An intermediate significant bit (ISB) watermarking technique using neural networks

Prior research studies have shown that the peak signal to noise ratio (PSNR) is the most frequent watermarked image quality metric that is used for determining the levels of strength and weakness of watermarking algorithms. Conversely, normalised cross correlation (NCC) is the most common metric used after attacks were applied to a watermarked image to verify the strength of the algorithm used. Many researchers have used these approaches to evaluate their algorithms. These strategies have been used for a long time, however, which unfortunately limits the value of PSNR and NCC in reflecting the strength and weakness of the watermarking algorithms. This paper considers this issue to determine the threshold values of these two parameters in reflecting the amount of strength and weakness of the watermarking algorithms. We used our novel watermarking technique for embedding four watermarks in intermediate significant bits (ISB) of six image files one-by-one through replacing the image pixels with new pixels and, at the same time, keeping the new pixels very close to the original pixels. This approach gains an improved robustness based on the PSNR and NCC values that were gathered. A neural network model was built that uses the image quality metrics (PSNR and NCC) values obtained from the watermarking of six grey-scale images that use ISB as the desired output and that are trained for each watermarked image’s PSNR and NCC. The neural network predicts the watermarked image’s PSNR together with NCC after the attacks when a portion of the output of the same or different types of image quality metrics (PSNR and NCC) are obtained. The results indicate that the NCC metric fluctuates before the PSNR values deteriorate.

[1]  Akram M. Zeki,et al.  A Novel Digital Watermarking Technique Basedon ISB (Intermediate Significant Bit) , 2009 .

[2]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[3]  Gaurav Bhatnagar,et al.  A new robust adjustable logo watermarking scheme , 2012, Comput. Secur..

[4]  Chang Dong Yoo,et al.  Localized image watermarking based on feature points of scale-space representation , 2004, Pattern Recognit..

[5]  Latha Parameswaran,et al.  A Robust Image Watermarking Scheme using Image Moment Normalization , 2006 .

[6]  Malihe Mardanpour,et al.  Robust transparent image watermarking with Shearlet transform and bidiagonal singular value decomposition , 2016 .

[7]  Ersin Elbaşi,et al.  A new approach of nonblind watermarking methods based on DWT and SVD via LU decomposition , 2014 .

[8]  Benoit M. Macq,et al.  Image watermarking: an evolution to content based approaches , 2002, Pattern Recognit..

[9]  Asaad Y. Shamseldin,et al.  A comparative study of three neural network forecast combination methods for simulated river flows of different rainfall—runoff models , 2007 .

[10]  Feng Ji,et al.  Desynchronization attacks resilient image watermarking scheme based on global restoration and local embedding , 2013, Neurocomputing.

[11]  Alexander Tanchenko,et al.  Visual-PSNR measure of image quality , 2014, J. Vis. Commun. Image Represent..

[12]  Mohammed Ghanbari,et al.  The accuracy of PSNR in predicting video quality for different video scenes and frame rates , 2012, Telecommun. Syst..

[13]  A. N. Skodras " Multiple Channel Watermarking of Color Images " , .

[14]  Loganathan Agilandeeswari,et al.  A bi-directional associative memory based multiple image watermarking on cover video , 2015, Multimedia Tools and Applications.

[15]  Hal Berghel Watermarking cyberspace , 1997, CACM.

[16]  Pohsiang Tsai,et al.  A gray-level clustering reduction algorithm with the least PSNR , 2011, Expert Syst. Appl..

[17]  Li Fan,et al.  Improving the embedding efficiency of weight matrix-based steganography for grayscale images , 2013, Comput. Electr. Eng..

[18]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[19]  Juergen Seitz,et al.  Digital Watermarking for Digital Media , 2005 .

[20]  Jiwu Huang,et al.  Twenty years of digital audio watermarking - a comprehensive review , 2016, Signal Process..

[21]  Der-Chyuan Lou,et al.  A robust watermarking scheme using self-reference image , 2006, Comput. Stand. Interfaces.

[22]  Mohsen Ebrahimi Moghaddam,et al.  A multi-purpose digital image watermarking using fractal block coding , 2011, J. Syst. Softw..

[23]  Ling-Yuan Hsu,et al.  Blind image watermarking via exploitation of inter-block prediction and visibility threshold in DCT domain , 2015, J. Vis. Commun. Image Represent..

[24]  Michael Y. Hu,et al.  Forecasting with artificial neural networks: The state of the art , 1997 .

[25]  David G. Stork,et al.  Pattern Classification (2nd ed.) , 1999 .

[26]  José M. Solana,et al.  Haar wavelet based processor scheme for image coding with low circuit complexity , 2007, Comput. Electr. Eng..

[27]  Marek R. Ogiela,et al.  Digital images authentication scheme based on bimodal biometric watermarking in an independent domain , 2016, J. Vis. Commun. Image Represent..

[28]  Yildiray Yalman,et al.  Data hiding in digital images using a partial optimization technique based on the classical LSB method , 2013 .

[29]  Arpita Sharma,et al.  Gray-scale image watermarking using GA-BPN hybrid network , 2013, J. Vis. Commun. Image Represent..

[30]  Rampal Singh,et al.  Online Sequential Extreme Learning Machine for watermarking in DWT domain , 2016, Neurocomputing.

[31]  Raphael C.-W. Phan,et al.  On an optimal robust digital image watermarking based on SVD using differential evolution algorithm , 2011 .

[32]  David G. Stork,et al.  Pattern Classification , 1973 .

[33]  Zia-ur Rahman,et al.  Investigating the relationship between image enhancement and image compression in the context of the multi-scale retinex , 2011, J. Vis. Commun. Image Represent..

[34]  Yildiray Yalman,et al.  A new color image quality measure based on YUV transformation and PSNR for human vision system , 2013 .

[35]  Jeffrey A. Bloom,et al.  Computing the Probability of False Watermark Detection , 1999, Information Hiding.

[36]  Huazhong Shu,et al.  Color image watermarking based on quaternion Fourier transform and improved uniform log-polar mapping , 2015, Comput. Electr. Eng..

[37]  Chang Wook Ahn,et al.  Template matching of occluded object under low PSNR , 2013, Digit. Signal Process..

[38]  Chi-Kwong Chan,et al.  Data Hiding in Images by Adaptive LSB Substitution Based on the Pixel-Value Differencing , 2006, First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).

[39]  MoghaddamMohsen Ebrahimi,et al.  A multi-purpose digital image watermarking using fractal block coding , 2011 .

[40]  Bin Wang,et al.  Image watermarking using chaotic map and DNA coding , 2015 .

[41]  Bo Li,et al.  Framelet image watermarking considering dynamic visual masking , 2015 .

[42]  Syed Fahad Tahir,et al.  Support Vector Machine based Intelligent Watermark Decoding for Anticipated Attack , 2008 .

[43]  Fan Zhang,et al.  Information theory applications in error bit rate analysis of digital image watermarking , 2013, Comput. Electr. Eng..

[44]  Germano Caronni Assuring Ownership Rights for Digital Images , 1995, VIS.

[45]  Ainuddin Wahid Abdul Wahab,et al.  Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network , 2015, J. King Saud Univ. Comput. Inf. Sci..

[46]  Saraju P. Mohanty,et al.  Hardware assisted watermarking for multimedia , 2009, Comput. Electr. Eng..

[47]  Gordon W. Braudaway,et al.  Protecting publicly available images with a visible image watermark , 1996, Electronic Imaging.

[48]  Intan Z. Mat Darus,et al.  Non-parametric modelling of a rectangular flexible plate structure , 2012, Eng. Appl. Artif. Intell..

[49]  Johann A. Briffa,et al.  Channel models for high-capacity information hiding in images , 2003, SPIE Optics + Photonics.

[50]  Weisi Lin,et al.  Perceptual quality and objective quality measurements of compressed videos , 2006, J. Vis. Commun. Image Represent..

[51]  Efraim Turban,et al.  One organization's use of Lotus Notes , 1997, CACM.

[52]  Shahaboddin Shamshirband,et al.  Robust image watermarking based on Riesz transformation and IT2FLS , 2015 .

[53]  Beatrice Lazzerini,et al.  A multi-objective evolutionary approach to image quality/compression trade-off in JPEG baseline algorithm , 2010, Appl. Soft Comput..

[54]  Sen Bai,et al.  Robust and hierarchical watermarking of encrypted images based on Compressive Sensing , 2016, Signal Process. Image Commun..

[55]  S. Pereira,et al.  Attacks on digital watermarks: classification, estimation based attacks, and benchmarks , 2001, IEEE Communications Magazine.

[56]  Xiangyang Wang,et al.  A robust digital watermarking algorithm in undecimated discrete wavelet transform domain , 2013, Comput. Electr. Eng..

[57]  Nasser M. Nasrabadi,et al.  Pattern Recognition and Machine Learning , 2006, Technometrics.

[58]  Shih-Chieh Shie,et al.  Improving the robustness of DCT-based image watermarking against JPEG compression , 2005, 2005 Digest of Technical Papers. International Conference on Consumer Electronics, 2005. ICCE..

[59]  Rinita Roy,et al.  Optimization of Stego Image Retaining Secret Information Using Genetic Algorithm with 8-connected PSNR , 2015, KES.

[60]  Malay Kumar Kundu,et al.  Robust and Blind Spatial Watermarking In Digital Image , 2002, ICVGIP.

[61]  Jaya Sil,et al.  Perceptually adaptive MC-SS image watermarking using GA-NN hybridization in fading gain , 2014, Eng. Appl. Artif. Intell..

[62]  Hong Wang,et al.  Robust Range-based Localization Against Flip Ambiguity with Least Range Error , 2015 .

[63]  Arpita Sharma,et al.  A novel gray-scale image watermarking using hybrid Fuzzy-BPN architecture , 2015 .

[64]  A. Kääb,et al.  Sub-pixel precision image matching for measuring surface displacements on mass movements using normalized cross-correlation , 2011 .

[65]  Chun-Shien Lu,et al.  Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property , 2004 .

[66]  Aamir Saeed Malik,et al.  Dual-purpose semi-fragile watermark: Authentication and recovery of digital images , 2013, Comput. Electr. Eng..

[67]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.