Visual attention model based dual watermarking for simultaneous image copyright protection and authentication
- PDF / 5,672,268 Bytes
- 29 Pages / 439.37 x 666.142 pts Page_size
- 14 Downloads / 237 Views
Visual attention model based dual watermarking for simultaneous image copyright protection and authentication Subhadeep Koley 1 Received: 13 January 2020 / Revised: 30 July 2020 / Accepted: 16 September 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract
In this paper, a visual attention model based dual watermarking scheme has been proposed for simultaneous image copyright protection and authentication. The suggested method simultaneously embeds two watermarks inside the host image. First of all, the robust watermark is embedded in the most visually salient region by Hessenberg factorization technique, which has proven to give better results in terms of imperceptibility and robustness. Subsequently, the second watermark acts as a fragile watermark for the purpose of tamper detection and localization. The fragile watermark is infused inside the image via fragile 8 Bit Plane Slicing, as we require for the watermark to be highly responsive to majority of geometric, and non-geometric impairments. The proposed scheme achieves an average Peak Signal to Noise Ratio and Structural SIMilarity Index of 46.88 dB and 0.9897 respectively. Experimental results depict that the projected scheme is extremely robust against most kinds of geometric, signal-processing, and hybrid attacks with an average Normalized Cross Correlation of 0.9401. Moreover, due to the incorporation of the fragile watermark, it can detect and localize tampering of an image with extreme accuracy. Keywords Dual watermark . Hessenberg factorization . Multimedia security . Copyright protection . Tamper detection . Tamper localization
1 Introduction Over the past two decades, the seamless blooming of internet, and wireless handheld devices has established the need for implicating information protection scheme for digital information [36]. Digital Watermarking has proven to be an effective measure to protect digital information
* Subhadeep Koley [email protected]
1
Department of ECE, RCC Institute of Information Technology, Canal South Road, Kolkata, WB 700015, India
Multimedia Tools and Applications
from illegal copying, and intentional or unintentional tampering [36]. Digital watermarking deals with the task of embedding a digital signature called a ‘Watermark’ into a digital media, which can be extracted later for content authentication and tamper detection purposes. In general, digital watermarking can be broadly classified into three domains namely, Spatial Domain, Transform Domain, and Mixed or Hybrid Domain [36]. An extensive survey of recent digital image watermarking techniques can be found in [45]. The fragile watermarking framework, generally implemented in spatial domain, provides minimal complexity and high payload capacity but is less resilient to common signal processing attacks like compression [38]. Robust watermarking schemes, which are typically realized in the transform domain, focuses on hiding the secret watermark in a cover medium so that it may be recovered even if the cover is subjected to s
Data Loading...