Dual watermarking framework for privacy protection and content authentication of multimedia

Abstract In the current multimedia networked infrastructure, privacy breaches due to cyber-attacks result in huge economic losses. Despite these threats there is ever increasing demand to share data over various insecure networks for accomplishment of numerous tasks. In such a scenario there is a greater need to develop new algorithms for strengthening the existing cybersecurity frameworks, ensure security, privacy, copyright protection and authentication of data. In this paper a new technique for copyright protection, data security and content authentication of multimedia images is presented. The copyright protection of the media is taken care of by embedding a robust watermark using an efficient inter-block coefficient differencing algorithm and is proposed as Scheme I. Scheme II has been utilized to ensure both copyright protection, and content authentication. The authentication of the content has been ensured by embedding a fragile watermark in spatial domain while as copyright protection has been taken care of utilizing a robust watermark. In order to thwart an adversary and ensure that it has no access to actual embedded data, we make use of a novel encryption algorithm in conjunction with Arnold transform to encrypt data prior to its embedding. The experimental results reveal that the proposed framework offers high degree of robustness against single/dual/triple attacks; with Normalized Correlation (NCC), more than or equal to 0.95. Besides, the fragile watermark embedding makes the system capable of tamper detection and localization with average BER more than 45% for all signal processing/geometric attacks. The average PSNR achieved for both schemes is greater than 41 dB. A comparison of the proposed framework with various state-of-the-art techniques demonstrate its effectiveness and superiority.

[1]  Sung Wook Baik,et al.  A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image , 2015, Multimedia Tools and Applications.

[2]  Liang Bin Zheng,et al.  A DWT-DCT based blind watermarking algorithm for copyright protection , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[3]  Khan Muhammad,et al.  A reversible and secure patient information hiding system for IoT driven e-health , 2019, Int. J. Inf. Manag..

[4]  M. Shamim Hossain,et al.  New Zero-Watermarking Algorithm Using Hurst Exponent for Protection of Privacy in Telemedicine , 2018, IEEE Access.

[5]  Yan Lin,et al.  A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression , 2003, IEEE Trans. Circuits Syst. Video Technol..

[6]  Javaid A. Sheikh,et al.  Electronic Health Record hiding in Images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication , 2020, Future Gener. Comput. Syst..

[7]  Gaurav Bhatnagar,et al.  Robust watermarking using fractional wavelet packet transform , 2012 .

[8]  V. I. Arnolʹd,et al.  Ergodic problems of classical mechanics , 1968 .

[9]  Mingchu Li,et al.  A region-adaptive semi-fragile dual watermarking scheme , 2014, Multimedia Tools and Applications.

[10]  Geovandro C. C. F. Pereira,et al.  Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems , 2017, Secur. Commun. Networks.

[11]  Sung Wook Baik,et al.  Image steganography using uncorrelated color space and its application for security of visual contents in online social networks , 2016, Future Gener. Comput. Syst..

[12]  Hala S. Own,et al.  A blind chaos-based watermarking technique , 2014, Secur. Commun. Networks.

[13]  T. Kretschmer,et al.  Piracy and Box Office Movie Revenues: Evidence from Megaupload , 2017 .

[14]  Ling-Yuan Hsu,et al.  A mixed modulation scheme for blind image watermarking , 2016 .

[15]  Farhana Ahad,et al.  Utilizing neighborhood coefficient correlation: a new image watermarking technique robust to singular and hybrid attacks , 2018, Multidimens. Syst. Signal Process..

[16]  Deepa Kundur,et al.  Dual domain watermarking for authentication and compression of cultural heritage images , 2004, IEEE Transactions on Image Processing.

[17]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[18]  Rabul Hussain Laskar,et al.  A Joint DWT-DCT Based Robust Digital Watermarking Algorithm for Ownership Verification of Digital Images , 2011 .

[19]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[20]  Luming Zhang,et al.  Action2Activity: Recognizing Complex Activities from Sensor Data , 2015, IJCAI.

[21]  Marco Botta,et al.  A modular framework for color image watermarking , 2016, Signal Process..

[22]  Shabir A. Parah,et al.  Chaos based novel cryptographic technique based on a new logistic map , 2017, Int. J. Soc. Comput. Cyber Phys. Syst..

[23]  Sung Wook Baik,et al.  Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy , 2016, Journal of Medical Systems.

[24]  Khan Muhammad,et al.  Hash Based Encryption for Keyframes of Diagnostic Hysteroscopy , 2018, IEEE Access.

[25]  David S. Rosenblum,et al.  From action to activity: Sensor-based activity recognition , 2016, Neurocomputing.

[26]  Tanveer A. Zia,et al.  A zero-watermarking algorithm for privacy protection in biomedical signals , 2017, Future Gener. Comput. Syst..

[27]  Mohsen Guizani,et al.  The rise of ransomware and emerging security challenges in the Internet of Things , 2017, Comput. Networks.

[28]  Sana Ullah,et al.  Chaos-based robust method of zero-watermarking for medical signals , 2018, Future Gener. Comput. Syst..

[29]  Khaled Loukhaoukha,et al.  A new reliable optimized image watermarking scheme based on the integer wavelet transform and singular value decomposition for copyright protection , 2017, Inf. Sci..

[30]  Xiao Zhou,et al.  Fragile Watermarking for Image Authentication Using the Characteristic of SVD , 2017, Algorithms.

[31]  Imke Reimers Can Private Copyright Protection Be Effective? Evidence from Book Publishing , 2016, The Journal of Law and Economics.

[32]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[33]  G. M. Bhat,et al.  Realisation and robustness evaluation of a blind spatial domain watermarking technique , 2017 .

[34]  Luming Zhang,et al.  Fortune Teller: Predicting Your Career Path , 2016, AAAI.

[35]  Javaid A. Sheikh,et al.  StegNmark: A Joint Stego-Watermark Approach for Early Tamper Detection , 2017 .

[36]  Muhammad Shoaib,et al.  Countering Statistical Attacks in Cloud-Based Searchable Encryption , 2018, International Journal of Parallel Programming.

[37]  Javaid A. Sheikh,et al.  A transform domain based robust color image watermarking scheme for single and dual attacks , 2017, 2017 Fourth International Conference on Image Information Processing (ICIIP).

[38]  Stafford E. Tavares,et al.  On the Design of S-Boxes , 1985, CRYPTO.

[39]  Nilanjan Dey,et al.  Realization of a New Robust and Secure Watermarking Technique Using DC Coefficient Modification in Pixel Domain and Chaotic Encryption , 2017, J. Glob. Inf. Manag..

[40]  Khier Benmahammed,et al.  Blind image watermarking technique based on differential embedding in DWT and DCT domains , 2015, EURASIP Journal on Advances in Signal Processing.

[41]  Javaid A. Sheikh,et al.  Hiding Electronic Patient Record (EPR) in medical images: A high capacity and computationally efficient technique for e-healthcare applications , 2017, J. Biomed. Informatics.

[42]  Li Min,et al.  Arnold Transform Based Image Scrambling Method , 2013, ICMT 2013.

[43]  Varghese Paul,et al.  An imperceptible spatial domain color image watermarking scheme , 2016, Journal of King Saud University - Computer and Information Sciences.