Original watermark image.

Original watermark image.

Source publication
Article
Full-text available
In this paper, an efficient, highly imperceptible, robust, and secure digital video watermarking technique for content authentication based on Hilbert transform in the Integer Wavelet Transform (IWT) domain has been introduced. The Hilbert coefficients of gray watermark image are embedded into the cover video frames Hilbert coefficients on the 2-le...

Context in source publication

Context 1
... frame dropping is the dropping of intermediate frames on the received watermarked video and its corresponding watermark extraction is shown in Fig. 16 (akiyo, container, hall_monitor, mother_daughter and ...

Similar publications

Preprint
Full-text available
With increasing digital content over the internet it is very important to secure the digital contents in such a way that the identity and integrity of data is preserved in some way. The healthcare data is also a digital content which is important and this paper presents a methodology for copyright protection and authorship. In order to achieve a ba...
Article
Full-text available
Perceptibility and robustness are two incongruous requirements demanded by digital image watermarking for digital right management and other applications. A realistic way to concurrently satisfy the two contradictory requirements is to use robust watermark algorithm. The developed algorithm uses DTCWT and PCA techniques to embed watermark signal in...
Article
Full-text available
This manuscript presents a new scheme for binary watermark extraction using the combined application of noise-induced resonance (NIR) and support vector machine (SVM). The principal component analysis (PCA) is incorporated to minimize the dimension of the feature set obtained from the attacked watermarked image. The scheme utilizes lifting wavelet...
Article
Full-text available
The rapid growth of technology has brought a security threat to digital content over the internet, and therefore, a good watermarking scheme is much needed in the present scenario for image authentication and copyright protection. In this paper, blind color image watermarking using deep neural network (DNN) and statistical features is proposed for...
Article
Full-text available
With aiming to design a novel image watermarking technique, this paper presents a novel method of image watermarking using lifting wavelet transform, discrete wavelet transform, and one-dimensional linear discriminate analysis. In this blind watermarking technique, statistical features of the watermarked image have been incorporated for preparing t...

Citations

... In the literature, various transform domain techniques are proposed, namely Discrete Fourier Transform (DFT), Discrete Cosine Transforms (DCT), Discrete Wavelet Transform [16], Integer Wavelet Transform (IWT) [17], Stationary Wavelet Transform (SWT) [18] and Dual-Tree Complex Wavelet Transforms [19], Discrete Contourlet Transforms [4], Curvelet Transform [20], [21]. Mathematical tool transform are namely Singular Value Decomposition (SVD) [22], QR Decomposition [18], and hybrid of these transform such as, DWT-SVD [23], DCT-DWT-SVD [24], Hilbert-IWT [25], DWT-BAM [26]. These transform domain techniques are able to process grayscale and colour images with qualities like imperceptibility, resilience, and capacity. ...
Article
Full-text available
In the multimedia arena, image tampering is an uncontrollable process that necessitates content authentication and tamper detection in a variety of applications. One method that is recommended for meeting all of those needs in the multimedia arena is watermarking. Mobile cameras may now be used to effortlessly take high dynamic range (HDR) photographs, which increase the image’s visual quality and realism. Watermark visibility and recognition algorithms built for standard images may be affected by this introduction of perceptual variations in the image relative to the source. In order to overcome those shortcomings, we introduced a novel, an optimal semi-blind watermarking technique that works for both colour and HDR compressed JPEG images. A unique quaternion dual-tree complex wavelet transform technique is used to extract the highly informative features from the original image. The optimal embedding region in the low frequency sub-band is determined using the maximal entropy random walk (MERW) algorithm. In order to detect tampering and to localize the tampered region a watermark is generated using the swin transformer model and watermark embedding is carried out in the selected optimal blocks. A dual scrambled image is encoded in the effective principal component coefficient values of the singular value decomposition (SVD) Transform in order to authenticate the watermarked image prior to watermark extraction. The semi-blind extraction process is intended to confirm the content’s authenticity by comparing the recovered scrambled watermark with the regenerated original watermark. The process of extraction is merely the opposite of the process of embedding. When compared to previous research, the experimental results demonstrated good imperceptibility with an average PSNR of 65 dB and SSIM of 0.999 and strong robustness against attacks.
... Dai et al., 2019), and Discrete Wavelet Transform (Agilandeeswari & Ganesan, 2016b). The wavelet transforms are of various forms namely: Lifting Wavelet Transform (Vaidya, 2023), Integer Wavelet Transform (Agilandeeswari & Ganesan, 2016c), Complex wavelet transform (Mali & Agilandeeswari, 2023), Haar wavelet transform, Orthogonal, Biorthogonal, Slantlet transform (Mohammed & Khoo, 2012;Thanki & Kothari, 2020), etc. Besides traditional techniques, hybrid models are highly emerging, which attain enhanced results. ...
... A randomly generated sequence of bits or any image or any information revealing the owner's identity, like owner's name or a company logo, can be used as a watermark to hide within the host data [2,5,7]. The researchers have been striving for ameliorating the performance of digital watermarking algorithms in an attempt to preserve the digital content and the rights of its owner, even after its dissemination [3,4]. Apart from copyright protection, Digital Watermarking also suits to other applications such as fingerprinting, tamper detection, protection of data from being copied and so on [29]. ...
Article
Full-text available
The exact retrieval of both i.e., watermark and host data using reversible watermarking makes it more suitable for applications like medical, military etc. The techniques which are considered most efficient and are being most widely used to implement it (reversible watermarking) are Prediction Error Expansion and Histogram Shifting as they offer higher embedding capacity with lesser distortion. The methodology proposed in this work is a hybrid one that utilizes the best of both. The algorithm starts with splitting the image into two regions and further processing is done on them one by one thereby covering each pixel for embedding thus amounting to enhanced capacity. The proposed work exploits the histogram of prediction errors instead of difference of adjacent pixels as it is more sharply distributed. This leads to lesser distortion in watermarked image. In this paper, the sorting of prediction errors is done in accordance with the calculated variance values of their prediction context followed by pairwise payload embedding. The results have substantiated the fact that for the smaller variance, prediction errors are also small. The proposed methodology is tested against the standard test images and real life applications such as medical, biomedical, aerial, military and colour images of Kodak image dataset. The experimental results demonstrate the superiority of the proposed work over the existing ones in terms of embedding capacity and distortion.
... In [6], a new Hilbert transform is used to embed the grayscale watermark image in video frames 2-level Integer Wavelet Transform. An authentication bit is generated from the digital signature to verify the integrity. ...
Article
Full-text available
In recent years, internet technology has grown in advance, and multimedia data-sharing growth rates have skyrocketed. As a result, protecting multimedia data in digital networks has become a significant problem. Multimedia data such as audio, text, video, and image are highly used as a data-sharing communication system which demands security, particularly in image and video. Digital watermarking is the one solution that has gained widespread recognition over the past two decades for data embedding in image and video, a key tactic in multimedia tamper detection and recovery. The review tells about the growth rate and data breaches on multimedia data across different applications, which raises the issue of multimedia security. Notably, social network platforms are highly targeted due to their rapid growth, which has created opportunities for data breaches and multimedia manipulation. Here, the forensic field comes into play, where some data-hiding strategies are used to look for evidence of tampering. Even though watermarking techniques can attain security in tamper detection, they face some issues and challenges across various applications. This motivated us to analyze the existing work carried out by data hiding watermarking techniques in the field of multimedia tamper detection in detail and the gap analyzed. Overall, dataset availability, watermarking performance quality metrics, and several image-processing attacks are all explicitly mentioned. This review paper discusses a comprehensive study of the existing system in the field of tamper detection (both in Image and Video) in detail. Also, the development of existing watermarking techniques, issues, and challenges are covered in detail in this paper.
... Digital watermarking techniques are generally processed on two domains [5]: Pixel-Based domain and Frequency-Based domain. To transform the image in the frequency domain, techniques such as Discrete Fourier Transform (DFT) [6], Quaternion Curvelet Transform (QCT) [7], Discrete Cosine Transform (DCT) [8], Hilbert Transform [9], Wavelet Transform [Discrete wavelet (DWT) [10], Stationary Wavelet (SWT) [11], Integer Wavelet Transform (IWT) [12], Complex Wavelet Transform (CWT) [13]], etc. The hybrid embedding techniques are also been attracted by the researchers to achieve authentication [14]. ...
Article
Full-text available
Nowadays, protecting multimedia data is a significant challenge because of the advancement of technology and software. The embedding process heavily relies on watermarking to accomplish multimedia security in terms of content authentication, proof of ownership, and tamper detection. Our objective is to develop an invariant watermark that can survive different signal-processing attacks. We presented a unique hybrid technique (DWT-QR-SWT) and multi-image invariant features generated as a watermark using a Transformer encoder-decoder model. The encoded image features are subsampled using PCA in order to decrease the dimensionality of the watermark image. The first two images are used as watermark1 and the next two images as watermark2 to produce multi-watermark feature maps. To embed the watermark, a hybrid DWT-QR decomposition has been applied to the original image1. On the primary watermarked image, two Level Stationary Wavelet Transform (SWT) were applied to embed the secondary watermark2. At the extraction phase, the tampered image is recovered by passing the extracted watermark image as input to the transformer decoder. A multi-image watermark increases data embedding capabilities and also achieves two-level content authentication, tamper detection, localization, and recovery. With a PSNR of 59.05 dB, the testing result demonstrates great resilience and improved imperceptibility.
... Embedding the image at the pixel level is known to be a pixel-based domain or spatial domain whereas embedding in spectral coefficients using various frequency methods is known to be a frequency or Transform domain. The spatial coefficient is transformed into a spectral coefficient using a few methods: Discrete Fourier transform (DFT) [5], Discrete Cosine Transform (DCT) [6] and Discrete Wavelet Transform [7,8,9], Quaternion Curvelet transform [10], Hilbert Transform [11] [12], Integer Wavelet Transform [13,12] and Contourlet [14,15,16]. Matrix decomposition methods are Singular Value Decomposition (SVD) [17,18], Schur Decomposition [19]. ...
Article
Full-text available
Multimedia manipulation has increased which demand for security across various applications. Majorly image-oriented security issues such as image authentication, proof of ownership, and copyright protection are highly increased. To authenticate and detect the tamped region and to recover the tampered area vision transformer-based hybrid watermarking model is proposed. We proposed a novel model to achieve image authentication, tamper detection, and localization followed by image recovery. In the proposed model, invariant attention-based watermark feature maps are generated using a Vision transformer. We have generated three different watermarks: first using the SVD eigenvalue generated as an authentication watermark, secondly to detect tampered region average 6MSB of each 2*2 block generated by performing the Schur decomposition method on the biometric image, and to locate and recover the image Vision feature maps are generated and average 6MSB of each block is embedded as the tamper detection watermark. Normally the generated watermark is embedded either using an embedding factor or using a suitable embedding location. In the proposed model, watermark embedding is performed by finding the optimal embedding region using high entropy block region. On the original image, curvelet transform is performed followed by invariant integer wavelet transform. The first authentication eigenvalue is embedded on the LH band singular value diagonal matrix obtained by the SVD model. On the LL band, 2*2 blocks Schur decomposition is performed to embed the 6MSB in the 2LSB bit of upper triangular coefficient values. At last, vision feature maps are embedded in the curvelet approximate coefficient high entropy region and inverse curvelet performed, producing a watermarked image.
... Results show the utility and resilience of the proposed algorithm. In [17], a secure, robust, and imperceptible digital video watermarking method based on Hilbert transform and integer wavelet transform is proposed in the field of authentication. The Hilbert coefficients of the watermark are inserted onto the cover video frames, then Hilbert coefficients of the selected block are decomposed on the two-level IWT using PCA to sub-bands. ...
Article
Full-text available
With the growing use of the digital world and its associated challenges, the use of digital watermarking is a popular and appropriate way of protecting digital content against illegal distribution. Recently, the rapid development of Biology Information Technology and the use of biological systems have attracted the particular attention of computer security experts. For example, the linking of watermarking with chaotic mapping and DNA sequences is a relatively new field that is the subject of research these days. The purpose of this paper is to provide a new algorithm for digital video watermarking based on a combination of chaotic systems, Cellular Automata (CA), and DNA sequences. The proposed method in this paper is a practical application for copyright protection of digital videos with watermarking. The above-mentioned watermarking scheme is blind and consists of methods for Contourlet Transform (CT) and Singular Value Decomposition (SVD) with the condition of insertion into low-frequency sub-bands. Here, one-dimensional chaotic automata based on DNA with the ability of parallel implementation of various CA rules is designed. Finally, the proposed method is evaluated using common statistical criteria such as PSNR, NCC, and BER, and the results show the high resistance of the proposed algorithm to various types of attacks.
... Mohammadi has hidden the logo, which it encrypts with the chaotic map, to the DWT coefficients of the selected frames in the video [18]. Agilandeeswari and Ganesan have hidden the Hilbert coefficients of the gray logo into video frames [19]. Chen and Zhao made contourlet transform (CT) based data hiding on some raw video frames [20]. ...
... On the other hand the bit error rate (BER) value used to control the amount of error between embedded and extracted messages. BER is calculated as in Eq. (19). ⨁ represents exclusive-or logical operation. ...
Article
In recent years, the importance of information security has increased due to the growth in digital communication and steganography has come to the fore for secure communication. Steganography ensures that the secret data to be sent in a multimedia file such as text, picture or video embedded in a way that cannot be understood by third parties. Although image steganography has become popular recently, video steganography has also been widely used and preferred recently, due to its high data hiding capacity and robustness. This paper proposes a new data hiding algorithm in video steganography for effective frame selection, high embedding capacity and good visual quality. The proposed algorithm has two phases: frame selection and data hiding. In the first phase, the frame selection offers a rapid and impressive new method based on enhanced Vigenere. The most significant advantage of this algorithm is to achieve the same level of security without using complex operations such as chaotic systems used in existing methods. In the second phase, we have used adaptive LSB332 for data hiding, which embeds video files with high capacity, high PSNR and SSIM. When the experimental results evaluated, it was observed that the proposed method is over 65 dB PSNR value and 0.99 SSIM value at 20 kbits data capacity. It was also achieved approximately 55 dB and 50 dB PSNR value at 200 kbits and 500 kbits data capacities, respectively, where is no appreciable loss in the SSIM value. Compared to LSB332 based methods, the capacity increased by approximately 12% at same visual qualities. Furthermore, the visual quality of the proposed method is much better than other video data hiding methods, while the capacity increases by 19%.
... In order to demonstrate the performance of the system over the other existing techniques, the results of two other schemes are compared with the proposed algorithm. The first algorithm is a DWT based video watermarking [24] while the second algorithm is integer wavelet transform based [25]. The chosen attacks for benchmarking these three schemes are median filter and noise addition as depicted in Table 3. ...
... The achieved values of NCC for [24,25] are between 0.50 and 0.97, respectively whereas the comparable value of NCC for the proposed technique is more than 0.89. The achieved values show that the proposed technique displays more robustness against the mentioned attacks as the achieved NCC exceed the acceptable limit 0.75 [23]. ...
Article
Full-text available
Unauthorized redistribution and illegal copying of digital contents are serious issues which have affected numerous types of digital contents such as digital video. One of the methods which have been suggested to support copyright protection is to hide digital watermark within the digital video. This paper introduces a new video watermarking system which based on a combination of Arnold transform and integer wavelet transforms (IWT). IWT is employed to decompose the cover video frames whereby Arnold transform is used to scramble the watermark which is a grey scale image. Scrambling the watermark before the concealment makes the transmission more secure by disordering the information. The system performance was benchmarked against related video watermarking schemes, in which the evaluation processes consist of testing against several video operations and attacks. Consequently, the scheme has been demonstrated to be perfectly robust.
... In Fig. 7 is a test result of a digital signature, about the validity and security system of the digital signature, so that the results of this trial can be used as an example. In this study also looked at previous research to research the results of research and comparison with previous research that discusses research [22][23][24]. ...
Article
Full-text available
The increasing number of smart cities in Indonesia affected public services. Important letters such as certificates and permit letters began its development into digital documents. However, to be approved as a valid document, an authentication mechanism needs to be inserted in it. This authentication is a mechanism to replace the written signature, also known as a digital signature which used to guarantee the authenticity of a digital document when it is used for various things. This study aimed to provide an implementation model of digital signature p12 developed by the Indonesian Ministry of Communications and Information Technology as well as providing an overview of e-document systems. In addition, the validity of the e-document is authenticated by the digital signature. This study used a quantitative approach using descriptive methods, namely conducting a comparative study to compare the phenomena found and make classifications that sourced from a standard. Experimental results showed that the p12 digital.