Advertisement

An optimized hierarchical encryption technique for tamper recognition

  • Sudharshan Chakravarthy
  • Madhav Anand Jagannathan
  • J. Jennifer Ranjani
  • Balamurugan Baluswamy
  • Seifedine KadryEmail author
Article
  • 18 Downloads

Abstract

Digital images contain sensitive information that needs to be watermarked for ownership authentication and copyright verification. It is crucial to have a method to detect and recognize tampering when images are sent over insecure channels. The watermarking scenario becomes more complicated when an intruder is precluded from obtaining a watermark signal from a watermarked image since it can expose future point-to-point correspondences. The proposed scheme utilizes a hierarchical strategy for improving the security of the semi-fragile watermarking scheme that requires fewer data to be exchanged before each transaction. Consequently, the proposed watermarking method obtains a trade-off between robustness and imperceptibility by using a meta-heuristic approach, namely, the Sine Cosine Algorithm (SCA). Furthermore, an Artificial Neural Network (ANN) is built using the Softmax classifier to recognize possible attacks that might be performed by an intruder. The whole scheme is presented in the form of a GUI with the attack recognition triggered from the receiver’s side. Experimental results show improved image quality metrics like PSNR, correlation coefficient, and structural similarity when the scaling factor used in the watermarking algorithm is optimized using SCA.

Keywords

Watermarking Tamper detection Discrete wavelet transform Artificial neural network 

Notes

References

  1. 1.
    Khanduja V, Chakraverty S, Verma OP (2015) Watermarking Categorical Data: Algorithm and Robustness Analysis. Def Sci J 65(3)Google Scholar
  2. 2.
    Thind DK, Jindal S (2015) A Semi Blind DWT-SVD Video Watermarking. Procedia Computer Science 46:1661–1667CrossRefGoogle Scholar
  3. 3.
    Lai C-C (2013) Corrigendum to “A Digital Watermarking Scheme Based on Singular Value Decomposition and Tiny Genetic Algorithm” [Digital Signal Processing 21 (4) (2011) 522–527]. Digital Signal Processing 23(4):1333CrossRefGoogle Scholar
  4. 4.
    Ansari IA, Pant M, Ahn CW (2016) Robust and False Positive Free Watermarking in IWT Domain using SVD and ABC. Eng Appl Artif Intell 49:114–125CrossRefGoogle Scholar
  5. 5.
    Li C-T, Li Y (2009) Medical Images Authentication Through Repetitive Index Modulation Based Watermarking. International Journal of Digital Crime and Forensics 1(4):32–39MathSciNetCrossRefGoogle Scholar
  6. 6.
    Mishra M (2012) Image Encryption using Fibonacci-Lucas Transformation. International Journal on Cryptography and Information Security 2(3):131–141CrossRefGoogle Scholar
  7. 7.
    Lu C-S, Liao H-YM (2001) Multipurpose Watermarking for Image Authentication and Protection. IEEE Trans Image Process 10(10):1579–1592CrossRefGoogle Scholar
  8. 8.
    Podilchuk CI, Zeng W (1998) Image-Adaptive Watermarking using Visual Models. IEEE Journal on Selected Areas in Communications 16(4):525–539CrossRefGoogle Scholar
  9. 9.
    Chakravarthy S, Venkatesan SP, Anand JM, Ranjani JJ (2016) Enhanced Playfair Cipher for Image Encryption using Integer Wavelet Transform. Indian J Sci Technol 9(39)Google Scholar
  10. 10.
    Baghel M, Bhardwaj R, Shivani S (2013) Authenticating Images using Blind Fragile Watermarking Scheme Based on LSB Technique. Int J Comput Appl 62(18):15–19Google Scholar
  11. 11.
    Kalantari NK, Ahadi SM, Vafadust M (2010) A Robust Image Watermarking in The Ridgelet Domain using Universally Optimum Decoder. IEEE Transactions on Circuits and Systems for Video Technology 20(3):396–406CrossRefGoogle Scholar
  12. 12.
    Wong PW, Memon N (2001) Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification. IEEE Trans Image Process 10(10):1593–1601CrossRefGoogle Scholar
  13. 13.
    Mirjalili S (2016) SCA: A Sine Cosine Algorithm for Solving Optimization Problems. Knowl-Based Syst 96:120–133CrossRefGoogle Scholar
  14. 14.
    Fazli S, Moeini M (2016) A Robust Image Watermarking Method Based on DWT, DCT, and SVD using A New Technique for Correction of Main Geometric Attacks. Optik - International Journal for Light and Electron Optics 127(2):964–972CrossRefGoogle Scholar
  15. 15.
    Lai C-C (2011) A Digital Watermarking Scheme Based on Singular Value Decomposition and Tiny Genetic Algorithm. Digital Signal Processing 21(4):522–527CrossRefGoogle Scholar
  16. 16.
    Tafaghodi M, Ghaffari M, Latif A, Mousavi SR (2015) Improving image watermarking based on Tabu search by Chaos. CoRR abs/1501.01576Google Scholar
  17. 17.
    Aslantas V (2008) A Singular-Value Decomposition-Based Image Watermarking using Genetic Algorithm. AEU Int J Electron Commun 62(5):386–394CrossRefGoogle Scholar
  18. 18.
    Oyedotun OK, Khashman A (2016) Deep learning in vision-based static hand gesture recognition. Neural Computing and ApplicationsGoogle Scholar
  19. 19.
    Havaei M, Davy A, Warde-Farley D, Biard A, Courville A, Bengio Y, Pal C, Jodoin P-M, Larochelle H (2017) Brain Tumor Segmentation with Deep Neural Networks. Med Image Anal 35:18–31CrossRefGoogle Scholar
  20. 20.
    Zhang Y, Zhang E, Chen W (2016) Deep Neural Network for Halftone Image Classification Based on Sparse Auto-Encoder. Eng Appl Artif Intell 50:245–255CrossRefGoogle Scholar
  21. 21.
    Daubechies I, Sweldens W (1998) Factoring Wavelet Transforms into Lifting Steps. The Journal of Fourier Analysis and Applications 4(3):247–269MathSciNetCrossRefGoogle Scholar
  22. 22.
    Elhoseny M, Shankar K, Lakshmanaprabu SK, Arun Kumar AMN (2018) Hybrid optimization with cryptography encryption for medical image security in internet of things. Neural Computing and ApplicationsGoogle Scholar
  23. 23.
    Thakur S, Singh AK, Ghrera SP, Elhoseny M (2018) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimedia tools and ApplicationsGoogle Scholar
  24. 24.
    Elhoseny M, Ramírez-González G, Abu-Elnasr OM, Shawkat SA, Arunkumar N, Farouk A (2018) Secure Medical Data Transmission Model for IoT-based Healthcare Systems. IEEE Access 6:20596–20608CrossRefGoogle Scholar
  25. 25.
    Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and Robust Fragile Watermarking Scheme for Medical Images. IEEE Access 6:10269–10278CrossRefGoogle Scholar
  26. 26.
    Laouamer L, Tayan O (2018) Performance Evaluation of a Document Image Watermarking approach with Enhanced Tamper Localization and Recovery. IEEE Access 6:26144–26166CrossRefGoogle Scholar
  27. 27.
    Amanipour V, Ghaemmaghami S (2018) Video-Tampering Detection and Content Reconstruction via Self-Embedding. IEEE Trans Instrum Meas 67(3):505–515CrossRefGoogle Scholar
  28. 28.
    Singh P, Raman B, Agarwal N (2018) Toward Encrypted Video Tampering Detection and Localization based on POB Number System over Cloud. IEEE Transactions on Circuits and Systems for Video Technology 28(9):2116–2130CrossRefGoogle Scholar
  29. 29.
    Imran M, Ali Z (2017) Sheikh Tahir Baksh, Sheeraz Akram, “Blind Detection of Copy-Move Forgery in Digital Audio Forensics”. IEEE Access 5:12843–12855CrossRefGoogle Scholar
  30. 30.
    Aznaveh AM, Torkamani-Azar F, Mansouri A, Kurugollu F (2010) Reversible Watermarking using Statistical Information. EURASIP Journal on Advances in Signal Processing 738972Google Scholar
  31. 31.
    Pizzolante R, Carpentieri B, Castiglione A, Maio GD (2012) The AVQ algorithm: watermarking and compression performances. In: The Third IEEE International Conference on Intelligent Networking and Collaborative Systems, pp. 698–702Google Scholar
  32. 32.
    Castiglione A, Santis AD, Pizzolante R, Castiglione A, Loia V, Palmieri F (2015) On the protection of fMRI images in multi-domain environments. In: The proceedings of the IEEE 29th International Conference on Advanced Information Networking and Applications, pp. 476–482Google Scholar
  33. 33.
    Sikder I, Dhar PK, Shimamura T (2017) A semi-fragile watermarking method using slant transform LU decomposition for image authentication. In: The Proceedings of the IEEE International Conference on Electrical, Computer, and Communication Engineering, pp. 881–885Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Systems EngineerTCS Innovation LabsChennaiIndia
  2. 2.Support EngineerMicrosoft India (R&D)BangaloreIndia
  3. 3.Department of CSISBirla Institute of Technology and SciencePilaniIndia
  4. 4.School of Computing Science and EngineeringGalgotias UniversityGreater NoidaIndia
  5. 5.Department of Mathematics and Computer Science, Faculty of ScienceBeirut Arab UniversityBeirutLebanon

Personalised recommendations