An MD5-Hirose Hashing Algorithm for Digital Image Watermarking

Electronic media files like pictures, sound, and video are now available in public. The internet media has increasingly produced the availability of media resources with many copyright issues where editing and manipulating those files become a severe issue. The digitization of watermark is the best approach to manage this issue. This study provides a new model in identifying the authenticity of a digital media document using the new MD5-Hirose algorithm and is analyzed using data capacity, histogram, and hamming distance. The data capacity analysis results revealed that the eight (8) files consist of original, protected and same as original produced have the same byte result. In the histogram analysis, the four (4) image data used are based on the luminosity image which resulted in a match on the same amount of embedding and extracting process of the image files. In the hamming distance, there are also four (4) images that were tested. Each image has a generated hash value as to the original, protected and same as original files. The hamming distance results for all data yield to zero result. Thus, the zero result means the production of the security of files through watermark. Therefore, the results are proof that the new MD5-Hirose hashing algorithm was able to watermark information effectively.

[1]  Yongdong Wu,et al.  On the security of an SVD-based ownership watermarking , 2005, IEEE Transactions on Multimedia.

[2]  Dutch T. Meyer,et al.  A study of practical deduplication , 2011, TOS.

[3]  M. A. Peer,et al.  A channel wise color image watermarking scheme based on Discrete Wavelet Transformation , 2014, 2014 International Conference on Computing for Sustainable Global Development (INDIACom).

[4]  Naoufel Werghi,et al.  Robust and Fragile Watermarking Scheme Based on DCT and Hash Function for Color Satellite Images , 2013, 2013 Sixth International Conference on Developments in eSystems Engineering.

[5]  Catherine H. Gebotys,et al.  A Quantitative Analysis of a Novel SEU-Resistant SHA-2 and HMAC Architecture for Space Missions Security , 2013, IEEE Transactions on Aerospace and Electronic Systems.

[6]  A. K. Singh,et al.  A novel technique for digital image watermarking in spatial domain , 2012, 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing.

[7]  Kusuma Kumari A Survey of Digital Watermarking Techniques and its Applications , 2013 .

[8]  Dhiren Patel,et al.  A Survey on Internet of Things: Security and Privacy Issues , 2014 .

[9]  Ainuddin Wahid Abdul Wahab,et al.  Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network , 2015, J. King Saud Univ. Comput. Inf. Sci..

[10]  Frank Y. Shih,et al.  An adjusted-purpose digital watermarking technique , 2004, Pattern Recognit..

[11]  Amiruddin Amiruddin,et al.  New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks , 2017, Int. J. Commun. Networks Inf. Secur..

[12]  Jianhua Sun,et al.  Image Algorithm for Watermarking Relational Databases Based on Chaos , 2010 .

[13]  Chun Kiat Tan,et al.  Security Protection of DICOM Medical Images Using Dual-Layer Reversible Watermarking with Tamper Detection Capability , 2011, Journal of Digital Imaging.

[14]  Tian-ge Zhuang,et al.  A Region-Based Lossless Watermarking Scheme for Enhancing Security of Medical Data , 2009, Journal of Digital Imaging.

[15]  Zhenjun Tang,et al.  Robust image hashing using ring-based entropies , 2013, Signal Process..

[16]  Palash Jain,et al.  A SURVEY ON INTERNET OF THINGS: SECURITY AND PRIVACY ISSUES , 2015 .

[17]  Yudi Prayudi,et al.  Encryption EXIF Metadata for Protection Photographic Image of Copyright Piracy , 2016 .

[18]  Yuan Zhang,et al.  A Medical Image Authentication System Based on Reversible Digital Watermarking , 2009, 2009 First International Conference on Information Science and Engineering.

[19]  Vishal Shrivastava,et al.  A Survey of Digital Watermarking Techniques and its Applications , 2014, ArXiv.

[20]  Preeti Nagrath,et al.  Nested Digital Image Watermarking Technique Using Blowfish Encryption Algorithm , 2013 .

[21]  A. Kousalya,et al.  A Comparative Analysis of Security Algorithms Using Cryptographic Techniques in Cloud Computing , 2017 .

[22]  Agostino Cortesi,et al.  Watermarking Techniques for Relational Databases: Survey, Classification and Comparison , 2010, J. Univers. Comput. Sci..

[23]  Jian-Ping Huang A Fast Watermarking Algorithm for Image Authentication , 2008, 2008 International Conference on Cyberworlds.

[24]  Anil Gupta,et al.  Lsb Based Digital Image Watermarking For Gray Scale Image , 2012 .

[25]  Jaspal Bagga,et al.  Performance Comparison of Digital Image Watermarking Techniques: A Survey , 2013 .

[26]  H. Hassan,et al.  Investigation on perceptual and robustness of LSB digital watermarking scheme on Halal Logo authentication , 2012, 2012 International Conference on System Engineering and Technology (ICSET).

[27]  Kiran,et al.  Digital Watermarking : Potential Challenges and Issues , 2015 .

[28]  M. Mohammed Sathik,et al.  A Novel DWT Based Invisible Watermarking Technique for Digital Images , 2012, Int. Arab. J. e Technol..

[29]  Dr.S.S. Sane,et al.  A Study of Watermarking Relational Databases Miss , 2014 .

[30]  Risanuri Hidayat,et al.  Increasing the security of mp3 steganography using AES Encryption and MD5 hash function , 2016, 2016 2nd International Conference on Science and Technology-Computer (ICST).

[31]  Ganga Holi,et al.  An Overview of Image Security Techniques , 2016 .

[32]  K. Baskaran,et al.  FPGA Implementation of High Speed Low Area DWT Based Invisible Image Watermarking Algorithm , 2012 .

[33]  Mohamed M. Abd-Eldayem A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine , 2013 .

[34]  Pallavi Patil,et al.  DWT Based Invisible Watermarking Technique for Digital Images , 2013 .

[35]  Wang Xi-jin,et al.  The Application Research of MD5 Encryption Algorithm in DCT Digital Watermarking , 2012 .

[36]  Takaaki Yamada,et al.  Use of both Invisible and Emergable Watermarks to Deter Illegal Copying of Images , 2013, KES.

[37]  Wim Schoenmaker,et al.  Simulation of substrate currents , 2002, International Conferencre on Simulation of Semiconductor Processes and Devices.

[38]  Lokesh Singh,et al.  An Efficient RC6 based Image Cryptography to Enhance Correlation and Entropy , 2016 .

[39]  Shakil Ahmed,et al.  Advanced Technique of Digital Watermarking based on SVD-DWT-DCT and Arnold Transform , 2013 .

[40]  Preeti Gupta Cryptography based digital image watermarking algorithm to increase security of watermark data , 2012 .

[41]  Y. Ciftci,et al.  The first principles study on the TmSb compound , 2011 .

[42]  Amjad Rehman,et al.  Digital Watermarking for Images Security using Discrete Slantlet Transform , 2014 .