Abstract
This chapter presents a robust and secure framework for multimedia security using digital watermarking. In the proposed scheme, a cover image is transformed into frequency domain based on all phase discrete bi-orthogonal transform (APDBT) followed by singular value decomposition. A gray-scale watermark is then embedded by modifying the singular values. For watermark extraction, a new procedure based on dynamic stochastic resonance (DSR) is employed. The proposed DSR based extraction effectively utilizes the noise introduced during the attacks to enhance the robustness and authenticity of the watermark. A detailed experimental analysis is finally conducted to demonstrate the robustness and efficiency of the proposed scheme against a variety of attacks.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Menezes, A.J., Van Oorschot, P.C. and Vanstone, S.A., Handbook of applied cryptography, CRC press, Boca Raton, (1996).
Singh S.P., Bhatnagar G., Gurjar D.K., A secure image encryption algorithm based on polar decomposition, International Colloquium on Signal Processing & Its Applications, pp 135–139, (2018).
Singh, S.P. and Bhatnagar, G., A robust image hashing based on discrete wavelet transform, International Conference on Signal and Image Processing Applications (ICSIPA), pp. 440–444, (2017).
Stallings, W., Cryptography and Network Security: Principles and Practice, Prentice-Hall, Upper Saddle River, (1999).
Katzenbeisser, S. and Petitcolas, F. A. P., Information hiding techniques for steganography and digital watermarking, Artech House, Boston, (2002).
Cox, I.J., Miller, M.L. and Bloom, J.A., Digital watermarking, Morgan Kaufmann, San Francisco, (2001).
Arnold, M., Schmucker, M. and Wolthusen, S.D., Techniques and applications of digital watermarking and content protection, Artech House, (2003).
Muharemagic, E. and Furht, B., Multimedia Security: Watermarking Techniques, Comprehensive Report on Information Security, International Engineering Consortium, Chicago, (2004).
Bhatnagar, G. and Raman, B., A new robust reference watermarking scheme based on DWT-SVD, Computer Standards & Interfaces, 31(5), pp. 1002–1013, (2009).
Izquierdo, E., Fragile watermarking for image authentication, Multimedia Security Handbook, CRC Press, Boca Raton, (2005).
Zhu, X., Ho, A.T.S. and Marziliano, P., A new semi-fragile image watermarking with robust tampering restoration using irregular sampling, Signal Processing, Image Communication, 22(5), pp. 515–528, (2007).
Schyndle, R.G.V., Tirkel, A.Z. and Osbrone, C.F., A Digital Watermark, International Conference on Image Processing, 2, pp. 86–90, (1994).
Bender, W., Gruhl, D., Morimoto, N. and Lu, A., Techniques for data hiding, IBM Systems Journal, 35(3-4), pp. 313–336, (1996).
Nikolaidis N. and Pitas I., Copyright protection of images using robust digital signatures, International Conference on Acoustics, Speech, Signal Processing, 4, pp. 2168–2171, (1996).
Voyatzis G. and Pitas I., Applications of toral automorphisms in image watermarking, International Conference on Image Processing, 2, pp. 237–240, (1996).
Pitas I. and Kaskalis, T.H., Applying signatures on digital images, Workshop on Non-linear Signal and Image Processing, pp. 460–463, (1995).
Perez-Freire L. and Perez-Gonzalez F., Spread-spectrum watermarking security, IEEE Transactions on Information Forensics and Security, 4(1), pp. 2–24, (2009).
Bas, P. and Furon, T., A new measure of watermarking security: The effective key length, IEEE Transactions on Information Forensics and Security, 8(8), pp. 1306–1317, pp. (2013).
Chen S. T., Huang H. N., Kung, W. M. and Hsu, C. Y., Optimization-based image watermarking with integrated quantization embedding in the wavelet-domain, Multimedia Tools and Applications, 75(10), pp. 5493–5511, (2016).
Singh S. P. and Bhatnagar G., A novel chaos based robust watermarking framework, International Conference on Computer Vision and Image Processing, 2, pp. 439–447, (2017).
Cox, I.J., Killian, J., Leighton, F.T. and Shamoon, T., Secure spread spectrum watermarking for multimedia, IEEE Transaction on Image Processing, 6(12), pp. 1673–1687, (1997).
Barni, M., Bartiloni, F. and Piva, A., Improved wavelet based watermarking through pixel wise masking, IEEE Transactions on Image Processing, 10, pp. 783–791, (2001).
Huang, J., Shi, Y.Q. and Shi, Y., Embedding image watermarks in dc components, IEEE Transactions on Circuits and Systems for Video Technology, 10(6), pp. 974–979, (2000).
Tao, H., Chongmin, L., Zain, J.M. and Abdalla, A.N., Robust image watermarking theories and techniques: A review, Journal of applied research and technology, 12(1), pp. 122–138, (2014).
Daren, H., Jiufen, L., Jiwu, H. and Hongmei, L., A DWT-based image watermarking algorithm, International Conference on Multimedia and Expo, pp. 313–316, (2001).
Serdean, C.V., Ambroze, M.A., Tomlinson, M. and Wade, J.G., DWT-based high-capacity blind video watermarking, invariant to geometrical attacks, Image and Signal Processing, 150(1), pp. 51–58, (2003).
Wenwu Zhu, Zixiang Xiong, and Ya-Qin Zhang, Multiresolution watermarking for images and video, IEEE Transactions on Circuits and Systems for Video Technology, 9(4), pp. 545–550, (1999).
Liu, R. and Tan, T., An SVD-Based Watermarking Scheme for Protecting Rightful Ownership, IEEE Transactions on Multimedia 4(1), pp. 121–128, (2002).
Ganic, E., Zubair, N. and Eskicioglu, A.M., An Optimal watermarking scheme based on singular value decomposition, International Conference on Communication, Network, and Information Security, pp. 85–90, (2003).
Ganic, E. and Eskicioglu, A.M., Robust embedding of visual watermarks using DWT-SVD, Journal of Electronic Imaging, (2005).
Lin, W. H., Horng, S. J., Kao, T. W., Fan, P., Lee, C. L. and Pan, Y., An efficient watermarking method based on significant difference of wavelet coefficient quantization, IEEE Transactions on Multimedia, 10(5), pp. 746–757, (2008).
Zhao, Y., Campisi, P. and Kundur, D., Dual domain watermarking for authentication and compression of cultural heritage images, IEEE Transactions on Image Processing, 13(3), pp. 430–448, (2004).
Singh S.P., Bhatnagar G., A robust watermarking scheme based on image normalization, International Colloquium on Signal Processing & Its Applications, pp 140–144, (2018).
Singh A.K., Kumar B, Singh S.K., Ghrera SP, Mohan A, Multiple watermarking technique for securing online social network contents using back propagation neural network, Future Generation Computer Systems, (2016).
Kumar C, Singh AK, Kumar P, Singh R, Singh S., SPIHT-based multiple image watermarking in NSCT domain, Concurrency and Computation: Practice and Experience, e4912, (2018).
Singh L, Singh AK, Singh PK, Secure data hiding techniques: a survey, Multimedia Tools and Applications, pp. 1–21, (2018).
Wu, G. and Qiu, Z., A novel watermarking scheme based on stochastic resonance, In: Proceedings of 8th International Conference on Signal Processing, 2, pp. 1–4, (2006).
Sun, S. and Lei, B., On an aperiodic stochastic resonance signal processor and its application in digital watermarking, Signal Processing, 88(8), pp. 2085–2094, (2008).
Chouhan R., Jha R.K., Chaturvedi A., Yamasaki T. and Aizawa K., Robust watermark extraction using SVD-based dynamic stochastic resonance, International Conference on Image Processing, 11, pp. 2745–2748, (2011).
Jha, R. K., Chouhan, R. and Aizawa, K., Dynamic stochastic resonance-based improved logo extraction in discrete cosine transform domain, Computers and Electrical Engineering, 40(6), pp. 1917–1929, (2014).
Jha, R. K., Biswas, P. K. and Shrivastava, S., Logo extraction using dynamic stochastic resonance, Signal, Image and Video Processing, 7(1), pp. 119–128, (2013).
Chouhan, R., Jha, R. K., Chaturvedi, A., Yamasaki, T. and Aizawa, K., Robust watermark extraction using SVD-based dynamic stochastic resonance, International Conference on Image Processing, pp. 2745–2748, (2011).
Singh, S.P., and Bhatnagar, G., A new robust watermarking system in integer DCT domain, Journal of Visual Communication and Image Representation, 53, pp. 86–101, (2018).
Wei, J.J., Chang, C.J., Chou, N.K. and Jan, G.J., ECG data compression using truncated singular value decomposition, IEEE Transactions on Information Technology in Biomedicine, 5(4), pp. 290–299, (2001).
Beltrami, E.: Sulle funzioni bilineari (On Bilinear Functions), Giornale di Matematiche ad Uso degli Studenti Delle Universita 11, pp. 98–106, (1873); An English translation by Boley, D. Tech. Report, Dept. of Computer Science, Univ. of Minnesota, Minneapolis, pp. 90–37, (1990).
Jordan, C., Memoire sur les formes bilineaires (Memoir on Bilinear Forms), Journal de Mathematiques Pures et Appliquees, Deuxieme Serie 19, pp. 35–54, (1874).
Eckart, C. and Young, G., The approximation of one matrix by another of lower rank, Psychometrika 1, pp. 211–218, (1936).
Andrews, H. and Patterson, C., Singular value decompositions and digital image processing, IEEE Transactions on Acoustics, Speech, and Signal Processing, 24(1), pp. 26–53, (1976).
Hou, Z. X., Wang, C. Y. and Yang, A. P., All phase biorthogonal transform and its application in JPEG-like image compression, Signal Processing: Image Communication, 24(10), pp. 791–802, (2009).
Hou, Z. and Yang, X., The all phase DFT filter, In Proc. of the 10th Digital Signal Processing (DSP) Workshop and Signal Processing Education (SPE) Workshop, pp. 221–226, (2002).
Hou, Z. X., Wang, Z. H., and Yang, X., Design and implementation of all phase DFT digital filter, Acta Electronica Sinica, 31(4), pp. 539–543, (2003).
Budagavi, M., Fuldseth, A. and Bjontegaard, G., HEVC transform and quantization, In High Efficiency Video Coding (HEVC), pp. 141–169, (2014).
Ahmed, N., Natarajan, T. and Rao, K.R., Discrete cosine transform, IEEE transactions on Computers, 100(1), pp. 90–93, (1974).
Zhou, X., Wang, C. and Jiang, B., All phase inverse discrete sine biorthogonal transform and its application in image coding, Journal of Communications, 12(1), (2017).
Benzi, R., Sutera, A. and Vulpiani, A., The mechanism of stochastic resonance, Journal of Physics A: mathematical and general, 14(11), (1981).
Gammaitoni, L., Hanggi, P., Jung, P. and Marchesoni, F., Stochastic resonance, Reviews of Modern Physics, 70(1), pp. 223–287, (1998).
Leng, Y. G., Wang, T. Y., Guo, Y., Xu, Y. G., and Fan, S. B., Engineering signal processing based on bistable stochastic resonance, Mechanical Systems and Signal Processing, 21(1), pp. 138–150, (2007).
Horsthemke, W., and Lefever, R., Noise-induced transitions in physics, chemistry, and biology, Noise-induced transitions: theory and applications in physics, chemistry, and biology, pp. 164–200, (1984).
Hongler, M. O., de Meneses, Y. L., Beyeler, A., and Jacot, J., The resonant retina: exploiting vibration noise to optimally detect edges in an image, IEEE Transactions on Pattern Analysis and Machine Intelligence, 25(9), pp. 1051–1062, (2003).
Badzey, R. L., and Mohanty, P., Coherent signal amplification in bistable nanomechanical oscillators by stochastic resonance, Nature, pp. 995–998, (2005).
Anishchenko, V.S., Neiman, A.B., Moss, F. and Schimansky-Geier, L., Stochastic Resonance: noise-enhanced order, Physics-Uspekhi, 42(1), pp. 7–36, (1999).
Hannes R., The Fokker-Planck Equation, Berlin, Heidelberg, (1996).
Gard, T.C., Introduction to Stochastic Differential Equation, Marcel-Dekker, New York, 1998.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Singh, S.P., Bhatnagar, G. (2019). A Novel Watermarking Technique for Multimedia Security. In: Singh, A., Mohan, A. (eds) Handbook of Multimedia Information Security: Techniques and Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-15887-3_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-15887-3_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-15886-6
Online ISBN: 978-3-030-15887-3
eBook Packages: Computer ScienceComputer Science (R0)