Abstract
Recently, due to the increase in popularity of the Internet, the problem of digital data security over the Internet is increasing at a phenomenal rate. Watermarking is used for various notable applications to secure digital data from unauthorized individuals. To achieve this, in this article, we propose a joint encryption then-compression based watermarking technique for digital document security. This technique offers a tool for confidentiality, copyright protection, and strong compression performance of the system. The proposed method involves three major steps as follows: (1) embedding of multiple watermarks through non-sub-sampled contourlet transform, redundant discrete wavelet transform, and singular value decomposition; (2) encryption and compression via SHA-256 and Lempel Ziv Welch (LZW), respectively; and (3) extraction/recovery of multiple watermarks from the possibly distorted cover image. The performance estimations are carried out on various images at different attacks, and the efficiency of the system is determined in terms of peak signal-to-noise ratio (PSNR) and normalized correlation (NC), structural similarity index measure (SSIM), number of changing pixel rate (NPCR), unified averaged changed intensity (UACI), and compression ratio (CR). Furthermore, the comparative analysis of the proposed system with similar schemes indicates its superiority to them.
- Chauhan Digvijay Singh, A. K. Singh, B. Kumar, and J. P. Saini. 2019. Quantization based multiple medical information watermarking for secure e-health. Multimedia Tools and Applications 78, 4 (2019), 3911--3923.Google ScholarDigital Library
- Yao Yuanzhi, Weiming Zhang, Hui Wang, Hang Zhou, and Nenghai Yu. 2019. Content-adaptive reversible visible watermarking in encrypted images. Signal Processing 164 (2019), 386--401.Google ScholarDigital Library
- A. Anand and A. K. Singh. 2020. Joint watermarking-encryption-ECC for patient record security in wavelet domain. IEEE MultiMedia 27 (2020), 66--75. DOI:10.1109/MMUL.2020.2985973Google ScholarDigital Library
- S. P. Mohanty, A. Sengupta, P. Guturu, and E. Kougianos. 2017. Everything you want to know about watermarking: From paper marks to hardware protection. IEEE Consumer Electronics Magazine 6, 3 (2017), 83--91.Google ScholarCross Ref
- A. Anand and A. K. Singh. 2020. Watermarking techniques for medical data authentication: A survey. Multimedia Tools and Applications, DOI:10.1007/s11042-020-08801-0Google ScholarDigital Library
- A. K. Singh, B. Kumar, S. K. Singh, M. Dave, V. K Singh, P. Kumar, S. P. Ghrera, P. K Gupta, and A. Mohan. Guest editorial: Robust and secure data hiding techniques for telemedicine applications. Multimedia Tools and Applications 76, 5 (2017), 7563--7573.Google Scholar
- S. Thakur, A. K. Singh, S. P. GhreraM Dave. 2018. Watermarking techniques and its applications in tele-health: A technical survey. In Cryptographic and Information Security Approaches for Images and Videos, S. Ramakrishnan (ed.) CRC Press, 467--508.Google Scholar
- R. Srivastava, B. Kumar, A. K. Singh, and A. Mohan. 2018. Computationally efficient joint imperceptible image watermarking and JPEG compression: A green computing approach. Multimedia Tools and Applications 77, 13 (2018), 16447--16459Google ScholarDigital Library
- S. Priya, R. Varatharajan, G. Manogaran, R. Sundarasekar, and P. M. Kumar. 2018. Paillierhomomorphic cryptosystem with poker shuffling transformation based water marking method for the secured transmission of digital medical images. Personal and Ubiquitous Computing 1--11, 2018. DOI:https://doi.org/10.1007/s00779-018-1131-8Google Scholar
- C. Lakshmi, K. Thenmozhi, J. B. Rayappan, and R. Amirtharajan. 2018. Encryption and watermark-treated medical image against hacking disease—An immune convention in spatial and frequency domains. Computer Methods and Programs in Biomedicine 159, 11--21, 2018.Google ScholarCross Ref
- Xun Yijing, Zhijiang Li, XiaoluZhong, Sheng Li, Jiawang Su, and Ke Zhang. 2019. Dual anti-counterfeiting of QR code based on information encryption and digital watermarking. In Advances in Graphic Communication, Printing and Packaging 187--196. Singapore, 2019.Google Scholar
- Mohamed A. Bhnassy, Esam A. A. Hagras, El-Sayed A. El-Badawy, Mohamed A. Mokhtar, and Moustafa H. Aly. 2019. Image encryption and watermarking combined dynamic chaotic hopping pattern with double random phase encoding DRPE. Optical and Quantum Electronics 51, 7 (2019), 246.Google ScholarCross Ref
- Rhayma Hanen, Achraf Makhloufi, and Ahmed ben Hmida. 2018. Robust watermarking scheme integrated into JPWL based on turbo-trellis-coded quantization. In 2018 4th International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), 1--6. IEEE, 2018.Google Scholar
- Huynh Ngoc-Tu, K. Bharanitharan, Chin-Chen Chang, and Yanjun Liu. 2018. Minima-maxima preserving data hiding algorithm for absolute moment block truncation coding compressed images. Multimedia Tools and Applications 77, 5 (2018), 5767--5783.Google ScholarDigital Library
- Sun Lin, Jiucheng Xu, Shangwang Liu, Shiguang Zhang, Yuan Li, and Chang'an Shen. 2018. A robust image watermarking scheme using arnold transform and BP neural network. Neural Computing and Applications 30, 8 (2018), 2425--2440.Google ScholarDigital Library
- Singh Priyanka, Balasubramanian Raman, and ParthaPratim Roy. 2017. A multimodal biometric watermarking system for digital images in redundant discrete wavelet transform. Multimedia Tools and Applications 76, 3 (2017), 3871--3897.Google ScholarDigital Library
- Aparna Puvvadi, and PolurieVenkata Vijay Kishore. 2018. Biometric-based efficient medical image watermarking in E-healthcare application. IET Image Processing 13, 3 (2018), 421--428.Google Scholar
- S. Singh, V. S. Rathore, R. Singh and M. K. Singh. 2017. Hybrid semi-blind image watermarking in redundant wavelet domain. Multimedia Tools and Applications 76, 18 (2017), 19113--37.Google ScholarDigital Library
- Chandel Sonali, Wenxuan Cao, Zijing Sun, Jiayi Yang, Bailu Zhang, and Tian-Yi Ni. 2019. A multi-dimensional adversary analysis of RSA and ECC in blockchain encryption. In Future of Information and Communication Conference 988--1003. Springer, Cham, 2019.Google Scholar
- Omari Mohammed and SouleymaneOuledJaafri. 2019. Application of image compression to multiple-shot pictures using similarity norms with three level blurring. CMC-Computers Materials 8 Continua 59, 3 (2019), 753--775.Google Scholar
- A. Anand, A. K. Singh, Z. Lv, and G. Bhatnagar. 2020. Compression-then-encryption based secure watermarking technique for smart healthcare system. IEEE Multimedia 27, 4 (2020), 133--143. DOI:10.1109/MMUL.2020.2993269Google ScholarDigital Library
- Kumar Manoj and Ankita Vaish. 2017. An efficient encryption-then-compression technique for encrypted images using SVD. Digital Signal Processing 60 (2017), 81--89.Google ScholarDigital Library
- Singh Siddharth, Vivek Singh Rathore, and Rajiv Singh. 2017. Hybrid NSCT domain multiple watermarking for medical images. Multimedia Tools and Applications 76, 3 (2017), 3557--3575.Google ScholarDigital Library
- Haddad Sahar, Gouenou Coatrieux, and Michel Cozic. 2018. A new joint watermarking-encryption-JPEG-LS compression method for a priori 8 a posteriori image protection. In 2018 25th IEEE International Conference on Image Processing (ICIP), 1688--1692. IEEE, 2018.Google Scholar
- Liu Hong, Di Xiao, Rui Zhang, Yushu Zhang, and SenBai. 2016. Robust and hierarchical watermarking of encrypted images based on compressive sensing. Signal Processing: Image Communication 45, (2016), 41--51.Google Scholar
- Mary S. J. Jereesha, C. Seldev Christopher, and S. Sebastin Antony Joe. 2016. Novel scheme for compressed image authentication using LSB watermarking and EMRC6 encryption. Circuits and Systems 7, 08 (2016), 1722.Google ScholarCross Ref
- Xiao Di, Yanting Chang, Tao Xiang, and SenBai. 2017. A watermarking algorithm in encrypted image based on compressive sensing with high quality image reconstruction and watermark performance. Multimedia Tools and Applications 76, 7 (2017), 9265--9296.Google ScholarDigital Library
- S. Thakur, A. K. Singh, S. P. Ghrera, and A. Mohan. 2018. Chaotic based secure watermarking approach for medical images. Multimedia Tools and Applications 79 (2018), 1--14.Google Scholar
- A. K. Singh. 2017. Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimedia Tools and Applications 76, 6 (2017), 8881--900.Google ScholarDigital Library
- A. Zear, A. K. Singh, and P. Kumar. 2018. A proposed secure multiple watermarking technique based on DWT, DCT, and SVD for application in medicine. Multimedia Tools and Applications 77, 4 (2018), 4863--82.Google ScholarCross Ref
- S. Thakur, A. K. Singh, and S. P. Ghrera. 2018. NSCT domain-based secure multiple-watermarking technique through lightweight encryption for medical images. Concurrency and Computation: Practice and Experience (2018): e5108.Google Scholar
- S. Singh, V. S. Rathore, R. Singh, and M. K. Singh. 2017. Hybrid semi-blind image watermarking in redundant wavelet domain. Multimedia Tools and Applications 76, 18 (2017), 19113--37.Google ScholarDigital Library
- Reem A. Alotaibi and Lamiaa A. Elrefaei. 2019. Text-image watermarking based on integer wavelet transform (IWT) and discrete cosine transform (DCT). Applied Computing and Informatics 15, 2 (2019), 191--202.Google ScholarCross Ref
- Li Jingbing and Fan Wu. 2013. Robust watermarking for text images based on Arnold scrambling and DWT-DFT. In 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC), 1182--1186. IEEE, 2013.Google ScholarCross Ref
- Wu Fan and Jingbing Li. 2015. Robust watermarking for text images based on Arnold scrambling and DWT-DCT. In 2015 International Conference on Mechatronics, Electronic, Industrial and Control Engineering (MEIC-15). Atlantis Press, 2015.Google Scholar
- Laouamer Lamri and Omar Tayan. 2015. A semi-blind robust DCT watermarking approach for sensitive text images. Arabian Journal for Science and Engineering 40, 4 (2015), 1097--1109.Google ScholarCross Ref
- Laouamer Lamri and Omar Tayan. 2013. An enhanced SVD technique for authentication and protection of text-images using a case study on digital quran content with sensitivity constraints. Life Science Journal 10, 2 (2013), 2591--2597.Google Scholar
- Gao Hang and TiegangGao. 2019. Double verifiable image encryption based on chaos and reversible watermarking algorithm. Multimedia Tools and Applications 78, 6 (2019), 7267--7288.Google ScholarDigital Library
- Chen Jun-xin, Zhi-liang Zhu, Chong Fu, Li-bo Zhang, and Yushu Zhang. 2015. An efficient image encryption scheme using lookup table-based confusion and diffusion. Nonlinear Dynamics 81, 3 (2015), 1151--1166.Google ScholarCross Ref
- Fridrich Jiri. 1998. Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos 8, 06 (1998), 1259--1284.Google ScholarCross Ref
- Gao Tiegang and Zengqiang Chen. 2008. A new image encryption algorithm based on hyper-chaos. Physics Letters A 372, 4 (2008), 394--400.Google ScholarCross Ref
- Hu Ting, Ye Liu, Li-Hua Gong, Shao-Feng Guo, and Hong-Mei Yuan. 2017. Chaotic image cryptosystem using DNA deletion and DNA insertion. Signal Processing 134 (2017), 234--243.Google ScholarDigital Library
- Liu Quan, Pei-yue Li, Ming-chao Zhang, Yong-xin Sui, and Huai-jiang Yang. 2015. A novel image encryption algorithm based on chaos maps with Markov properties. Communications in Nonlinear Science and Numerical Simulation 20, 2 (2015), 506--515.Google ScholarCross Ref
- Wang Xingyuan and Hui-li Zhang. 2015. A color image encryption with heterogeneous bit-permutation and correlated chaos. Optics Communications 342 (2015), 51--60.Google ScholarCross Ref
- Wang Xingyuan and Hui-li Zhang. 2016. A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems. Nonlinear Dynamics 83, 1–2 (2016), 333--346.Google Scholar
- Xu Lu, Zhi Li, Jian Li, and Wei Hua. 2016. A novel bit-level image encryption algorithm based on chaotic maps. Optics and Lasers in Engineering 78 (2016), 17--25.Google ScholarCross Ref
- S. Arunkumar, V. Subramaniyaswamy, V. Vijayakumar, Naveen Chilamkurti, and R. Logesh. 2019. SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images. Measurement 139 (2019), 426--437.Google ScholarCross Ref
- Chang Chin-Chen, Yi-Pei Hsieh, and Chia-Hsuan Lin. 2008. Sharing secrets in stego images with authentication. Pattern Recognition 41, 10 (2008), 3130--3137.Google ScholarDigital Library
- Wu Chia-Chun, Shang-Juh Kao, and Min-Shiang Hwang. 2011. A high quality image sharing with steganography and adaptive authentication scheme. Journal of Systems and Software 84, 12 (2011), 2196--2207.Google ScholarDigital Library
- Kanan Hamidreza Rashidy and Bahram Nazeri. 2014. A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Systems with Applications 41, 14 (2014), 6123--6130.Google ScholarCross Ref
- Bamal Roopam and Singara Singh Kasana. 2019. Dual hybrid medical watermarking using Walsh-Slantlet transform. Multimedia Tools and Applications 78 (2019), 17899--17927.Google ScholarDigital Library
- Adnan M. Alattar. 2004. Reversible watermark using the difference expansion of a generalized integer transform. IEEE Transactions on Image Processing 13, 8 (2004), 1147--1156.Google ScholarDigital Library
- Frank Y. Shih and Xin Zhong. 2016. High-capacity multiple regions of interest watermarking for medical images. Information Sciences 367 (2016), 648--659.Google ScholarDigital Library
- Frank Y. Shih and Yi-Ta Wu. 2005. Robust watermarking and compression for medical images based on genetic algorithms. Information Sciences 175, 3 (2005), 200--216.Google ScholarDigital Library
- Diljith M. Thodi and Jeffrey J. Rodríguez. 2007. Expansion embedding techniques for reversible watermarking. IEEE Transactions on Image Processing 16, 3 (2007), 721--730.Google ScholarDigital Library
- Tian Jun. 2003. Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology 13, 8 (2003), 890--896.Google ScholarDigital Library
- Wakatani Akiyoshi. 2002. Digital watermarking for ROI medical images by using compressed signature image. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences. IEEE, 2043--2048.Google Scholar
- Wang Zhi-Hui, Chin-Feng Lee, and Ching-Yun Chang. 2013. Histogram-shifting-imitated reversible data hiding. Journal of Systems and Software 86, 2 (2013), 315--323.Google ScholarDigital Library
- Zain Jasni Mohamad, and Malcolm Clarke. 2011. Reversible region of non-interest (RONI) watermarking for authentication of DICOM images. Arxiv Preprint Arxiv:1101.1603 (2011).Google Scholar
- Zhao Zhenfei, Hao Luo, Zhe-Ming Lu, and Jeng-Shyang Pan. 2011. Reversible data hiding based on multilevel histogram modification and sequential recovery. AEU-International Journal of Electronics and Communications 65, 10 (2011), 814--826.Google ScholarCross Ref
- Bamal Roopam and Singara Singh Kasana. 2018. Slantlet based hybrid watermarking technique for medical images. Multimedia Tools and Applications 77, 10 (2018), 12493--12518.Google ScholarDigital Library
- Amiri Mehran Deljavan, Majid Meghdadi, and Ali Amiri. 2019. HVS-based scalable image watermarking. Multimedia Tools and Applications 78, 6 (2019), 7097--7124.Google ScholarDigital Library
- Ferdinando Di Martino and Salvatore Sessa. 2019. Fragile watermarking tamper detection via bilinear fuzzy relation equations. Journal of Ambient Intelligence and Humanized Computing 10, 5 (2019), 2041--2061.Google ScholarCross Ref
- Ferdinando Di Martino and Salvatore Sessa. 2012. Fragile watermarking tamper detection with images compressed by fuzzy transform. Information Sciences 195 (2012), 62--90.Google ScholarDigital Library
- Chen Wei-Che and Ming-Shi Wang. 2009. A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Systems with Applications 36, 2 (2009), 1300--1307.Google ScholarDigital Library
- Y-F. Chang and W-L. Tai. 2013. A block-based watermarking scheme for image tamper detection and self-recovery. Opto-Electronics Review 21, 2 (2013), 182--190.Google ScholarCross Ref
- Singh Durgesh and Sanjay K. Singh. 2017. DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimedia Tools and Applications 76, 1 (2017), 953--977.Google ScholarDigital Library
- Steve Walton. 1995. Information authentication for a slippery new age. Dr. Dobbs Journal (1995), 18--26.Google Scholar
- Ansari Irshad Ahmad, Millie Pant, and Chang WookAhn. 2016. SVD based fragile watermarking scheme for tamper localization and self-recovery. International Journal of Machine Learning and Cybernetics 7, 6 (2016), 1225--1239.Google ScholarCross Ref
- Gul Ertugrul and Serkan Ozturk. 2019. A novel hash function based fragile watermarking method for image integrity. Multimedia Tools and Applications 78 (2019), 17701--17718.Google ScholarDigital Library
- K. Swaraja, K. Meenakshi, and PadmavathiKora. 2020. An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine. Biomedical Signal Processing and Control 55 (2020), 101665.Google ScholarCross Ref
- Shabir A. Parah, Javaid A. Sheikh, Farhana Ahad, Nazir A. Loan, and Ghulam Mohiuddin Bhat. 2017. Information hiding in medical images: A robust medical image watermarking system for E-healthcare. Multimedia Tools and Applications 76, 8 (2017), 10599--10633.Google ScholarDigital Library
- Run Ray-Shine, Shi-Jinn Horng, Jui-Lin Lai, Tzong-Wang Kao, and Rong-Jian Chen. 2012. An improved SVD-based watermarking technique for copyright protection. Expert Systems with Applications 39, 1 (2012), 673--689.Google ScholarDigital Library
- Talat Naheed, Imran Usman, Tariq M. Khan, Amir H. Dar, and Muhammad Farhan Shafique. 2014. Intelligent reversible watermarking technique in medical images using GA and PSO. Optik-International Journal for Light and Electron Optics 125, 11 (2014), 2515--2525.Google ScholarCross Ref
- Thanki Rohit, Ashish Kothari, and DevenTrivedi. 2019. Hybrid and blind watermarking scheme in DCuT–RDWT domain. Journal of Information Security and Applications 46 (2019), 231--249.Google ScholarDigital Library
- Zhang Yifeng, Yingying Li, and Yibo Sun. 2019. Digital watermarking based on joint DWT–DCT and OMP reconstruction. Circuits, Systems, and Signal Processing 38 (2019), 5135--5148.Google ScholarDigital Library
- A. Anand and A. K. Singh. 2020. An improved DWT-SVD domain watermarking for medical information security. Computer Communications 152, 72--80, 2020.Google ScholarCross Ref
- Public domain test images. Retrieved from https://homepages.cae.wisc.edu/∼ece533/images/.Google Scholar
- MedPix searchable online database. Retrieved from https://medpix.nlm.nih.gov/.Google Scholar
- Y. Wu, J. P. Noonan, S. Agaian. 2011. NPCR and UACI Randomness Tests for Image Encryption”, Cyber Journals: Multidisciplinary Journals in Science and Technology. Journal of Selected Areas in Telecommunications (2011), 31--38.Google Scholar
Index Terms
- Joint Encryption and Compression-Based Watermarking Technique for Security of Digital Documents
Recommendations
Selective encryption and optimization based watermarking for robust transmission of landslide images
Highlights- We develop a robust and secure landslide image watermarking algorithm by using transform-domain scheme.
AbstractIn this paper, a secure watermarking algorithm is proposed to efficiently enhance invisibility and robustness simultaneously. First, the combination of transform domain scheme is used to identify the appropriate coefficient for data ...
Graphical abstractDisplay Omitted
Computationally efficient joint imperceptible image watermarking and JPEG compression: a green computing approach
This paper presents a computationally efficient joint imperceptible image watermarking and joint photographic experts group (JPEG) compression scheme. In recent times, the transmission and storage of digital documents/information over the unsecured ...
Hybrid technique for robust and imperceptible multiple watermarking using medical images
This paper presents a secure multiple watermarking method based on discrete wavelet transform (DWT), discrete cosine transforms (DCT) and singular value decomposition (SVD). For identity authentication purpose, the proposed method uses medical image as ...
Comments