Watermarking Images via Counting-Based Secret Sharing for Lightweight Semi-Complete Authentication

被引:27
作者
Gutub, Adnan [1 ]
机构
[1] Umm Al Qura Univ, Dept Comp Engn, Mecca, Saudi Arabia
关键词
Counting-Based Secret Sharing; Digital Lightweight Authentication; Image Steganography; Image Watermarking; Information Security; STEGANOGRAPHY; SECURITY;
D O I
10.4018/IJISP.2022010118
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Watermarking is the process of embedding specific data to prove ownership copyright authentication. It is needed whenever media files are used without proper permission being granted. The current watermarking challenge comes from the ownership proof especially as slight tampering occurs on the multimedia file which injure the watermarking causing difficulty in its copyright proof. This paper proposes utilizing counting-based secret sharing strategy to allow validation of ownership RGB watermarking even if some of the image file is interfered. The authors validate image watermarking partially as lightweight semi-complete verification, which is not possible in the normal random-stream watermarking schemes. Although the work is still in its early stage, it is promising research showing real attractive contribution opportunities. The work is tested and compared to other strategies in aspects of robustness, capacity, and security, providing attractive remarks worth noting. The study evaluation results showed interesting contribution believed to be pioneering.
引用
收藏
页数:18
相关论文
共 45 条
  • [1] A New Approach for Hiding Image Based on the Signature of Coefficients
    Al-asadi, Tawfiq A.
    Ali, Israa Hadi
    Kadhem, Abdul Kadhem Abdul Kareem Abdul
    [J]. INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2015, 3 (05): : 13 - 22
  • [2] Security enhancement of shares generation process for multimedia counting-based secret-sharing technique
    Al-Ghamdi, Maimoona
    Al-Ghamdi, Manal
    Gutub, Adnan
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (12) : 16283 - 16310
  • [3] Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces
    Al-Nofaie, Safia
    Gutub, Adnan
    Al-Ghamdi, Manal
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (08) : 963 - 974
  • [4] Remodeling randomness prioritization to boost-up security of RGB image encryption
    Al-Roithy, Budoor Obid
    Gutub, Adnan
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (18) : 28521 - 28581
  • [5] Trustworthy image security via involving binary and chaotic gravitational searching within PRNG selections
    Al-Roithy, Budoor Obid
    Gutub, Adnan A.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (12): : 167 - 176
  • [6] Securing matrix counting-based secret-sharing involving crypto steganography
    Al-Shaarani, Faiza
    Gutub, Adnan
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (09) : 6909 - 6924
  • [7] AlKhodaidi T., 2019, INT J INFORM COMPUTE, V11, DOI [10.1504/IJICS.2019.1003741, DOI 10.1504/IJICS.2019.1003741]
  • [8] Refining image steganography distribution for higher security multimedia counting-based secret-sharing
    AlKhodaidi, Taghreed
    Gutub, Adnan
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (01) : 1143 - 1173
  • [9] Trustworthy Target Key Alteration Helping Counting-Based Secret Sharing Applicability
    AlKhodaidi, Taghreed
    Gutub, Adnan
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (04) : 3403 - 3423
  • [10] Integrity verification for digital Holy Quran verses using cryptographic hash function and compression
    Almazrooie, Mishal
    Samsudin, Azman
    Gutub, Adnan Abdul-Aziz
    Salleh, Muhammad Syukri
    Omar, Mohd Adib
    Hassan, Shahir Akram
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2020, 32 (01) : 24 - 34