Document Type : Research Article

Authors

Department of Computer and Data Sciences, Shahid Beheshti University, Tehran, Iran

Abstract

Nowadays, from one hand multimedia authentication techniques are widely used to achieve trustworthiness, on the other hand, due to the rapid growth of image processing software technologies, having a secure method to protect the copyright of these data seems fairly essential. Multipurpose watermarking emerged in order to simultaneously accomplish multimedia authentication and copyright protection. In this paper, we propose a multipurpose watermarking method which achieves perfect security, the ability to detect tampered areas of the watermarked image as well as a lower BER rate, at the cost of reducing capacity by half. This watermarking scheme is blind in the sense that on the receiver side, neither the original host image nor the embedded watermark is needed for ownership watermark extraction or tamper detection. Experimental results show that our method is able to reconstruct extracted tampered watermarks even after various attacks such as JPEG compression, average filtering, gamma correction, median filtering, speckle noise, JPEG compression, sharpening, Wiener filter, and median filtering. Comparisons are provided with other multipurpose watermarking methods which primarily aim at simultaneous goals of copyright protection and authentication. We also show the superiority of our proposed method to three watermarking methods attaining these objectives on a one-goal-at-a-time basis.

Keywords

[1] Zhi-Fang Yang, Chih-Ting Kuo, and Te-Hsi Kuo. Authorization identification by watermarking in log-polar coordinate system. The Computer Journal, 61(11):1710–1723, 2018.
[2] Kariman M Mabrouk, Noura A Semary, and Hatem Abdul-Kader. Fragile watermarking techniques for 3d model authentication. In International Conference on Advanced Machine Learning Technologies and Applications, pages 669–679.
Springer, 2019.
[3] Pabitra Pal, Biswapati Jana, and Jaydeb Bhaumik. Robust watermarking scheme for tamper detection and authentication exploiting ca. IET Image Processing, 13(12):2116–2129, 2019.
[4] Ta Minh Thanh and Munetoshi Iwakiri. Fragile watermarking with permutation code for contentleakage in digital rights management system. Multimedia Systems, 22(5):603–615, Oct 2016.
[5] Zhe-Ming Lu, Dian-Guo Xu, and Sheng-He Sun. Multipurpose image watermarking algorithm based on multistage vector quantization. IEEE Transactions on Image Processing, 14(6):822–831,2005.
[6] Taehae Kim, Yongwha Chung, Seunghwan Jung, and Daesung Moon. Secure remote fingerprint verification using dual watermarks. In Digital Rights Management. Technologies, Issues, Challenges and Systems, pages 217–227. Springer,2006.
[7] Chokri Chemak, Mohamed Salim Bouhlel, and Jean Christophe Lapayre. A new scheme of robust image watermarking: the double watermarking algorithm. In Proceedings of the 2007 summer computer simulation conference, pages 1201–1208.
Society for Computer Simulation International, 2007.
[8] Tzung-Her Chen, Tsung-Hao Hung, Gwoboa Horng, and Chia-Ming Chang. Multiple watermarking based on visual secret sharing. International Journal of Innovative Computing Information and Control, 4(11):3005–3026, 2008.
[9] Tien-You Lee and Shinfeng D Lin. Dual watermark for image tamper detection and recovery. Pattern recognition, 41(11):3497–3506, 2008.
[10] Rafiullah Chamlawi, Asifullah Khan, and Imran Usman. Authentication and recovery of images using multiple watermarks. Computers & Electrical Engineering, 36(3):578–584, 2010.
[11] Qi Han, Lei Han, Erfu Wang, and Jie Yang. Dual watermarking for image tamper detection and self-recovery. In Intelligent Information Hiding and Multimedia Signal Processing, 2013 Ninth International Conference on, pages 33–36. IEEE,2013.
[12] Irshad Ahmad Ansari and Millie Pant. Multipurpose image watermarking in the domain of dwt based on svd and abc. Pattern Recognition Letters, 94:228–236, 2017.
[13] Baiying Lei, Xin Zhao, Haijun Lei, Dong Ni, Siping Chen, Feng Zhou, and Tianfu Wang. Multipurpose watermarking scheme via intelligent method and chaotic map. Multimedia Tools and Applications, pages 1–23, 2017.
[14] Sohailah Alyammahi, Fatma Taher, Hussain AlAhmad, and Tim McGloughlin. A new multiple watermarking scheme for copyright protection and image authentication. In Circuits and Systems (MWSCAS), 2016 IEEE 59th International
Midwest Symposium on, pages 1–4. IEEE, 2016.
[15] Maha Sharkas, Dahlia ElShafie, and Nadder Hamdy. A dual digital-image watermarking technique. In International Journal of Computer and Information Engineering WEC (5), pages 1477–1480, 2005.
[16] Peng Zheng, Weihua Wang, and Juan Wang. A hybrid watermarking technique to resist tampering and copy attacks. In 2011 International Symposium on Intelligence Information Processing and Trusted Computing, pages 111–114. IEEE,2011.
[17] Irshad Ahmad Ansari, Millie Pant, Chang Wook Ahn, and Jaehun Jeong. PSO optimized multipurpose image watermarking using SVD and chaotic sequence. In Bio-Inspired Computing-Theories and Applications, pages 1–17. Springer, 2015.
[18] Irshad Ahmad Ansari and Millie Pant. Multipurpose image watermarking in the domain of DWT based on SVD and abc. Pattern Recognition Letters, 94:228–236, 2017.
[19] Fr´ed´eric Deguillaume, Sviatoslav Voloshynovskiy, and Thierry Pun. Secure hybrid robust watermarking resistant against tampering and copy attack. Signal Processing, 83(10):2133–2170, 2003.
[20] Alavi Kunhu and Hussain Al-Ahmad. Multi watermarking algorithm based on DCT and hash functions for color satellite images. In Innovations in Information Technology (IIT), 2013 9th International Conference on, pages 30–35. IEEE,2013.
[21] Zhifang Wang, Bian Yang, Xiamu Niu, and Yijia Zhang. A practical multipurpose watermarking scheme for visual content copyright protection and authentication. In Intelligent Information Hiding and Multimedia Signal Processing, 2006. IIH-MSP’06. International Conference on, pages 461–464. IEEE, 2006.
[22] Peng Zheng, Weihua Wang, and Juan Wang. A hybrid watermarking technique to resist tampering and copy attacks. In 2011 International Symposium on Intelligence Information Processing and Trusted Computing, pages 111–114. IEEE,2011.
[23] Yanxia Zhao and Zenghui Zhou. Multipurpose blind watermarking algorithm for color image based on DWT and DCT. In Wireless Communications, Networking and Mobile Computing(WiCOM), 2012 8th International Conference on,pages 1–4. IEEE, 2012.
[24] Yuwei Peng, Hai Lan, Mingliang Yue, and Yu Xue. Multipurpose watermarking for vector map protection and authentication. Multimedia Tools and Applications, 77(6):7239–7259, 2018.
[25] Hui Shi, Ming-chu Li, Cheng Guo, and Ru Tan. A region-adaptive semi-fragile dual watermarking scheme. Multimedia Tools and Applications,75(1):465–495, 2016.
[26] Priyanka Singh and Suneeta Agarwal. A self recoverable dual watermarking scheme for copyright protection and integrity verification. Multimedia Tools and Applications, 76(5):6389–6428,2017.
[27] Kai-xing Wu, Wei-wei Yan, and Jing Du. A robust dual digital-image watermarking technique. In Computational Intelligence and Security Workshops, 2007. CISW 2007. International Conference on, pages 668–671. IEEE, 2007.
[28] Zhe-Ming Lu, Dian-Guo Xu, and Sheng-He Sun. Multipurpose image watermarking algorithm based on multistage vector quantization. IEEE Transactions on Image Processing, 14(6):822–831,2005.
[29] Chune Zhang, Lee Lung Cheng, Zhengding Qiu,and Lee-Ming Cheng. Multipurpose watermarking based on multiscale curvelet transform. IEEE Transactions on Information Forensics and Security, 3(4):611–619, 2008.
[30] Hanan S Alshanbari. Medical image watermarking for ownership and tamper detection. Multimedia Tools and Applications, pages 1–16, 2020.
[31] Sorour Sheidani and Ziba Eslami. Blind multipurpose image watermarking based on secret sharing. In 2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), pages 1–8.
IEEE, 2019.
[32] Rishi Sinhal and Irshad Ahmad Ansari. A multipurpose image watermarking scheme for digital image protection. International Journal of System Assurance Engineering and Management,pages 1–13, 2019.
[33] George Robert Blakley. Safeguarding cryptographic keys. In Proceedings of the national computer conference, volume 48, pages 313–317, 1979.
[34] Ziba Eslami and Saideh Kabiri Rad. A new verifiable multi-secret sharing scheme based on bilinear maps. Wireless Personal Communication 63(2):459–467, 2012.
[35] Adi Shamir. How to share a secret. Communications of the ACM, 22(11):612–613, 1979.
[36] Z Eslami and J Zarepour Ahmadabadi. A verifiable multi-secret sharing scheme based on cellular automata. Information Sciences, 180(15):2889–2894, 2010.
[37] Benny Chor, Shafi Goldwasser, Silvio Micali, and Baruch Awerbuch. Verifiable secret sharing and achieving simultaneity in the presence of faults. In Foundations of Computer Science, 1985., 26th Annual Symposium on, pages 383–395. IEEE,1985.
[38] Rituraj Roy, Sayantani Bandyopadhyay, Shyamalendu Kandar, and Bibhas Chandra Dhara. A novel 3–4 image secret sharing scheme. In Advances in Computing, Communications and Informatics (ICACCI), 2015 International Conference
on, pages 2072–2075. IEEE, 2015.
[39] Torben Pryds Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In Annual International Cryptology Conference, pages 129–140. Springer, 1991.
[40] Lin Liu. A survey of digital watermarking technologies. Department of Electrical and Computer Engineering, State University of New York at Stony Brook, NY, pages 1–12, 2005.
[41] Paul Feldman. A practical scheme for noninteractive verifiable secret sharing. In Foundations of Computer Science, 1987., 28th Annual Symposium on, pages 427–438. IEEE, 1987.
[42] Yanjun Liu, Lein Harn, and Chin-Chen Chang. A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets. International Journal of Communication Systems, 28(7):1282–1292, 2015.
[43] Zhuhong Shao, Yuanyuan Shang, Yu Zhang, Xilin Liu, and Guodong Guo. Robust watermarking using orthogonal fourier–mellin moments and chaotic map for double images. Signal Processing,120:522–531, 2016.
[44] Douglas R Stinson. Cryptography: theory and practice. Chapman and Hall/CRC, 2005.
[45] Radu O Preda. Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain. Measurement,46(1):367–373, 2013.
[46] Bank of Standardized stimuli. BOSStimpuli,(Accessed September 02 2020). Retrieved from https://sites.google.com/site/
bosstimuli/.
[47] Shabir A Parah, Javaid A Sheikh, Nazir A Loan,and Ghulam M Bhat. Robust and blind watermarking technique in dct domain using interblock coefficient differencing. Digital Signal Processing, 53:11–24, 2016.
[48] Yaoran Huo, Hongjie He, and Fan Chen. A semifragile image watermarking algorithm with twostage detection. Multimedia tools and applications, 72(1):123–149, 2014.
[49] The USC-SIPI Image Database. (Accessed July21 2017). Retrieved from http://sipi.usc.
edu/database/database.php?volume=misc.
[50] DECSAI. (Accessed July 21 2017). Retrieved from http://decsai.ugr.es/cvg/CG/base.htm.
[51] ECE Department at Polytechnic Institute of NYU. (Accessed July 21 2017). Retrieved from http://eeweb.poly.edu/~yao/
EL5123/SampleData.html.
[52] ImageProcessingPlace: Standard test images. (Accessed July 21 2017). Retrieved from
https://bit.ly/350ncHL.
[53] Gonzalez and Woods. Image Processing Place: Images from Digital Image Processing, 3 edition,
(Accessed July 21 2017). Retrieved from https://bit.ly/2QMFdRx.
[54] Xiaobing Kang, Yajun Chen, Fan Zhao, and Guangfeng Lin. Multi-dimensional particle swarm optimization for robust blind image watermarking using intertwining logistic map and hybrid domain. Soft Computing, 24(14):10561–10584, 2020.