Study on watermarking scheme using threshold value and S-Box

Digital data can be easily copied and distributed, and since the original is exactly the same as the copy, the author would be unable to distinguish between the two. This is currently becoming a serious problem, resulting in a spear-and-shield like confrontation between those who are trying to stop illegal replication and those who are trying to access illegal copies. Digital watermarking is attracting attention as a means of providing copyright protection and authentication for multimedia content facing such difficulties. A digital watermark inserts information into multimedia content without the users' knowledge, and in the event of a copyright issue, the information can be extracted, providing the author with the rightful claim of ownership. In this thesis, a watermark is not only inserted in the LSB bit like the thesis of Ping Wah Wong and Nasir Memon, but the insertion position of the watermark is randomly chosen using a threshold value and S-Box to prevent an attacker from obtaining or manipulating the inserted information. In addition, threshold values that result in a minimum amount of image deterioration due to variable insertion were evaluated experimentally.

[1]  Min Wu,et al.  Data hiding in binary image for authentication and annotation , 2004, IEEE Transactions on Multimedia.

[2]  Behrouz A. Forouzan Cryptography & Network Security , 2007 .

[3]  William Stallings,et al.  Cryptography and network security , 1998 .

[4]  Behrouz A. Forouzan,et al.  Cryptography and network security , 1998 .

[5]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[6]  Stefano Tubaro,et al.  Hash-Based Identification of Sparse Image Tampering , 2009, IEEE Transactions on Image Processing.

[7]  Hae Yong Kim A new public-key authentication watermarking for binary document images resistant to parity attacks , 2005, IEEE International Conference on Image Processing 2005.

[8]  Rita Noumeir,et al.  Methods for image authentication: a survey , 2008, Multimedia Tools and Applications.

[9]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[10]  Shuangyuan Yang,et al.  Content-based image authentication: current status, issues, and challenges , 2007, International Conference on Semantic Computing (ICSC 2007).

[11]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[12]  Ping Wah Wong,et al.  A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[13]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..