir technique is implementing for each tampered block after collecting any two or more shares from unmarked blocks. Also, owner verification process is implementing based on the secret key used for the permutation

    A review and open issues of diverse text watermarking techniques in spatial domain

    Get PDF
    Nowadays, information hiding is becoming a helpful technique and fetches more attention due to the fast growth of using the internet; it is applied for sending secret information by using different techniques. Watermarking is one of major important technique in information hiding. Watermarking is of hiding secret data into a carrier media to provide the privacy and integrity of information so that no one can recognize and detect it's accepted the sender and receiver. In watermarking, many various carrier formats can be used such as an image, video, audio, and text. The text is most popular used as a carrier files due to its frequency on the internet. There are many techniques variables for the text watermarking; each one has its own robust and susceptible points. In this study, we conducted a review of text watermarking in the spatial domain to explore the term text watermarking by reviewing, collecting, synthesizing and analyze the challenges of different studies which related to this area published from 2013 to 2018. The aims of this paper are to provide an overview of text watermarking and comparison between approved studies as discussed according to the Arabic text characters, payload capacity, Imperceptibility, authentication, and embedding technique to open important research issues in the future work to obtain a robust method
    corecore