A novel semi fragile watermarking technique for tamper detection and recovery using IWT and DCT

被引:0
作者
Nandhini Sivasubramanian
Gunaseelan Konganathan
机构
[1] VJTI,Department of Electrical Engineering
[2] Anna University,Department of Electronics and Communication Engineering, College of Engineering, Gunidy
来源
Computing | 2020年 / 102卷
关键词
Semi fragile watermarking; Integer wavelet transform; Image processing; Tamper detection; Tamper recovery; Enterprise multimedia security; 68U10; 94A08;
D O I
暂无
中图分类号
学科分类号
摘要
A novel semi fragile watermarking technique using integer wavelet transform (IWT) and discrete cosine transform (DCT) for tamper detection and recovery to enhance enterprise multimedia security is proposed. In this paper, two types of watermark are generated which are namely the authentication watermark and recovery Watermark. The Watermarked Image is formed by embedding the authentication watermark which is generated using the proposed IWT based authentication watermark generating Technique. Next, the watermarked image is divided into 2 × 2 blocks and a 10 bit recovery watermark is generated from each of the 2 × 2 blocks using the proposed DCT based recovery watermark generation technique. The generated recovery watermark is used to form the recovery tag which is sent along with the watermarked image to the receiver. At the receiver side, the proposed tamper detection technique is used for verifying the authenticity and identifying the attacks in the watermarked image. If the manipulations are identified as malicious, then the tampered parts in the received image are recovered using the proposed tamper recovery technique. The performance of the proposed tamper detection and recovery technique was tested for different types of incidental/content preserving manipulations and various types of malicious attacks. When compared to the existing semi fragile watermarking techniques, the proposed embedding technique produced a better PSNR (Peak Signal to noise ratio) for various watermarked images. Also, the proposed tamper detection and recovery technique were able to localize the malicious attacks and subsequently recover the tampered parts when compared to the existing techniques. The increased performance of the proposed tamper detection and recovery technique was due to the usage of both Normalized Hamming Similarity (NHS) and tamper detection map in the proposed tamper detection technique to identify manipulations and due to the generation of both the authentication and recovery watermark.
引用
收藏
页码:1365 / 1384
页数:19
相关论文
共 57 条
[1]  
Anwar S(2017)From intrusion detection to an intrusion response system: fundamentals, requirements and future directions Algorithms 10 39-10121
[2]  
Zain J-M(2018)Image pattern recognition in big data: taxonomy and open challenges: survey Multimed Tools Appl 77 10091-592
[3]  
Zolkipli M-F(2019)Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system Inf Sci 479 567-1436
[4]  
Inayat Z(2018)SFaaS: keeping an eye on IoT fusion environment with security fusion as a service Future Gen Comput Syst 86 1424-373
[5]  
Khan S(2013)Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain Measurement 46 367-212
[6]  
Anthony B(2015)Image authentication and recovery using wavelet-based dual watermarking UPB Sci Bull Ser C 77 199-123
[7]  
Chang V(2017)Watermarking based image authentication and tamper detection algorithm using vector quantization approach AEU-Int J Electron Commun 78 114-1833
[8]  
Zerdoumi S(2015)Tamper detection and self-recovery scheme by DWT watermarking Nonlinear Dyn 79 1817-527
[9]  
Sabri A-Q-M(2011)A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm Digit Signal Proc 21 522-831
[10]  
Kamsin A(2005)Multipurpose image watermarking algorithm based on multistage vector quantization IEEE Trans Image Process 14 822-126