Skip to main content

StegNmark: A Joint Stego-Watermark Approach for Early Tamper Detection

  • Chapter
  • First Online:

Part of the book series: Studies in Computational Intelligence ((SCI,volume 660))

Abstract

The exponential advancement in the fields of computer networks and multimedia signal processing has resulted in easy availability of digital multimedia content over the internet nowadays. However, this advancement has given rise to many challenges in terms of information security and content authentication that need to be taken care of. A novel technique based on combination of Steganography and Fragile Watermarking called as StegNmark for content authentication utilizing the concept of early tamper detection has been proposed in this chapter. StegNmark is a spatial-domain data hiding technique which is capable of early tamper detection of a given stego-image. The early detection could be quite useful in situations where (data extraction) time factor plays a critical role like data extraction indicating a warfare plan to attack the enemy. This is achieved by embedding a fragile watermark of about 1 % of total payload using bit interleaving in the cover medium. The comparatively lower payload watermark (compared to secret data embedded in the StegNmark) is first extracted for authentication purpose. If the watermark detected is same as that used at the transmitter, then only secret data is extracted from the stegomarked medium. Experimental results reveal that besides providing high-quality stego-images the proposed system is capable of saving appreciable amount of extraction time due to early tamper detection.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Chamlawi R, Khan A, Usman I (2010) Authentication and recovery of images using multiple watermarks. Comput Electr Eng 36:578–584

    Article  MATH  Google Scholar 

  2. Elshoura SM, Megherbi DB (2012) A secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments. Signal Process: Image Commun. doi:10.1016/j.image.2012.12

    Google Scholar 

  3. Chang C, Chuang J (2002) An image intellectual property protection scheme for gray level images using visual secret sharing strategy. Pattern Recognit Lett 23:931–941

    Article  MathSciNet  MATH  Google Scholar 

  4. Dey N, Samanta S, Yang XS, Das A, Chaudhuri SS (2013) Optimisation of scaling factors in electrocardiogram signal watermarking using cuckoo search. Int J Bio-Inspired Comput 5(5):315–326

    Article  Google Scholar 

  5. Lou DC, Liu JL (2002) Steganographic method for secure communications. Comput Secur 21:449–460

    Article  Google Scholar 

  6. Wu M, Liu B (2004) Data hiding in binary image for authentication and annotation. IEEE Trans Multimed 6:528–538

    Article  Google Scholar 

  7. Shabir AP, Javaid AS, Bhat GM (2015) Hiding in encrypted images: a three tier security data hiding system. Multidimens Syst Signal Process, Springer. doi:10.1007/s11045-015-0358-z

    Google Scholar 

  8. Cox I, Miller M, Bloom J (2001) Digital watermarking: principles and practice. Morgan Kaufman, Los Altos

    Google Scholar 

  9. Fan L, Gao T, Cao Y (2012) Improving the embedding efficiency of weight matrix-based steganography for grayscale images. Comput Electr Eng. doi:10.1016/j.compeleceng.2012.06.014

    Google Scholar 

  10. Dey N, Samanta S, Chakraborty S, Das A, Chaudhuri SS, Suri JS (2014) Firefly algorithm for optimization of scaling factors during embedding of manifold medical information: an application in ophthalmology imaging. J Med Imaging Health Inform 4(3):384–394

    Article  Google Scholar 

  11. Cox I, (2009), Information hiding, watermarking and steganography. Public Seminar, Intelligent Systems Research Centre (ISRC), University of Ulster at Magee, Northern Ireland

    Google Scholar 

  12. Hussain F (2012) A survey of digital watermarking techniques for multimedia data. MIT Int J Electron Commun Eng 2:37–43

    Google Scholar 

  13. Chakraborty S, Maji P, Pal AK, Biswas D, Dey N (2014) Reversible color image watermarking using trigonometric functions. In: 2014 International conference on electronic systems, signal processing and computing technologies (ICESC), IEEE, pp 105–110

    Google Scholar 

  14. Hartung F, Kutter M (1999) Multimedia watermarking techniques. Proc IEEE 87(7):1079–1107

    Article  Google Scholar 

  15. Shabir AP, Javaid AS, Bhat GM (2014) Data hiding in scrambled images: a new double layer security data hiding technique. Comput Electr Eng Elsevier 40(1):70–82

    Article  Google Scholar 

  16. Dey N, Maji P, Das P, Biswas S, Das A, Chaudhuri SS (2013) An edge based blind watermarking technique of medical images without devalorizing diagnostic parameters. In: 2013 International conference on advances in technology and engineering (ICATE), IEEE, pp 1–5

    Google Scholar 

  17. Chopra D, Gupta P, Sanjay G, Gupta A (2012) LSB based digital image watermarking for grayscale image. IOSR J Comput Eng 6:36–41

    Article  Google Scholar 

  18. Chakraborty S, Samanta S, Biswas D, Dey N, Chaudhuri SS (2013) Particle swarm optimization based parameter optimization technique in medical information hiding. In: 2013 IEEE international conference on computational intelligence and computing research (ICCIC), IEEE, pp 1–6

    Google Scholar 

  19. Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3&4):313–336

    Article  Google Scholar 

  20. Acharjee S, Chakraborty S, Samanta S, Azar AT, Hassanien AE, Dey N (2014) Highly secured multilayered motion vector watermarking. Advanced machine learning technologies and applications. Springer, Berlin, pp 121–134

    Google Scholar 

  21. Shabir AP, Javaid AS, Nazir AL, Bhat GM (2016) Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digit Signal Process, Elsevier. doi:10.1016/j.dsp.2016.02.005

    Google Scholar 

  22. Shabir AP, Javaid AS, Farhana A, Nazir AL, Bhat GM (2015) Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimed Tools Appl, Springer. doi:10.1007/s11042-015-3127-y

    Google Scholar 

  23. Schyndel RG, Tirkel A, Osborne CF (1994) A digital watermark. In: Proceedings of IEEE international conference on image processing, (ICIP’1994), pp 86–90

    Google Scholar 

  24. Caronni G (1995) Assuring ownership rights for digital images. In: Proceedings of the reliable IT systems, (VIS‘95’), pp 251–263

    Google Scholar 

  25. Tanaka K, Nakamura Y, Matsui K (1990) Embedding secret information into a dithered multi-level image. In: IEEE Proceedings of the military communications conference’90, pp 216–220

    Google Scholar 

  26. Pitas I (1996) A method for signature casting on digital images. In: IEEE proceedings of the international conference on image processing, Lausanne, Switzerland, vol 3, pp 215–218

    Google Scholar 

  27. Wolfgang RB, Delp EJ (1996) A watermark for digital images. In: IEEE proceedings of the international conference on image processing, Lausanne, Switzerland, vol 3, pp 219–222

    Google Scholar 

  28. Bhat GM, Shabir AP, Javaid AS (2010) FPGA implementation of novel complex PN code generator based data scrambler and descrambler. Int J Sci Technol, Thailand 4(01):125–135

    Google Scholar 

  29. Shabir AP, Javaid AS, Mohiuddin GB (2012) High capacity data embedding using joint intermediate significant bit and least significant technique. Int J Inf Eng Appl 2(11), ISSN: 2224-5782(print) ISSN: 2225-0506 (online)

    Google Scholar 

  30. Wolfgang RB and Delp EJ (1999) Fragile watermarking using the VW2D watermark. In: Proceedings of electronic imaging, San Jose, CA, 25–27 Jan 1999, vol 3657, pp 204–213

    Google Scholar 

  31. Wu DC, Tsai WH (2003) A stegnographic method for images by pixel value differencing. Pattern Recognit Lett 24(9–10):1613–1626

    Article  MATH  Google Scholar 

  32. Zang X, Wang S (2004) Vulnerability of pixel value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recognit Lett 25:331–339

    Article  Google Scholar 

  33. Hamood AK, Jalab HA, Kasirun ZM, Zidain BB, Zadain AA (2010) On capacity and security of stegnographic approaches: an overview. J Appl Sci 10:1825–1833

    Article  Google Scholar 

  34. Qi K, Zang DF, Xie D (2010) A high capacity stegnographic scheme for 3D point cloud models. Inf Technol J 9:4121–4421

    Google Scholar 

  35. Ahmad AL, Kahiah ML, Zaidain BB, Zaidain AA (2010) A novel embedding method to increase capacity of low bit encoding audio steganography technique using noise gate software algorithm. J Appl Sci 10:59–64

    Article  Google Scholar 

  36. Shabir AP, Javaid AS, Ghulam MB (2015) A secure and efficient spatial domain data hiding technique based on pixel adjustment. Am J Eng Technol Res, US Library congress, (USA), 14(2):38–44, 2014

    Google Scholar 

  37. Parah SA, Sheikh JA, Bhat GM (2012) High capacity data embedding using joint intermediate significant bit and least significant technique. Int J Inf Eng Appl 2(11):1–12

    Google Scholar 

  38. Podilchuk C, Zeng W (1998) Image-adaptive watermarking using visual models. IEEE J Select Areas Commun 16:525–539

    Article  Google Scholar 

  39. Wolfgang RB, Podilchuk CI, Delp EJ (1999) Perceptual watermarks for digital images and video. In: Proceedings of the IEEE, vol 7, pp 1108–1126

    Google Scholar 

  40. Swanson MD, Zhu B, Tewfik AH (1996) Transparent robust image watermarking. In: Proceedings of the international conference on image processing, Lausannae, Switzerland, pp 211–214

    Google Scholar 

  41. Jahne B (2002) Digital image processing, 5th edn. Springer 1991 revised and extended edition, New York

    Google Scholar 

  42. Gonzalez RC, Woods RE, Eddins SL (2009) Digital image processing using MATLAB, 2nd edn. Gatesmark Publishing, Knoxville

    Google Scholar 

  43. Shih FY (2008) Digital watermarking and steganography: fundamentals and techniques. CRC Press, Boca Raton

    Book  Google Scholar 

  44. Kundur D, Hatzinakos D (1997) A robust digital image watermarking technique using wavelet based fusion. In Proceedings of the international conference on image processing, (ICIP) vol 1, pp 544–547

    Google Scholar 

  45. Wen-Jan C, Chin-Chen C, Hoang NTL (2010) High payload steganography mechanism using hybrid edge detector. Expert Syst Appl, Elsevier 37:3292–3301

    Article  Google Scholar 

  46. Mashallah AD, Sajad N, Seyed EA (2013) A new image steganography method based on pixel neighbors and 6 most significant bit (MSB) compare. ACSIJ Adv Comput Sci, 2(5), No. 6, Nov 2013, ISSN: 2322–5157

    Google Scholar 

  47. Marghny HM, Naziha MA, Mohamed AB (2012), Data hiding technique based on LSB matching towards high imperceptibility. MIS Review National Chengchi University and Airiti Press Inc., vol 18, No 1, pp 57–69

    Google Scholar 

  48. Kuo WC, Chang JC, Wang CC (2011) Data hiding method with high embedding capacity character. Int J Image Process 6:310–317

    Google Scholar 

  49. Sun W, Zhe-Ming L, Yu-Chun W, Fa-Xin Y, Rong-Jun S (2013) High performance reversible data hiding for block truncation coding compressed images. SIViP, Springer 7:297–306. doi:10.1007/s11760-011-0238-4

    Article  Google Scholar 

  50. Ou D, Sun W (2015) High payload image steganography with minimum distortion based on absolute moment block truncation coding. Multimed Tools Appl, Springer 74:9117–9139. doi:10.1007/s11042-014-2059-2

    Article  Google Scholar 

  51. Ying-Hsuan H, Ching-Chun C, Yi-Hui C (2015) Hybrid secret hiding schemes based on absolute moment block truncation coding. Multimed Tools Appl, Springer. doi:10.1007/s11042-015-3208-y

    Google Scholar 

  52. Jain AK (2013) Fundamentals of digital image processing, I edn. Prentice-Hall, Upper Saddle River

    MATH  Google Scholar 

  53. Shabir AP, Javaid AS, Bhat GM (2012) On the realization of a secure, high capacity data embedding technique using joint top-down and down-top embedding approach. Elixir Comput Sci Eng 49:10141–10146

    Google Scholar 

  54. Shabir AP, Javaid AS, Bhat GM (2012) High capacity data embedding using joint intermediate significant bit and least significant technique. Int J Inf Eng Appl 2(11):1–11

    Google Scholar 

  55. Shabir AP, Javaid AS, Bhat GM (2013) On the realization of a spatial domain data hiding technique based on intermediate significant bit plane embedding (ISBPE) and post embedding pixel adjustment (PEPA). In: Proceedings of IEEE international conference on multimedia signal processing and communication technologies (IMPACT’2013) (AMU, Aligargh, 23–25 Nov 2013) pp 51–55

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. A. Parah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Parah, S.A., Sheikh, J.A., Bhat, G.M. (2017). StegNmark: A Joint Stego-Watermark Approach for Early Tamper Detection. In: Dey, N., Santhi, V. (eds) Intelligent Techniques in Signal Processing for Multimedia Security. Studies in Computational Intelligence, vol 660. Springer, Cham. https://doi.org/10.1007/978-3-319-44790-2_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44790-2_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44789-6

  • Online ISBN: 978-3-319-44790-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics