An intelligent and blind dual color image watermarking for authentication and copyright protection
- PDF / 8,351,961 Bytes
- 32 Pages / 595.224 x 790.955 pts Page_size
- 16 Downloads / 220 Views
An intelligent and blind dual color image watermarking for authentication and copyright protection Sajjad Bagheri Baba Ahmadi1 · Gongxuan Zhang1 · Mahdi Rabbani1 · Lynda Boukela1 · Hamed Jelodar1
© Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract In this paper, a blind dual watermarking scheme for color images is proposed by embedding an invisible robust watermark to protect copyright, as well as a fragile watermark is embedded for image authentication. For the purpose of copyright protection, the robust watermark is embedded into the blue channel of RGB color space based on DWT, HVS and SVD domains using a specialized PSO optimization to balance the trade-off between robustness and imperceptibility. In addition, the robust watermarking capacity in SVD is doubled by inserting two robust watermark bits into each selected blocks and the robust watermark can be extracted blindly. For the purpose of authentication, a fragile watermark is embedded into all channels of RGB color space using a new way to manipulate the diagonal singular values. The authenticity of a suspected image can be verified in the absence of original watermark and host images. The combination of robust and fragile watermarking in the proposed scheme provides a suitable mechanism to protect valuable and original color images. According to the experimental and comparative results, the proposed scheme provides superior outcomes with high robustness, imperceptibility, and capacity along with a good accuracy rate in locating the tampered area of an image. Keywords Digital image watermarking · Discrete wavelet transform (DWT) · Human visual system (HVS) · Singular values decomposition (SVD) · Particle swarm optimization (PSO)
1 Introduction In the digital world, there are many available digital tools even for unprofessional users to manipulate digital images. This increased the issues and concerns about misusing digital content in various applications such as: copyright Sajjad Bagheri Baba Ahmadi
[email protected] Gongxuan Zhang
[email protected] Mahdi Rabbani [email protected] Lynda Boukela [email protected] Hamed Jelodar [email protected] 1
Department of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, 210094, People’s Republic of China
protection, fingerprinting, authentication, information security in distributed and cloud environments, electronic health, etc. In fact, sharing, storage or transmission of sensitive digital content over unsecured networks requires a high level of privacy and security. In order to prove image authentication and to protect the copy right or intellectual property against malicious attacks , robust and fragile image watermarking systems are proposed. On the one hand in robust watermarking systems, an invisible watermark signal such as: logos or ownership identifications, is embedded into a cover image such that the watermark bits are spread throughout the cover image; where impossible to be tampered even after attacks, and
Data Loading...