Skip to main content

A Novel Watermarking Technique for Multimedia Security

  • Chapter
  • First Online:
  • 1284 Accesses

Abstract

This chapter presents a robust and secure framework for multimedia security using digital watermarking. In the proposed scheme, a cover image is transformed into frequency domain based on all phase discrete bi-orthogonal transform (APDBT) followed by singular value decomposition. A gray-scale watermark is then embedded by modifying the singular values. For watermark extraction, a new procedure based on dynamic stochastic resonance (DSR) is employed. The proposed DSR based extraction effectively utilizes the noise introduced during the attacks to enhance the robustness and authenticity of the watermark. A detailed experimental analysis is finally conducted to demonstrate the robustness and efficiency of the proposed scheme against a variety of attacks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Menezes, A.J., Van Oorschot, P.C. and Vanstone, S.A., Handbook of applied cryptography, CRC press, Boca Raton, (1996).

    MATH  Google Scholar 

  2. Singh S.P., Bhatnagar G., Gurjar D.K., A secure image encryption algorithm based on polar decomposition, International Colloquium on Signal Processing & Its Applications, pp 135–139, (2018).

    Google Scholar 

  3. Singh, S.P. and Bhatnagar, G., A robust image hashing based on discrete wavelet transform, International Conference on Signal and Image Processing Applications (ICSIPA), pp. 440–444, (2017).

    Google Scholar 

  4. Stallings, W., Cryptography and Network Security: Principles and Practice, Prentice-Hall, Upper Saddle River, (1999).

    Google Scholar 

  5. Katzenbeisser, S. and Petitcolas, F. A. P., Information hiding techniques for steganography and digital watermarking, Artech House, Boston, (2002).

    Google Scholar 

  6. Cox, I.J., Miller, M.L. and Bloom, J.A., Digital watermarking, Morgan Kaufmann, San Francisco, (2001).

    Google Scholar 

  7. Arnold, M., Schmucker, M. and Wolthusen, S.D., Techniques and applications of digital watermarking and content protection, Artech House, (2003).

    Google Scholar 

  8. Muharemagic, E. and Furht, B., Multimedia Security: Watermarking Techniques, Comprehensive Report on Information Security, International Engineering Consortium, Chicago, (2004).

    Google Scholar 

  9. Bhatnagar, G. and Raman, B., A new robust reference watermarking scheme based on DWT-SVD, Computer Standards & Interfaces, 31(5), pp. 1002–1013, (2009).

    Google Scholar 

  10. Izquierdo, E., Fragile watermarking for image authentication, Multimedia Security Handbook, CRC Press, Boca Raton, (2005).

    Google Scholar 

  11. Zhu, X., Ho, A.T.S. and Marziliano, P., A new semi-fragile image watermarking with robust tampering restoration using irregular sampling, Signal Processing, Image Communication, 22(5), pp. 515–528, (2007).

    Google Scholar 

  12. Schyndle, R.G.V., Tirkel, A.Z. and Osbrone, C.F., A Digital Watermark, International Conference on Image Processing, 2, pp. 86–90, (1994).

    Article  Google Scholar 

  13. Bender, W., Gruhl, D., Morimoto, N. and Lu, A., Techniques for data hiding, IBM Systems Journal, 35(3-4), pp. 313–336, (1996).

    Article  Google Scholar 

  14. Nikolaidis N. and Pitas I., Copyright protection of images using robust digital signatures, International Conference on Acoustics, Speech, Signal Processing, 4, pp. 2168–2171, (1996).

    Google Scholar 

  15. Voyatzis G. and Pitas I., Applications of toral automorphisms in image watermarking, International Conference on Image Processing, 2, pp. 237–240, (1996).

    Article  Google Scholar 

  16. Pitas I. and Kaskalis, T.H., Applying signatures on digital images, Workshop on Non-linear Signal and Image Processing, pp. 460–463, (1995).

    Google Scholar 

  17. Perez-Freire L. and Perez-Gonzalez F., Spread-spectrum watermarking security, IEEE Transactions on Information Forensics and Security, 4(1), pp. 2–24, (2009).

    Article  Google Scholar 

  18. Bas, P. and Furon, T., A new measure of watermarking security: The effective key length, IEEE Transactions on Information Forensics and Security, 8(8), pp. 1306–1317, pp. (2013).

    Article  Google Scholar 

  19. Chen S. T., Huang H. N., Kung, W. M. and Hsu, C. Y., Optimization-based image watermarking with integrated quantization embedding in the wavelet-domain, Multimedia Tools and Applications, 75(10), pp. 5493–5511, (2016).

    Article  Google Scholar 

  20. Singh S. P. and Bhatnagar G., A novel chaos based robust watermarking framework, International Conference on Computer Vision and Image Processing, 2, pp. 439–447, (2017).

    Article  Google Scholar 

  21. Cox, I.J., Killian, J., Leighton, F.T. and Shamoon, T., Secure spread spectrum watermarking for multimedia, IEEE Transaction on Image Processing, 6(12), pp. 1673–1687, (1997).

    Article  Google Scholar 

  22. Barni, M., Bartiloni, F. and Piva, A., Improved wavelet based watermarking through pixel wise masking, IEEE Transactions on Image Processing, 10, pp. 783–791, (2001).

    Article  Google Scholar 

  23. Huang, J., Shi, Y.Q. and Shi, Y., Embedding image watermarks in dc components, IEEE Transactions on Circuits and Systems for Video Technology, 10(6), pp. 974–979, (2000).

    Article  Google Scholar 

  24. Tao, H., Chongmin, L., Zain, J.M. and Abdalla, A.N., Robust image watermarking theories and techniques: A review, Journal of applied research and technology, 12(1), pp. 122–138, (2014).

    Article  Google Scholar 

  25. Daren, H., Jiufen, L., Jiwu, H. and Hongmei, L., A DWT-based image watermarking algorithm, International Conference on Multimedia and Expo, pp. 313–316, (2001).

    Google Scholar 

  26. Serdean, C.V., Ambroze, M.A., Tomlinson, M. and Wade, J.G., DWT-based high-capacity blind video watermarking, invariant to geometrical attacks, Image and Signal Processing, 150(1), pp. 51–58, (2003).

    Article  Google Scholar 

  27. Wenwu Zhu, Zixiang Xiong, and Ya-Qin Zhang, Multiresolution watermarking for images and video, IEEE Transactions on Circuits and Systems for Video Technology, 9(4), pp. 545–550, (1999).

    Article  Google Scholar 

  28. Liu, R. and Tan, T., An SVD-Based Watermarking Scheme for Protecting Rightful Ownership, IEEE Transactions on Multimedia 4(1), pp. 121–128, (2002).

    Article  Google Scholar 

  29. Ganic, E., Zubair, N. and Eskicioglu, A.M., An Optimal watermarking scheme based on singular value decomposition, International Conference on Communication, Network, and Information Security, pp. 85–90, (2003).

    Google Scholar 

  30. Ganic, E. and Eskicioglu, A.M., Robust embedding of visual watermarks using DWT-SVD, Journal of Electronic Imaging, (2005).

    Google Scholar 

  31. Lin, W. H., Horng, S. J., Kao, T. W., Fan, P., Lee, C. L. and Pan, Y., An efficient watermarking method based on significant difference of wavelet coefficient quantization, IEEE Transactions on Multimedia, 10(5), pp. 746–757, (2008).

    Article  Google Scholar 

  32. Zhao, Y., Campisi, P. and Kundur, D., Dual domain watermarking for authentication and compression of cultural heritage images, IEEE Transactions on Image Processing, 13(3), pp. 430–448, (2004).

    Article  Google Scholar 

  33. Singh S.P., Bhatnagar G., A robust watermarking scheme based on image normalization, International Colloquium on Signal Processing & Its Applications, pp 140–144, (2018).

    Google Scholar 

  34. Singh A.K., Kumar B, Singh S.K., Ghrera SP, Mohan A, Multiple watermarking technique for securing online social network contents using back propagation neural network, Future Generation Computer Systems, (2016).

    Google Scholar 

  35. Kumar C, Singh AK, Kumar P, Singh R, Singh S., SPIHT-based multiple image watermarking in NSCT domain, Concurrency and Computation: Practice and Experience, e4912, (2018).

    Google Scholar 

  36. Singh L, Singh AK, Singh PK, Secure data hiding techniques: a survey, Multimedia Tools and Applications, pp. 1–21, (2018).

    Google Scholar 

  37. Wu, G. and Qiu, Z., A novel watermarking scheme based on stochastic resonance, In: Proceedings of 8th International Conference on Signal Processing, 2, pp. 1–4, (2006).

    Google Scholar 

  38. Sun, S. and Lei, B., On an aperiodic stochastic resonance signal processor and its application in digital watermarking, Signal Processing, 88(8), pp. 2085–2094, (2008).

    Article  Google Scholar 

  39. Chouhan R., Jha R.K., Chaturvedi A., Yamasaki T. and Aizawa K., Robust watermark extraction using SVD-based dynamic stochastic resonance, International Conference on Image Processing, 11, pp. 2745–2748, (2011).

    Google Scholar 

  40. Jha, R. K., Chouhan, R. and Aizawa, K., Dynamic stochastic resonance-based improved logo extraction in discrete cosine transform domain, Computers and Electrical Engineering, 40(6), pp. 1917–1929, (2014).

    Article  Google Scholar 

  41. Jha, R. K., Biswas, P. K. and Shrivastava, S., Logo extraction using dynamic stochastic resonance, Signal, Image and Video Processing, 7(1), pp. 119–128, (2013).

    Article  Google Scholar 

  42. Chouhan, R., Jha, R. K., Chaturvedi, A., Yamasaki, T. and Aizawa, K., Robust watermark extraction using SVD-based dynamic stochastic resonance, International Conference on Image Processing, pp. 2745–2748, (2011).

    Google Scholar 

  43. Singh, S.P., and Bhatnagar, G., A new robust watermarking system in integer DCT domain, Journal of Visual Communication and Image Representation, 53, pp. 86–101, (2018).

    Article  Google Scholar 

  44. Wei, J.J., Chang, C.J., Chou, N.K. and Jan, G.J., ECG data compression using truncated singular value decomposition, IEEE Transactions on Information Technology in Biomedicine, 5(4), pp. 290–299, (2001).

    Article  Google Scholar 

  45. Beltrami, E.: Sulle funzioni bilineari (On Bilinear Functions), Giornale di Matematiche ad Uso degli Studenti Delle Universita 11, pp. 98–106, (1873); An English translation by Boley, D. Tech. Report, Dept. of Computer Science, Univ. of Minnesota, Minneapolis, pp. 90–37, (1990).

    Google Scholar 

  46. Jordan, C., Memoire sur les formes bilineaires (Memoir on Bilinear Forms), Journal de Mathematiques Pures et Appliquees, Deuxieme Serie 19, pp. 35–54, (1874).

    Google Scholar 

  47. Eckart, C. and Young, G., The approximation of one matrix by another of lower rank, Psychometrika 1, pp. 211–218, (1936).

    Article  Google Scholar 

  48. Andrews, H. and Patterson, C., Singular value decompositions and digital image processing, IEEE Transactions on Acoustics, Speech, and Signal Processing, 24(1), pp. 26–53, (1976).

    Article  Google Scholar 

  49. Hou, Z. X., Wang, C. Y. and Yang, A. P., All phase biorthogonal transform and its application in JPEG-like image compression, Signal Processing: Image Communication, 24(10), pp. 791–802, (2009).

    Google Scholar 

  50. Hou, Z. and Yang, X., The all phase DFT filter, In Proc. of the 10th Digital Signal Processing (DSP) Workshop and Signal Processing Education (SPE) Workshop, pp. 221–226, (2002).

    Google Scholar 

  51. Hou, Z. X., Wang, Z. H., and Yang, X., Design and implementation of all phase DFT digital filter, Acta Electronica Sinica, 31(4), pp. 539–543, (2003).

    Google Scholar 

  52. Budagavi, M., Fuldseth, A. and Bjontegaard, G., HEVC transform and quantization, In High Efficiency Video Coding (HEVC), pp. 141–169, (2014).

    Google Scholar 

  53. Ahmed, N., Natarajan, T. and Rao, K.R., Discrete cosine transform, IEEE transactions on Computers, 100(1), pp. 90–93, (1974).

    Article  MathSciNet  Google Scholar 

  54. Zhou, X., Wang, C. and Jiang, B., All phase inverse discrete sine biorthogonal transform and its application in image coding, Journal of Communications, 12(1), (2017).

    Google Scholar 

  55. Benzi, R., Sutera, A. and Vulpiani, A., The mechanism of stochastic resonance, Journal of Physics A: mathematical and general, 14(11), (1981).

    Article  MathSciNet  Google Scholar 

  56. Gammaitoni, L., Hanggi, P., Jung, P. and Marchesoni, F., Stochastic resonance, Reviews of Modern Physics, 70(1), pp. 223–287, (1998).

    Article  Google Scholar 

  57. Leng, Y. G., Wang, T. Y., Guo, Y., Xu, Y. G., and Fan, S. B., Engineering signal processing based on bistable stochastic resonance, Mechanical Systems and Signal Processing, 21(1), pp. 138–150, (2007).

    Article  Google Scholar 

  58. Horsthemke, W., and Lefever, R., Noise-induced transitions in physics, chemistry, and biology, Noise-induced transitions: theory and applications in physics, chemistry, and biology, pp. 164–200, (1984).

    Google Scholar 

  59. Hongler, M. O., de Meneses, Y. L., Beyeler, A., and Jacot, J., The resonant retina: exploiting vibration noise to optimally detect edges in an image, IEEE Transactions on Pattern Analysis and Machine Intelligence, 25(9), pp. 1051–1062, (2003).

    Article  Google Scholar 

  60. Badzey, R. L., and Mohanty, P., Coherent signal amplification in bistable nanomechanical oscillators by stochastic resonance, Nature, pp. 995–998, (2005).

    Article  Google Scholar 

  61. Anishchenko, V.S., Neiman, A.B., Moss, F. and Schimansky-Geier, L., Stochastic Resonance: noise-enhanced order, Physics-Uspekhi, 42(1), pp. 7–36, (1999).

    Article  Google Scholar 

  62. Hannes R., The Fokker-Planck Equation, Berlin, Heidelberg, (1996).

    MATH  Google Scholar 

  63. Gard, T.C., Introduction to Stochastic Differential Equation, Marcel-Dekker, New York, 1998.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gaurav Bhatnagar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Singh, S.P., Bhatnagar, G. (2019). A Novel Watermarking Technique for Multimedia Security. In: Singh, A., Mohan, A. (eds) Handbook of Multimedia Information Security: Techniques and Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-15887-3_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-15887-3_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-15886-6

  • Online ISBN: 978-3-030-15887-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics