Efficiency-Aware Watermarking using Different Wavelet Families for the Internet of Things

Efficient image transfer in the Internet of Things (IoT) Era, has many requirements that need to be satisfied based on the nature of each underlying application. Internet of Things is a research paradigm that empowers data, data fusion and encompasses embedded images, which need to be transmitted to numerous interconnected devices. The risks of contravention of owner's rights are increasing, while data transfer creates new demands for securing the Internet of Things. In this respect, watermarking schemes can be used to save those rights from illegal usage and copying of digital image data. For IoT applications digital watermarking can be used to guarantee that the data used is protected and the rights of the owner are secured (i.e. both user and machine generated). This work proposes a novel watermarking scheme based on the biorthogonal family, (biorthogonal 2.2, biorthogonal 3.5 and biorthogonal 5.5) wavelet transform, while it uses a convolution for symlets wavelet transform and coiflets wavelet transform. These wavelet family approaches are highly robust against various types of attacks (both passive and active), for the prevention of the piracy and authentication of the data over IoT ecosystems. The proposed framework is thoroughly evaluated showing great robustness against attacks and allowing a higher level of protection compared to other available frameworks and schemes.

[1]  Chetana Prakash,et al.  Internet of Things (IoT): A vision, architectural elements, and security issues , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).

[2]  Houbing Song,et al.  Digital image watermarking method based on DCT and fractal encoding , 2017, IET Image Process..

[3]  P. Rajesh Kumar,et al.  An efficient genetic algorithm based gray scale digital image watermarking for improving the robustness and imperceptibility , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).

[4]  Chokri Ben Amar,et al.  Image authentication algorithm with recovery capabilities based on neural networks in the DCT domain , 2014, IET Image Process..

[5]  Haruna Chiroma,et al.  An intermediate significant bit (ISB) watermarking technique using neural networks , 2016, SpringerPlus.

[6]  Sachin Gaur,et al.  A hybrid RDWT-DCT and SVD based digital image watermarking scheme using Arnold transform , 2017, 2017 4th International Conference on Signal Processing and Integrated Networks (SPIN).

[7]  Frank Y. Shih,et al.  Digital Watermarking and Steganography: Fundamentals and Techniques , 2007 .

[8]  Ahmed Bouridane,et al.  Blind Image Watermark Detection Algorithm Based on Discrete Shearlet Transform Using Statistical Decision Theory , 2018, IEEE Transactions on Computational Imaging.

[9]  Robert X. Gao,et al.  Discrete Wavelet Transform , 2011 .

[10]  Ling-Yuan Hsu,et al.  Robust blind image watermarking by modulating the mean of partly sign-altered DCT coefficients guided by human visual perception , 2016 .

[11]  Juuso T. Olkkonen,et al.  Discrete Wavelet Transforms - Theory and Applications , 2011 .

[12]  Michael G. Strintzis,et al.  Locally optimum nonlinearities for DCT watermark detection , 2004, IEEE Transactions on Image Processing.

[13]  P. Bao,et al.  Image adaptive watermarking using wavelet domain singular value decomposition , 2005 .

[14]  Xiao Zhou,et al.  Robust Image Watermarking Algorithm Based on ASIFT against Geometric Attacks , 2018 .

[15]  Song Guo,et al.  Rank-Based Image Watermarking Method With High Embedding Capacity and Robustness , 2016, IEEE Access.

[16]  Fadi Al-Turjman,et al.  5G in a Convergent Internet of Things Era: An Overview , 2018, 2018 IEEE International Conference on Communications Workshops (ICC Workshops).

[17]  Chunyan Zhang,et al.  An encrypted medical image retrieval algorithm based on DWT-DCT frequency domain , 2017, 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA).

[18]  Wenjia Li,et al.  Policy-Based Secure and Trustworthy Sensing for Internet of Things in Smart Cities , 2018, IEEE Internet of Things Journal.

[20]  Mohamed Elhoseny,et al.  Secure and Robust Fragile Watermarking Scheme for Medical Images , 2018, IEEE Access.

[21]  Stéphane Mallat,et al.  A Wavelet Tour of Signal Processing - The Sparse Way, 3rd Edition , 2008 .

[22]  Harsha M. Patil,et al.  Study and overview of combined NSCT-DCT digital image watermarking , 2016, 2016 International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC).