Enabling secure image transmission in unmanned aerial vehicle using digital image watermarking with H-Grey optimization

被引:16
作者
Devi, K. Jyothsna [1 ]
Singh, Priyanka [1 ]
Bilal, Muhammad [2 ,3 ]
Nayyar, Anand [4 ]
机构
[1] SRM Univ AP, Guntur 522240, India
[2] Univ Lancaster, Sch Comp & Commun, Lancaster LA1 4WA, England
[3] Hankuk Univ Foreign Studies, Dept Comp Engn, Yongin 17035, South Korea
[4] Duy Tan Univ, Fac Informat Technol, Grad Sch, Da Nang 550000, Vietnam
关键词
DWT-SVD; HSO; GWO; H-Grey; Digital Image Watermarking; Symmetric cryptography; Hybrid optimization; WAVELET TRANSFORM; SVD; ALGORITHM; SCHEME;
D O I
10.1016/j.eswa.2023.121190
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Drone technology, also known as Unmanned Aerial Vehicles (UAVs), has advanced rapidly in the last decade owing to the huge number of users. This approach has an immense opportunity in areas like healthcare, agriculture, and forestry. However, the transmission of digital images via drone technology is associated with vulnerabilities and risks, due to a lack of efficient security solutions. Digital Image Watermarking (DIW) has emerged as a viable solution for digital image transmission in UAV applications. However, achieving robustness, security, and imperceptibility in a watermarking system at the same time is a difficult task. To address the aforementioned concerns, this paper proposes a secure digital image watermarking scheme in the hybrid DWT-SVD domain. The scaling factor is chosen adaptively from the hybrid Harmony-Grey Wolf (H-Grey) optimization algorithm to maintain a balance between imperceptibility and robustness. In addition, a novel symmetric cryptographic-based four-level encryption approach PSMD (Partitioning, Substituting, Merging, Division) is proposed to address UAV image security concerns by using Fibonacci and prime number series to generate two random keys. The proposed encryption scheme provides high security at low computational cost. The experimental results show that the visual quality and robustness are both high (Avg. PSNR = 41.27 dB and Avg. SSIM = 0.99, NC = 0.99, and BER = 0.0008 calculated for 100 images). The subjective and objective experimental analysis indicates that the proposed encryption scheme is highly secure and the computational cost is also low. The average embedding and extraction time is 0.25 s and 0.09 s It is resistant to various image processing attacks. A comparison with some of the most recent popular schemes confirms the scheme's effectiveness. The presented DIW can be used for copyright protection, UAV image transmission applications, military applications, and other purposes.
引用
收藏
页数:18
相关论文
共 55 条
[41]   A review on communication protocols for autonomous unmanned aerial vehicles for inspection application [J].
Shi, Liping ;
Marcano, Nestor J. Hernandez ;
Jacobsen, Rune Hylsberg .
MICROPROCESSORS AND MICROSYSTEMS, 2021, 86
[42]   Secure data hiding techniques: a survey [J].
Singh, Laxmanika ;
Singh, A. K. ;
Singh, P. K. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (23-24) :15901-15921
[43]   Image watermarking using soft computing techniques: A comprehensive survey [J].
Singh, Om Prakash ;
Singh, A. K. ;
Srivastava, Gautam ;
Kumar, Neeraj .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (20) :30367-30398
[44]  
Singh R., 2022, Futur. Gener. Comput. Syst
[45]  
Sorenson J., 1990, An Introduction to Prime Number Sieves
[46]  
Sorenson JP, 2006, LECT NOTES COMPUT SC, V4076, P193
[47]   New Rapid and Robust Color age Watermarking Technique in Spatial Domain [J].
Su, Qingtang ;
Liu, Decheng ;
Yuan, Zihan ;
Wang, Gang ;
Zhang, Xiaofeng ;
Chen, Beijing ;
Yao, Tao .
IEEE ACCESS, 2019, 7 :30398-30409
[48]   A survey on recent optimal techniques for securingunmanned aerial vehiclesapplications [J].
Syed, Farheen ;
Gupta, Sachin Kumar ;
Alsamhi, Saeed Hamood ;
Rashid, Mamoon ;
Liu, Xuan .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (07)
[49]  
Tewari T. K., 2010, INT J COMPUTER APPL, V3, P28, DOI DOI 10.5120/699-980
[50]   Hybrid, blind and robust image watermarking: RDWT - NSCT based secure approach for telemedicine applications [J].
Thanki, Rohit ;
Kothari, Ashish ;
Borra, Surekha .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (18) :27593-27613