Optimal Semi-Fragile Watermarking Based on Maximum Entropy Random Walk and Swin Transformer for Tamper Localization

被引:8
作者
Aberna, P. [1 ]
Agilandeeswari, L. [1 ]
机构
[1] VIT, Sch Comp Sci Engn & Informat Syst, Vellore 632014, Tamil Nadu, India
关键词
Watermarking; Transforms; Transformers; Image color analysis; Quaternions; Feature extraction; Discrete wavelet transforms; Wavelet transforms; Multimedia communication; Authentication; PSNR; High dynamic image; maximum entropy random walk algorithm; quaternion dual-tree complex wavelet transform; Swin transformer; IMAGE WATERMARKING; SCHEME; ALGORITHM;
D O I
10.1109/ACCESS.2024.3370411
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the multimedia arena, image tampering is an uncontrollable process that necessitates content authentication and tamper detection in a variety of applications. One method that is recommended for meeting all of those needs in the multimedia arena is watermarking. Mobile cameras may now be used to effortlessly take high dynamic range (HDR) photographs, which increase the image's visual quality and realism. Watermark visibility and recognition algorithms built for standard images may be affected by this introduction of perceptual variations in the image relative to the source. In order to overcome those shortcomings, we introduced a novel, an optimal semi-blind watermarking technique that works for both colour and HDR compressed JPEG images. A unique quaternion dual-tree complex wavelet transform technique is used to extract the highly informative features from the original image. The optimal embedding region in the low frequency sub-band is determined using the maximal entropy random walk (MERW) algorithm. In order to detect tampering and to localize the tampered region a watermark is generated using the swin transformer model and watermark embedding is carried out in the selected optimal blocks. A dual scrambled image is encoded in the effective principal component coefficient values of the singular value decomposition (SVD) Transform in order to authenticate the watermarked image prior to watermark extraction. The semi-blind extraction process is intended to confirm the content's authenticity by comparing the recovered scrambled watermark with the regenerated original watermark. The process of extraction is merely the opposite of the process of embedding. When compared to previous research, the experimental results demonstrated good imperceptibility with an average PSNR of 65 dB and SSIM of 0.999 and strong robustness against attacks.
引用
收藏
页码:37757 / 37781
页数:25
相关论文
共 50 条
  • [31] Semi-fragile Watermarking-based Color Image Authentication with Recovery Capability
    Rosales-Roldan, Luis
    Cedillo-Hernandez, Manuel
    Chao, Jinhui
    Nakano-Miyatake, Mariko
    Perez-Meana, Hector
    2015 38TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2015, : 528 - 534
  • [32] AN EFFICIENT BLOCK-BASED FRAGILE WATERMARKING SYSTEM FOR TAMPER LOCALIZATION AND RECOVERY
    Edupuganti, Venkata Gopal
    Shin, Frank Y.
    Chang, I-Cheng
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2011, 17 (02) : 257 - 267
  • [33] Fragile Watermarking for Tamper Localization and Self-Recovery Based on AMBTC and VQ
    Lin, Chia-Chen
    Lee, Ting-Lin
    Chang, Ya-Fen
    Shiu, Pei-Feng
    Zhang, Bohan
    ELECTRONICS, 2023, 12 (02)
  • [34] A General Region Nesting-Based Semi-Fragile Reversible Watermarking for Authenticating 3D Mesh Models
    Peng, Fei
    Long, Bo
    Long, Min
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 31 (11) : 4538 - 4553
  • [35] A Semi-Fragile, Inner-Outer Block-Based Watermarking Method Using Scrambling and Frequency Domain Algorithms
    Senol, Ahmet
    Elbasi, Ersin
    Topcu, Ahmet E.
    Mostafa, Nour
    ELECTRONICS, 2023, 12 (04)
  • [36] Self-Authentication Scheme Based on Semi-Fragile Watermarking and Perceptual Hash Function
    Rhayma, Hanen
    Makhloufi, Achraf
    Ben Hmida, Ahmed
    2014 FIRST INTERNATIONAL IMAGE PROCESSING, APPLICATIONS AND SYSTEMS CONFERENCE (IPAS), 2014,
  • [37] TDSF: Two-phase tamper detection in semi-fragile watermarking using two-level integer wavelet transform
    Amrullah, Agit
    Ernawan, Ferda
    Raffei, Anis Farihan Mat
    Chuin, Liew Siau
    ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2025, 61
  • [38] Logistic-map based fragile image watermarking scheme for tamper detection and localization
    Sahu, Aditya Kumar
    Hassaballah, M.
    Rao, Routhu Srinivasa
    Suresh, Gulivindala
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (16) : 24069 - 24100
  • [39] Dual image-based reversible fragile watermarking scheme for tamper detection and localization
    Sahu, Aditya Kumar
    Sahu, Monalisa
    Patro, Pramoda
    Sahu, Gupteswar
    Nayak, Soumya Ranjan
    PATTERN ANALYSIS AND APPLICATIONS, 2023, 26 (02) : 571 - 590
  • [40] A Novel Scheme for Semi-fragile Video Watermarking Based on Multi-feature Extraction
    Jing, Li
    2012 2ND INTERNATIONAL CONFERENCE ON APPLIED ROBOTICS FOR THE POWER INDUSTRY (CARPI), 2012, : 629 - 632