A Semi-Fragile, Inner-Outer Block-Based Watermarking Method Using Scrambling and Frequency Domain Algorithms

Image watermarking is most often used to prove that an image belongs to someone and to make sure that the image is the same as was originally produced. The type of watermarking used for the detection of originality and tampering is known as authentication-type watermarking. In this paper, a blind semi-fragile authentication watermarking method is introduced. Although the main concern in this paper is authenticating the image, watermarking for proving ownership is additionally implemented. The method considers the image as two main parts: an inner part and an outer part. The inner and outer parts are divided into non-overlapping blocks. The block size of the inner and outer part are different. The outer blocks have a greater area than the inner blocks so that their watermark-holding capacity is greater, providing enough robustness for semi-fragility. The method is semi-fragile and the watermarked image is authenticated despite the JPEG being compressed to 75% quality. The embedded watermark also survives innocent types of image operations, such as intensity adjustment, histogram equalization and gamma correction. Semi-fragile and selectively fragile authentication is valuable and in high demand specifically because it survives these innocent image operations while detecting ill-intentioned tampering. In this work, we embed a binary watermark into the inner and outer parts of images using a scrambling algorithm, discrete wavelet transform (DWT) and discrete cosine transform (DCT) in the blocks. The proposed methodology has high image quality after watermarking, with a PSNR value of 40.577, and high quality is also achieved after JPEG compression. The embedding process provides acceptable image quality after tamper attacks, including JPEG compression, Gaussian noise, average filtering, and scaling attacks with PSNR values greater than 29. Experimental results obtained show that the proposed semi-fragile watermarking algorithm is more robust, secure and resistant than other algorithms in the literature.

[1]  A. Anand,et al.  A Hybrid Optimization-Based Medical Data Hiding Scheme for Industrial Internet of Things Security , 2023, IEEE Transactions on Industrial Informatics.

[2]  Zhaopin Su,et al.  M-Sequences and Sliding Window Based Audio Watermarking Robust Against Large-Scale Cropping Attacks , 2023, IEEE Transactions on Information Forensics and Security.

[3]  G. Sahu,et al.  Dual image-based reversible fragile watermarking scheme for tamper detection and localization , 2022, Pattern Analysis and Applications.

[4]  A. Algarni,et al.  Efficient Biomedical Signal Security Algorithm for Smart Internet of Medical Things (IoMTs) Applications , 2022, Electronics.

[5]  Chunwei Tian,et al.  An Improved U-Net for Watermark Removal , 2022, Electronics.

[6]  V. Puig,et al.  A Zonotopic-Based Watermarking Design to Detect Replay Attacks , 2022, IEEE/CAA Journal of Automatica Sinica.

[7]  Zheng-Quan Xu,et al.  A Physical-Layer Watermarking Scheme Based on 5G NR , 2022, Electronics.

[8]  Ashutosh Kumar Singh,et al.  Electronic Health Data Security in the Internet of Things through Watermarking: An Introduction , 2022, IEEE Internet of Things Magazine.

[9]  Wei Hu,et al.  Generic Reversible Visible Watermarking via Regularized Graph Fourier Transform Coding , 2021, IEEE Transactions on Image Processing.

[10]  Xiaochen Yuan,et al.  Blind Dual Watermarking Scheme Using Stucki Kernel and SPIHT for Image Self-Recovery , 2022, IEEE Access.

[11]  L. I. Izhar,et al.  Efficient Watermarking Method Based on Maximum Entropy Blocks Selection in Frequency Domain for Color Images , 2022, IEEE Access.

[12]  Meiqing Wang,et al.  Privacy-Preserving Image Watermark Embedding Method Based on Edge Computing , 2022, IEEE Access.

[13]  Xiaoyi Zhou,et al.  A Reversible Watermarking System for Medical Color Images: Balancing Capacity, Imperceptibility, and Robustness , 2021, Electronics.

[14]  Chia-Chen Lin,et al.  Blind Dual Watermarking for Color Images’ Authentication and Copyright Protection , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[15]  Theagarajan Padma,et al.  Semi fragile watermarking for content based image authentication and recovery in the DWT-DCT domains , 2018, Int. Arab J. Inf. Technol..

[16]  N. V. Rao,et al.  Watermarking in Medical Imaging for Security and Authentication , 2011, Inf. Secur. J. A Glob. Perspect..

[17]  Shinfeng D. Lin,et al.  Hierarchical Fragile Watermarking Scheme For Image Authentication , 2011, Intell. Autom. Soft Comput..

[18]  Ahmet M. Eskicioglu,et al.  A DWT-based robust semi-blind image watermarking algorithm using two bands , 2006, Electronic Imaging.

[19]  Po-Whei Huang,et al.  A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..

[20]  Minerva M. Yeung,et al.  Invisible watermarking for image verification , 1998, J. Electronic Imaging.