Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Blind multipurpose watermarking with insertion of a single watermark: a generic construction based on verifiable threshold secret sharing

Currently, the existing literature on multipurpose watermarking employs multiple watermarks for simultaneous achieving of multiple security objectives. This approach can be problematic since a watermark targeting tampers might fail to detect tampering of another watermark inserted for copyright violation. Moreover, most of the current schemes follow a non-blind approach where the original watermark is needed for authentication. A question that naturally arises is whether multipurpose watermarking can be realised with the insertion of a single watermark in a blind way or not. The goal of the authors study is to provide an affirmative answer to this important question. They show how a cryptographic primitive called verifiable threshold secret sharing can be used to come up with a generic construction for blind multipurpose watermarking which inserts a single watermark into the host image for simultaneous achieving of copyright protection, authentication, and tamper localisation. The generic property of the proposed scheme provides flexibility for choosing the embedding/extraction of the watermark based on the desired level of fidelity, robustness and capacity. Experimental results are provided to confirm the superiority of their proposed technique as compared to existing approaches.

References

    1. 1)
      • 32. Shamir, A.: ‘How to share a secret’, Commun. ACM, 1979, 22, (11), pp. 612613.
    2. 2)
      • 4. Kricha, Z., Kricha, A., Sakly, A.: ‘Accommodative extractor for qim-based watermarking schemes’, IET Image Process., 2018, 13, (1), pp. 8997.
    3. 3)
      • 20. Deguillaume, F., Voloshynovskiy, S., Pun, T.: ‘Secure hybrid robust watermarking resistant against tampering and copy attack’, Signal Process., 2003, 83, (10), pp. 21332170.
    4. 4)
      • 21. Kunhu, A., Al-Ahmad, H.: ‘Multi watermarking algorithm based on DCT and hash functions for color satellite images’. Innovations in Information Technology (IIT) 2013 9th Int. Conf. on. (IEEE), Al Ain, United Arab Emirates, 2013, pp. 3035.
    5. 5)
      • 39. Huo, Y., He, H., Chen, F.: ‘A semi-fragile image watermarking algorithm with two-stage detection’, Multimedia Tools Appl., 2014, 72, (1), pp. 123149.
    6. 6)
      • 17. Sharkas, M., ElShafie, D., Hamdy, N., et al: ‘A dual digital-image watermarking technique’. Int. Journal of Computer and Information Engineering WEC (5), Istanbul, Turkey, 2005, pp. 14771480.
    7. 7)
      • 5. Piper, A., Safavi-Naini, R.: ‘Scalable fragile watermarking for image authentication’, IET Inf. Sec., 2013, 7, (4), pp. 300311.
    8. 8)
      • 16. Alyammahi, S., Taher, F., Al-Ahmad, H., et al: ‘A new multiple watermarking scheme for copyright protection and image authentication’. Circuits and Systems (MWSCAS) 2016 IEEE 59th Int. Midwest Symp. on. (IEEE), Abu Dhabi, United Arab Emirates, 2016, pp. 14.
    9. 9)
      • 14. Lei, B., Zhao, X., Lei, H., et al: ‘Multipurpose watermarking scheme via intelligent method and chaotic map’, Multimedia Tools Appl., 2017, 78, pp. 123.
    10. 10)
      • 24. Lu, Z.M., Xu, D.G., Sun, S.H.: ‘Multipurpose image watermarking algorithm based on multistage vector quantization’, IEEE Trans. Image Process., 2005, 14, (6), pp. 822831.
    11. 11)
      • 11. Chen, T.H., Hung, T.H., Horng, G., et al: ‘Multiple watermarking based on visual secret sharing’, Int. J. Innov. Comput. Inf. Control, 2008, 4, (11), pp. 30053026.
    12. 12)
      • 25. Zhao, Y., Zhou, Z.: ‘Multipurpose blind watermarking algorithm for color image based on DWT and DCT’. Wireless Communications Networking and Mobile Computing (WiCOM) 2012 8th Int. Conf. on. (IEEE), Shanghai, People's Republic of China, 2012, pp. 14.
    13. 13)
      • 15. Ansari, I.A., Pant, M.: ‘Multipurpose image watermarking in the domain of DWT based on SVD and abc’, Pattern Recognit. Lett., 2017, 94, pp. 228236.
    14. 14)
      • 27. Li, C., Wang, Y., Ma, B., et al: ‘Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme’, Comput. Stand. Interfaces, 2012, 34, (4), pp. 367379.
    15. 15)
      • 35. Feldman, P.: ‘A practical scheme for non-interactive verifiable secret sharing’. Foundations of Computer Science 1987 28th Annual Symp. on. (IEEE), Los Angeles, CA, USA, 1987, pp. 427438.
    16. 16)
      • 9. Preda, R.O.: ‘Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain’, Measurement, 2013, 46, (1), pp. 367373.
    17. 17)
      • 3. Han, S.H., Chu, C.H.: ‘Content-based image authentication: current status, issues, and challenges’, Int. J. Inf. Secur., 2010, 9, (1), pp. 1932.
    18. 18)
      • 41. Singh, P., Agarwal, S.: ‘A self recoverable dual watermarking scheme for copyright protection and integrity verification’, Multimedia Tools Appl., 2017, 76, (5), pp. 63896428.
    19. 19)
      • 19. Alshanbari, H.S.: ‘Medical image watermarking for ownership & tamper detection’, Multimedia Tools Appl., 2020, pp. 116, https://doi.org/10.1007/s11042-020-08814-9.
    20. 20)
      • 18. Zheng, P., Wang, W., Wang, J.: ‘A hybrid watermarking technique to resist tampering and copy attacks’. 2011 Int. Symp. on Intelligence Information Processing and Trusted Computing. (IEEE), Wuhan, People's Republic of China, 2011, pp. 111114.
    21. 21)
      • 31. Blakley, G.R.: ‘Safeguarding cryptographic keys’. Proc. of the National Computer Conf., Monval, NJ, USA, 1979, vol. 48, pp. 313317.
    22. 22)
      • 37. SIPI, X.: ‘(sipi), s.a.i.p.i.: The usc-sipi image database’. Accessed Oct 10 2019. http://sipi.usc.edu/database/database.php?volume=misc.
    23. 23)
      • 2. Su, Q.: ‘Novel blind colour image watermarking technique using hessenberg decomposition’, IET Image Process., 2016, 10, (11), pp. 817829.
    24. 24)
      • 30. Eslami, Z., Rad, S.K.: ‘A new verifiable multi-secret sharing scheme based on bilinear maps’, Wirel. Pers. Commun., 2012, 63, (2), pp. 459467.
    25. 25)
      • 8. Pal, P., Jana, B., Bhaumik, J.: ‘Robust watermarking scheme for tamper detection and authentication exploiting ca’, IET Image Process., 2019, 13, (12), pp. 21162129.
    26. 26)
      • 13. Ansari, I.A., Pant, M., Ahn, C.W., et al: ‘PSO optimized multipurpose image watermarking using SVD and chaotic sequence’. Bio-Inspired Computing-Theories and Applications. (Springer), Berlin, Germany, 2015, pp. 117.
    27. 27)
      • 6. Liu, S., Pan, Z., Song, H.: ‘Digital image watermarking method based on dct and fractal encoding’, IET Image Process., 2017, 11, (10), pp. 815821.
    28. 28)
      • 38. DECSAI, X.: ‘Decsai’. Accessed Oct 10 2019. http://decsai.ugr.es/cvg/CG/base.htm.
    29. 29)
      • 12. Wong, P.H., Au, O.C., Yeung, Y.M.: ‘Novel blind multiple watermarking technique for images’, IEEE Trans. Circuits Syst. Video Technol., 2003, 13, (8), pp. 813830.
    30. 30)
      • 36. Poonkuntran, S., Rajesh, R.: ‘Chaotic model based semi fragile watermarking using integer transforms for digital fundus image authentication’, Multimedia Tools Appl., 2014, 68, (1), pp. 7993.
    31. 31)
      • 7. Guo, Y., Li, B.Z.: ‘Blind image watermarking method based on linear canonical wavelet transform and qr decomposition’, IET Image Process., 2016, 10, (10), pp. 773786.
    32. 32)
      • 22. Wang, Z., Yang, B., Niu, X., et al: ‘A practical multipurpose watermarking scheme for visual content copyright protection and authentication’. Intelligent Information Hiding and Multimedia Signal Processing, 2006. IIH-MSP'06. Int. Conf. on. (IEEE), Pasadena, CA, USA, 2006, pp. 461464.
    33. 33)
      • 28. Wu, K.x., Yan, W.w., Du, J.: ‘A robust dual digital-image watermarking technique’. Computational Intelligence and Security Workshops 2007. CISW 2007. Int. Conf. on. (IEEE), Harbi, People's Republic of China, 2007, pp. 668671.
    34. 34)
      • 10. Joshi, V.B., Raval, M.S., Gupta, D., et al: ‘A multiple reversible watermarking technique for fingerprint authentication’, Multimedia Syst., 2016, 22, (3), pp. 367378. Available from: https://doi.org/10.1007/s00530-015-0465-6.
    35. 35)
      • 26. Peng, Y., Lan, H., Yue, M., et al: ‘Multipurpose watermarking for vector map protection and authentication’, Multimedia Tools Appl., 2018, 77, (6), pp. 72397259.
    36. 36)
      • 40. Parah, S.A., Sheikh, J.A., Loan, N.A., et al: ‘Robust and blind watermarking technique in dct domain using inter-block coefficient differencing’, Digit. Signal Process., 2016, 53, (7), pp. 1124.
    37. 37)
      • 23. Shen, H., Chen, B.: ‘From single watermark to dual watermark: a new approach for image watermarking’, Comput. Electr. Eng., 2012, 38, (5), pp. 13101324.
    38. 38)
      • 34. Chor, B., Goldwasser, S., Micali, S., et al: ‘Verifiable secret sharing and achieving simultaneity in the presence of faults’. Foundations of Computer Science 1985 26th Annual Symp. on. (IEEE), Portland, OR, USA, 1985, pp. 383395.
    39. 39)
      • 1. Qureshi, M.A., El-Alfy, E.S.M.: ‘Bibliography of digital image anti-forensics and anti-anti-forensics techniques’, IET Image Process., 2019, 13, (11), pp. 18111823.
    40. 40)
      • 29. Shi, H., Li, M.c., Guo, C., et al: ‘A region-adaptive semi-fragile dual watermarking scheme’, Multimedia Tools Appl., 2016, 75, (1), pp. 465495.
    41. 41)
      • 33. Eslami, Z., Ahmadabadi, J.Z.: ‘A verifiable multi-secret sharing scheme based on cellular automata’, Inf. Sci., 2010, 180, (15), pp. 28892894.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ipr.2019.1576
Loading

Related content

content/journals/10.1049/iet-ipr.2019.1576
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address