Real-time watermark reconstruction for the identification of source information based on deep neural network

被引:18
作者
Sinhal, Rishi [1 ]
Ansari, Irshad Ahmad [1 ]
Jain, Deepak Kumar [2 ]
机构
[1] PDPM Indian Inst Informat Technol Design & Mfg, Elect & Commun Engn, Jabalpur 482005, MP, India
[2] Chongqing Univ Posts & Telecommun, Coll Automat, Key Lab Intelligent Air Ground Cooperat Control U, Chongqing 400065, Peoples R China
关键词
Real-time source detection; Watermark reconstruction; Forwarded message identification; App source detection; Deep neural network; MACHINE LEARNING-METHODS; DIRECT-SEQUENCE CDMA; IMAGE WATERMARKING; SOCIAL MEDIA; DWT-SVD; ROBUST; PREDICTION; PRIVACY; SYSTEM; SCHEME;
D O I
10.1007/s11554-019-00937-z
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A novel deep neural network-based image watermarking method is presented to identify the source of digital data that is shared/forwarded on the internet using various messenger apps. The app that is used to share/communicate the image at the very first time is also identified in the proposed method. The ten-digit mobile number of the source (user) and identification data of particular messenger app (i.e. WhatsApp, Snapchat, Kik, Facebook messenger, etc.) is combined to get the text watermark signal. The part of the watermark signal representing specific mobile-based messenger application is obtained by randomizing the Walsh orthogonal codes using secret keys. To embed the watermark, the host image (shared/forwarded) is divided into blocks of equal size and then, slantlet transform is applied on each block. To get high reliability, three copies of the source information (user and app) are embedded during watermark embedding. Watermark extraction is performed using trained multilayer deep neural network. Furthermore, an optimal block selection logic is used to get improved results for real-time applications. The method is examined against various signal-processing attacks and high robustness with significant imperceptibility is attained. The method is also found to be fast enough for real-time applications. The prime objective of identifying the first user (source) and the shared/forwarded status (app detection) is successfully accomplished.
引用
收藏
页码:2077 / 2095
页数:19
相关论文
共 61 条
[1]   Walsh-like nonlinear phase orthogonal codes for direct sequence CDMA communications [J].
Akansu, Ali N. ;
Poluri, Radha .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2007, 55 (07) :3800-3806
[2]   Deep learning approach for active classification of electrocardiogram signals [J].
Al Rahhal, M. M. ;
Bazi, Yakoub ;
AlHichri, Haikel ;
Alajlan, Naif ;
Melgani, Farid ;
Yager, R. R. .
INFORMATION SCIENCES, 2016, 345 :340-354
[3]   Comments on "Optimized gray-scale image watermarking using DWT-SVD and Firefly Algorithm" [J].
Ali, Musrrat ;
Ahn, Chang Wook .
EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (05) :2392-2394
[4]   Privacy and Security Issues in Online Social Networks [J].
Ali, Shaukat ;
Islam, Naveed ;
Rauf, Azhar ;
Din, Ikram Ud ;
Guizani, Mohsen ;
Rodrigues, Joel J. P. C. .
FUTURE INTERNET, 2018, 10 (12)
[5]   Social Media Recommender Systems: Review and Open Research Issues [J].
Anandhan, Anitha ;
Shuib, Liyana ;
Ismail, Maizatul Akmar ;
Mujtaba, Ghulam .
IEEE ACCESS, 2018, 6 :15608-15628
[6]   Artificial bee colony optimized robust-reversible image watermarking [J].
Ansari, Irshad Ahmad ;
Pant, Millie ;
Ahn, Chang Wook .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (17) :18001-18025
[7]   ABC optimized secured image watermarking scheme to find out the rightful ownership [J].
Ansari, Irshad Ahmad ;
Pant, Millie ;
Ahn, Chang Wook .
OPTIK, 2016, 127 (14) :5711-5721
[8]   SVD based fragile watermarking scheme for tamper localization and self-recovery [J].
Ansari, Irshad Ahmad ;
Pant, Millie ;
Ahn, Chang Wook .
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2016, 7 (06) :1225-1239
[9]   A new decoder for the optimum recovery of nonadditive watermarks [J].
Barni, M ;
Bartolini, F ;
De Rosa, A ;
Piva, A .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (05) :755-766
[10]   Authentication and recovery of images using multiple watermarks [J].
Chamlawi, Rafiullah ;
Khan, Asifullah ;
Usman, Imran .
COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (03) :578-584