Recaptured attack-resilient watermarking scheme

被引:1
|
作者
Mehta, Preeti [1 ]
Singh, Mahesh K. [1 ]
Singha, Nitin [1 ]
机构
[1] Natl Inst Technol Delhi, New Delhi, India
关键词
recapture attack; singular value decomposition; double-density dual-tree discrete wavelet transform; security; blind watermarking; IMAGE WATERMARKING; ROBUST;
D O I
10.1117/1.JEI.31.4.043043
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We propose a recaptured attack-resilient blind watermarking scheme. The work aims to recover the watermark information from the stego (watermarked image) reacquired through a digital liquid-crystal display monitor. In the age of digital globalization, problems like copyright and integrity infringement of digital content are growing exponentially. The content owner can prove their ownership by extracting the embedded watermark from the digitally breached data. The presented framework is robust to several geometrical and signal processing attacks, including lens distortions, intensity distortion, and moire distortion caused by recapture attack. The singular values of a watermark image and a unique security key are embedded in the host image's double-density dual-tree discrete wavelet transform (DDD-DWT) coefficients. However, most singular value decomposition (SVD) based watermarking algorithms are prone to false alarm rates and missed alarm rates, causing a security issue. On that account, the proposed watermarking scheme in this paper introduces a unique security key embedding for authentication at the decoder side. The experimental results show that the proposed framework provides high perceptibility with a WPSNR value > 59 dB and robustness against various attacks and security.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Design and Implementation of Attack-Resilient Cyberphysical Systems WITH A FOCUS ON ATTACk-RESILIENT STATE ESTIMATORS
    Pajic, Miroslav
    Weimer, James
    Bezzo, Nicola
    Sokolsky, Oleg
    Pappas, George J.
    Lee, Insup
    IEEE CONTROL SYSTEMS MAGAZINE, 2017, 37 (02): : 66 - 81
  • [2] Attack-Resilient Sensor Fusion
    Ivanov, Radoslav
    Pajic, Miroslav
    Lee, Insup
    2014 DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION (DATE), 2014,
  • [3] Attack-resilient random key distribution scheme for distributed sensor networks
    Kausar, Firdous
    Hussain, Sajid
    Kim, Tai-Hoon
    Masood, Ashraf
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4809 : 1 - +
  • [4] Attack-Resilient Temperature Sensor Design
    Kajol, Mashrafi Alam
    Yu, Qiaoyan
    2023 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS, 2023,
  • [5] Robustness of Attack-resilient State Estimators
    Pajic, Miroslav
    Weimer, James
    Bezzo, Nicola
    Tabuada, Paulo
    Sokolsky, Oleg
    Lee, Insup
    Pappas, George J.
    2014 ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS), 2014, : 163 - 174
  • [6] An Attack-Resilient Architecture for the Internet of Things
    Almohri, Hussain M. J.
    Watson, Layne T.
    Evans, David
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 (3940-3954) : 3940 - 3954
  • [7] An attack-resilient Grid auditing infrastructure
    Kunz, Christopher
    Wiebelitz, Jan
    Smith, Matthew
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 635 - 639
  • [8] Attack-Resilient TLS Certificate Transparency
    Khan, Salabat
    Zhu, Liehuang
    Zhang, Zijian
    Rahim, Mussadiq Abdul
    Khan, Khalid
    Li, Meng
    IEEE ACCESS, 2020, 8 : 98958 - 98973
  • [9] Lightweight and Attack-resilient PUF for Internet of Things
    Rajan, Akshayhari
    Sankaran, Sriram
    2020 6TH IEEE INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2020) (FORMERLY INIS), 2020, : 139 - 142
  • [10] An Attack-Resilient Channel Assignment MAC Protocol
    Zang, Wanyu
    Gu, Qijun
    Yu, Meng
    Liu, Peng
    2009 INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS, 2009, : 246 - +