Abstract
The exponential advancement in the fields of computer networks and multimedia signal processing has resulted in easy availability of digital multimedia content over the internet nowadays. However, this advancement has given rise to many challenges in terms of information security and content authentication that need to be taken care of. A novel technique based on combination of Steganography and Fragile Watermarking called as StegNmark for content authentication utilizing the concept of early tamper detection has been proposed in this chapter. StegNmark is a spatial-domain data hiding technique which is capable of early tamper detection of a given stego-image. The early detection could be quite useful in situations where (data extraction) time factor plays a critical role like data extraction indicating a warfare plan to attack the enemy. This is achieved by embedding a fragile watermark of about 1 % of total payload using bit interleaving in the cover medium. The comparatively lower payload watermark (compared to secret data embedded in the StegNmark) is first extracted for authentication purpose. If the watermark detected is same as that used at the transmitter, then only secret data is extracted from the stegomarked medium. Experimental results reveal that besides providing high-quality stego-images the proposed system is capable of saving appreciable amount of extraction time due to early tamper detection.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Chamlawi R, Khan A, Usman I (2010) Authentication and recovery of images using multiple watermarks. Comput Electr Eng 36:578–584
Elshoura SM, Megherbi DB (2012) A secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments. Signal Process: Image Commun. doi:10.1016/j.image.2012.12
Chang C, Chuang J (2002) An image intellectual property protection scheme for gray level images using visual secret sharing strategy. Pattern Recognit Lett 23:931–941
Dey N, Samanta S, Yang XS, Das A, Chaudhuri SS (2013) Optimisation of scaling factors in electrocardiogram signal watermarking using cuckoo search. Int J Bio-Inspired Comput 5(5):315–326
Lou DC, Liu JL (2002) Steganographic method for secure communications. Comput Secur 21:449–460
Wu M, Liu B (2004) Data hiding in binary image for authentication and annotation. IEEE Trans Multimed 6:528–538
Shabir AP, Javaid AS, Bhat GM (2015) Hiding in encrypted images: a three tier security data hiding system. Multidimens Syst Signal Process, Springer. doi:10.1007/s11045-015-0358-z
Cox I, Miller M, Bloom J (2001) Digital watermarking: principles and practice. Morgan Kaufman, Los Altos
Fan L, Gao T, Cao Y (2012) Improving the embedding efficiency of weight matrix-based steganography for grayscale images. Comput Electr Eng. doi:10.1016/j.compeleceng.2012.06.014
Dey N, Samanta S, Chakraborty S, Das A, Chaudhuri SS, Suri JS (2014) Firefly algorithm for optimization of scaling factors during embedding of manifold medical information: an application in ophthalmology imaging. J Med Imaging Health Inform 4(3):384–394
Cox I, (2009), Information hiding, watermarking and steganography. Public Seminar, Intelligent Systems Research Centre (ISRC), University of Ulster at Magee, Northern Ireland
Hussain F (2012) A survey of digital watermarking techniques for multimedia data. MIT Int J Electron Commun Eng 2:37–43
Chakraborty S, Maji P, Pal AK, Biswas D, Dey N (2014) Reversible color image watermarking using trigonometric functions. In: 2014 International conference on electronic systems, signal processing and computing technologies (ICESC), IEEE, pp 105–110
Hartung F, Kutter M (1999) Multimedia watermarking techniques. Proc IEEE 87(7):1079–1107
Shabir AP, Javaid AS, Bhat GM (2014) Data hiding in scrambled images: a new double layer security data hiding technique. Comput Electr Eng Elsevier 40(1):70–82
Dey N, Maji P, Das P, Biswas S, Das A, Chaudhuri SS (2013) An edge based blind watermarking technique of medical images without devalorizing diagnostic parameters. In: 2013 International conference on advances in technology and engineering (ICATE), IEEE, pp 1–5
Chopra D, Gupta P, Sanjay G, Gupta A (2012) LSB based digital image watermarking for grayscale image. IOSR J Comput Eng 6:36–41
Chakraborty S, Samanta S, Biswas D, Dey N, Chaudhuri SS (2013) Particle swarm optimization based parameter optimization technique in medical information hiding. In: 2013 IEEE international conference on computational intelligence and computing research (ICCIC), IEEE, pp 1–6
Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3&4):313–336
Acharjee S, Chakraborty S, Samanta S, Azar AT, Hassanien AE, Dey N (2014) Highly secured multilayered motion vector watermarking. Advanced machine learning technologies and applications. Springer, Berlin, pp 121–134
Shabir AP, Javaid AS, Nazir AL, Bhat GM (2016) Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digit Signal Process, Elsevier. doi:10.1016/j.dsp.2016.02.005
Shabir AP, Javaid AS, Farhana A, Nazir AL, Bhat GM (2015) Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimed Tools Appl, Springer. doi:10.1007/s11042-015-3127-y
Schyndel RG, Tirkel A, Osborne CF (1994) A digital watermark. In: Proceedings of IEEE international conference on image processing, (ICIP’1994), pp 86–90
Caronni G (1995) Assuring ownership rights for digital images. In: Proceedings of the reliable IT systems, (VIS‘95’), pp 251–263
Tanaka K, Nakamura Y, Matsui K (1990) Embedding secret information into a dithered multi-level image. In: IEEE Proceedings of the military communications conference’90, pp 216–220
Pitas I (1996) A method for signature casting on digital images. In: IEEE proceedings of the international conference on image processing, Lausanne, Switzerland, vol 3, pp 215–218
Wolfgang RB, Delp EJ (1996) A watermark for digital images. In: IEEE proceedings of the international conference on image processing, Lausanne, Switzerland, vol 3, pp 219–222
Bhat GM, Shabir AP, Javaid AS (2010) FPGA implementation of novel complex PN code generator based data scrambler and descrambler. Int J Sci Technol, Thailand 4(01):125–135
Shabir AP, Javaid AS, Mohiuddin GB (2012) High capacity data embedding using joint intermediate significant bit and least significant technique. Int J Inf Eng Appl 2(11), ISSN: 2224-5782(print) ISSN: 2225-0506 (online)
Wolfgang RB and Delp EJ (1999) Fragile watermarking using the VW2D watermark. In: Proceedings of electronic imaging, San Jose, CA, 25–27 Jan 1999, vol 3657, pp 204–213
Wu DC, Tsai WH (2003) A stegnographic method for images by pixel value differencing. Pattern Recognit Lett 24(9–10):1613–1626
Zang X, Wang S (2004) Vulnerability of pixel value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recognit Lett 25:331–339
Hamood AK, Jalab HA, Kasirun ZM, Zidain BB, Zadain AA (2010) On capacity and security of stegnographic approaches: an overview. J Appl Sci 10:1825–1833
Qi K, Zang DF, Xie D (2010) A high capacity stegnographic scheme for 3D point cloud models. Inf Technol J 9:4121–4421
Ahmad AL, Kahiah ML, Zaidain BB, Zaidain AA (2010) A novel embedding method to increase capacity of low bit encoding audio steganography technique using noise gate software algorithm. J Appl Sci 10:59–64
Shabir AP, Javaid AS, Ghulam MB (2015) A secure and efficient spatial domain data hiding technique based on pixel adjustment. Am J Eng Technol Res, US Library congress, (USA), 14(2):38–44, 2014
Parah SA, Sheikh JA, Bhat GM (2012) High capacity data embedding using joint intermediate significant bit and least significant technique. Int J Inf Eng Appl 2(11):1–12
Podilchuk C, Zeng W (1998) Image-adaptive watermarking using visual models. IEEE J Select Areas Commun 16:525–539
Wolfgang RB, Podilchuk CI, Delp EJ (1999) Perceptual watermarks for digital images and video. In: Proceedings of the IEEE, vol 7, pp 1108–1126
Swanson MD, Zhu B, Tewfik AH (1996) Transparent robust image watermarking. In: Proceedings of the international conference on image processing, Lausannae, Switzerland, pp 211–214
Jahne B (2002) Digital image processing, 5th edn. Springer 1991 revised and extended edition, New York
Gonzalez RC, Woods RE, Eddins SL (2009) Digital image processing using MATLAB, 2nd edn. Gatesmark Publishing, Knoxville
Shih FY (2008) Digital watermarking and steganography: fundamentals and techniques. CRC Press, Boca Raton
Kundur D, Hatzinakos D (1997) A robust digital image watermarking technique using wavelet based fusion. In Proceedings of the international conference on image processing, (ICIP) vol 1, pp 544–547
Wen-Jan C, Chin-Chen C, Hoang NTL (2010) High payload steganography mechanism using hybrid edge detector. Expert Syst Appl, Elsevier 37:3292–3301
Mashallah AD, Sajad N, Seyed EA (2013) A new image steganography method based on pixel neighbors and 6 most significant bit (MSB) compare. ACSIJ Adv Comput Sci, 2(5), No. 6, Nov 2013, ISSN: 2322–5157
Marghny HM, Naziha MA, Mohamed AB (2012), Data hiding technique based on LSB matching towards high imperceptibility. MIS Review National Chengchi University and Airiti Press Inc., vol 18, No 1, pp 57–69
Kuo WC, Chang JC, Wang CC (2011) Data hiding method with high embedding capacity character. Int J Image Process 6:310–317
Sun W, Zhe-Ming L, Yu-Chun W, Fa-Xin Y, Rong-Jun S (2013) High performance reversible data hiding for block truncation coding compressed images. SIViP, Springer 7:297–306. doi:10.1007/s11760-011-0238-4
Ou D, Sun W (2015) High payload image steganography with minimum distortion based on absolute moment block truncation coding. Multimed Tools Appl, Springer 74:9117–9139. doi:10.1007/s11042-014-2059-2
Ying-Hsuan H, Ching-Chun C, Yi-Hui C (2015) Hybrid secret hiding schemes based on absolute moment block truncation coding. Multimed Tools Appl, Springer. doi:10.1007/s11042-015-3208-y
Jain AK (2013) Fundamentals of digital image processing, I edn. Prentice-Hall, Upper Saddle River
Shabir AP, Javaid AS, Bhat GM (2012) On the realization of a secure, high capacity data embedding technique using joint top-down and down-top embedding approach. Elixir Comput Sci Eng 49:10141–10146
Shabir AP, Javaid AS, Bhat GM (2012) High capacity data embedding using joint intermediate significant bit and least significant technique. Int J Inf Eng Appl 2(11):1–11
Shabir AP, Javaid AS, Bhat GM (2013) On the realization of a spatial domain data hiding technique based on intermediate significant bit plane embedding (ISBPE) and post embedding pixel adjustment (PEPA). In: Proceedings of IEEE international conference on multimedia signal processing and communication technologies (IMPACT’2013) (AMU, Aligargh, 23–25 Nov 2013) pp 51–55
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Parah, S.A., Sheikh, J.A., Bhat, G.M. (2017). StegNmark: A Joint Stego-Watermark Approach for Early Tamper Detection. In: Dey, N., Santhi, V. (eds) Intelligent Techniques in Signal Processing for Multimedia Security. Studies in Computational Intelligence, vol 660. Springer, Cham. https://doi.org/10.1007/978-3-319-44790-2_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-44790-2_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-44789-6
Online ISBN: 978-3-319-44790-2
eBook Packages: EngineeringEngineering (R0)