Optimized digital watermarking: Harnessing the synergies of Schur matrix factorization, DCT, and DWT for superior image ownership proofing

被引:0
作者
Al-Aiash, Issa [1 ]
Alquran, Rabee [1 ]
AlJamal, Mahmoud [1 ]
Alsarhan, Ayoub [1 ]
Aljaidi, Mohammad [2 ]
Al-Fraihat, Dimah [3 ]
机构
[1] Department of Information Technology, Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology, The Hashemite University, Zarqa
[2] Department of Computer Science, Faculty of Information Technology, Zarqa University, Zarqa
[3] Department of Software Engineering, Faculty of Information Technology, Isra University, Amman
关键词
Digital Watermarking; Discrete Cosine Transform (DCT); Discrete Wavelet Transform (DWT); Media Ownership Verification; Schur Matrix Factorization;
D O I
10.1007/s11042-024-19781-w
中图分类号
学科分类号
摘要
The contemporary context of abundant digital dissemination inherently gives rise to the need for media protection and the clear identification of ownership rights. This paper responded to this nagging issue of unauthorized media capture by developing a new digital watermarking approach uniting the Discrete Wavelet Transform DWT, Discrete Cosine Transform DCT, and Schur matrix factorization. The proposed watermark, which was a positive vector uniformly distributed, presented a high degree of robustness to several adversarial operating conditions, including histogram equalization, salt and pepper noise, ripple impact, smoothing attack, and cropping. The obtained results reveal the effectiveness of our approach. The correlation coefficient between watermarked and original images remains exceptionally high at 0.999998, ensuring minimal visual distortion. Mean Squared Error (MSE) graphs for both high-frequency (HH) and low-frequency (LL) domains demonstrate negligible changes after attacks, confirming the watermark's robustness. Notably, the watermark extraction process remains successful even after histogram equalization, as indicated by significantly lower MSE compared to random vectors. Moreover, the average processing times for different attacks are promising; Histogram Equalization and Salt and Pepper attacks each took 0.3 s, Ripple Attack required 0.28 s, Smoothing Attack completed in 0.29 s, and the Cropping Attack took 0.6 s. The robustness of our approach appears against the salt and pepper attack, which historically presented a vulnerability when employing Schur matrix factorization in image watermarking, indicating the novelty of and this contribution to improving media ownership verification. By combining disparate transformation methodologies, this technique offers a promising avenue for reinforcing the integrity and authenticity of digital media, thereby strengthening the foundations of intellectual property rights in the digital domain. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.
引用
收藏
页码:19817 / 19852
页数:35
相关论文
共 47 条
[1]  
Zhou Z., Yunlong Wang Q.M., Jonathan W., Yang C.-N., Sun X., Effective and efficient global context verification for image copy detection, IEEE Trans Inf Forensics Secur, 12, 1, pp. 48-63, (2016)
[2]  
Liu Z., Liu T., Gibbon D., Shahraray B., Effective and scalable video copy detection, Proceedings of the International Conference on Multimedia Information Retrieval, pp. 119-128, (2010)
[3]  
Qiu Y., Ying Q., Lin X., Zhang Y., Qian Z., Reversible data hiding in encrypted images with dual data embedding, IEEE Access, 8, pp. 23209-23220, (2020)
[4]  
Sinhal R., Ansari I.A., Multipurpose image watermarking: ownership check, tamper detection and self-recovery, Circuits Syst Signal Process, 41, 6, pp. 3199-3221, (2022)
[5]  
Su Q., Color image watermarking: Algorithms and technologies, Walter De Gruyter Gmbh & Co KG, 1, (2016)
[6]  
Qingtang S., Wang G., Zhang X., Lv G., Chen B., A new algorithm of blind color image watermarking based on lu decomposition, Multidimens Syst Signal Process, 29, pp. 1055-1074, (2018)
[7]  
Abraham J., Paul V., An imperceptible spatial domain color image watermarking scheme, J King Saud Univ - Comput Inf Sci, 31, 1, pp. 125-133, (2019)
[8]  
Roy S., Pal A.K., A blind dct based color watermarking algorithm for embedding multiple watermarks, AEU Int J Electronic Comm, 72, pp. 149-161, (2017)
[9]  
Boujerfaoui S., Riad R., Douzi H., Ros F., Harba R., Image watermarking between conventional and learningbased techniques: A literature review, Electronics, 12, 1, (2022)
[10]  
Singh R., Ashok A., An optimized robust watermarking technique using ckgsa in frequency domain, J Inf Secur Appl, 58, (2021)