Dual Watermarking for Color Images: A New Image Copyright Protection Model based on the Fusion of Successive and Segmented Watermarking

被引:0
作者
Saad M. Darwish
Layth Dhafer Shukur Al-Khafaji
机构
[1] University of Alexandria,Department of Information Technology, Institute of Graduate Studies and Research
[2] Djlah University College,Computer Technical Engineering
来源
Multimedia Tools and Applications | 2020年 / 79卷
关键词
Dual Watermarking; Information Fusion; Image Copyright Protection; Optimization; Wavelet-based Feature Extraction; Walsh Encryption;
D O I
暂无
中图分类号
学科分类号
摘要
Watermarking has been suggested as a generic technique to solve various problems associated with topics in the areas of digital rights management and multimedia security. Most of the early methods were based on single watermark embedding, but there are great limitations when single watermark embedding algorithms are tried into practical applications. The multiple watermarks are intended to convey different information at the same time. Current approaches rely on adding many watermarks in different bands or channels by means of scaling factor and embedding locations that are mainly defined by experts. This brought many challenges in achieving equilibrium between security, robustness, and quality. The aim of this work is to introduce an intelligent dual watermarking model for colour images that ensure image security for copyright protection (dual watermarking for single purpose). To optimize the dual watermarking requirements, the proposed model that employs both successive (re-) and segmented watermarking techniques is to be implemented with a multi-purpose evolutionary algorithm. Genetic algorithm is adopted to determine the embedding locations and scaling factors for different watermarks according to the features of each host image to balance between imperceptibility and robustness. The wavelet transform is utilized for salient features extraction because of its excellent space-frequency localization of salient image features. In addition, the suggested model encrypts the watermarks with the aid of Walsh transform; so that it is difficult to handle the watermarks even after being extracted by the attackers. Experimental results show that the proposed model is more robust against common image manipulation attacks in terms of PSNR and NCC.
引用
收藏
页码:6503 / 6530
页数:27
相关论文
共 87 条
[1]  
Aakanksha T(2017)A Lightweight Mutual Authentication Protocol based on Elliptic Curve Cryptography for IOT Devices International Journal of Advanced Intelligence Paradigms 9 111-121
[2]  
Gupta B(2010)Video Watermarking using Wavelet Transform and Tensor Algebra SIViP 4 233-245
[3]  
Abdallah E(2010)Image based Steganography Using Truth Table Based and Determinate Array on RGB Indicator International Journal of Signal and Image Processing 1 196-204
[4]  
Hamza A(2018)3-Layer PC Text Security via Combining Compression, AES Cryptography 2LSB Image Steganography Journal of Research in Engineering and Applied Sciences 3 118-124
[5]  
Bhattacharya P(2018)Merging Secret Sharing Within Arabic Text Steganography for Practical Retrieval Journal of Computer Science Engineering 4 1-7
[6]  
Abu-Marie W(2019)Security Enhancement of Shares Generation Process for Multimedia Counting-vased Secret-Sharing Technique Multimed Tools Appl 78 16283-16310
[7]  
Gutub A(2018)Enhancing PC Data Security Via Combining RSA Cryptography and Video based Steganography Journal of Information Security and Cybercrimes Research (JISCR) 1 8-18
[8]  
Abu-Mansour H(2014)2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers Lecture Notes on Information Theory 2 151-157
[9]  
Alanizy N(2018)Compression Multi-Level Crypto Stego Security of Texts Utilizing Colored Email Forwarding Journal of Computer Science & Computational Mathematics 8 33-42
[10]  
Alanizy A(2017)Homomorphic Encryption as a Service for Outsourced Images in Mobile Cloud Computing Environment International Journal of Cloud Applications and Computing 7 27-40