A Discrete Rajan Transform-based robustness improvement encrypted watermark scheme backed by Support Vector Machine

Abstract A key challenge in the watermarking methodology is the sturdiness against various kinds of attacks even while upholding adequate level of security. Several watermarking techniques were recently proposed by embedding robust watermark into digital images. In general, most of the algorithms focus only on limited attacks to determine the watermark robustness. This study demonstrates an improved watermarking scheme based on encryption of the watermark image by utilising Discrete Rajan Transform (DRT) which is backed by Support Vector Machine (SVM). The encrypting technique is worked out by splitting the actual image into four segments, followed by shifting every individual row in each segment and employing DRT to calculate coefficients of the new rows. SVM, as a classifier, backs the extraction of the watermark image process by enhancing the watermark image detection with maximum possible correlation. Various original images as well as watermark images were employed to evaluate the proposed scheme. Furthermore, the evaluation process for the performance is conducted by experimenting with various attacks as well with normal operation. The experimental results prove that the proposed scheme results in considerable enhancement of security and robustness, making it ideal for security needed applications.

[1]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[2]  Nader Karimi,et al.  Robust image watermarking scheme using bit-plane of hadamard coefficients , 2016, Multimedia Tools and Applications.

[3]  Zhenxing Qian,et al.  Tampering Detection and Content Recovery for Digital Images Using Halftone Mechanism , 2014, 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[4]  Jun-Dong Chang,et al.  LBP-based fragile watermarking scheme for image tamper detection and recovery , 2013, 2013 International Symposium on Next-Generation Electronics.

[5]  Jianting Guo,et al.  Secure watermarking scheme against watermark attacks in the encrypted domain , 2015, J. Vis. Commun. Image Represent..

[6]  Ankit Gupta,et al.  Robust Watermarking Scheme Based on Discrete Wavelet Transform and Visual Hided Scheme , 2016 .

[7]  Shinfeng D. Lin,et al.  Dual watermark for image tamper detection and recovery , 2008, Pattern Recognit..

[8]  Prabhishek Singh,et al.  A Survey of Digital Watermarking Techniques, Applications and Attacks , 2013 .

[9]  Shi-Jinn Horng,et al.  An improved SVD-based watermarking technique for copyright protection , 2012, Expert Syst. Appl..

[10]  Shaiful Jahari Hashim,et al.  A real time ECG data compression scheme for enhanced bluetooth low energy ECG system power consumption , 2017 .

[11]  Hung-Hsu Tsai,et al.  Color image watermark extraction based on support vector machines , 2007, Inf. Sci..

[12]  Hong-Ying Yang,et al.  A new SVM-based image watermarking using Gaussian-Hermite moments , 2012, Appl. Soft Comput..

[13]  Musheng Chen,et al.  A novel image encryption method based on fractional Fourier transform and odd-even quantification , 2016, International Conference on Digital Image Processing.

[14]  Xinge You,et al.  An image watermarking scheme using new wavelet filter banks , 2009, 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication.

[15]  Khan Muhammad,et al.  Hash Based Encryption for Keyframes of Diagnostic Hysteroscopy , 2018, IEEE Access.

[16]  Po-Whei Huang,et al.  A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..

[17]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[18]  Rabul Hussain Laskar,et al.  Multiclass SVM based adaptive filter for removal of high density impulse noise from color images , 2016, Appl. Soft Comput..

[19]  Bo Li,et al.  Self-Recognized Image Protection Technique that Resists Large-Scale Cropping , 2014, IEEE MultiMedia.

[20]  G. Coatrieux,et al.  A Review of Image Watermarking Applications in Healthcare , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.

[21]  Rajib Kumar Jha,et al.  Digital watermark extraction using support vector machine with principal component analysis based feature reduction , 2015, J. Vis. Commun. Image Represent..

[22]  Jagdish Chandra Patra,et al.  A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression , 2010, Digit. Signal Process..