scispace - formally typeset
Search or ask a question
Author

Mohiul Islam

Bio: Mohiul Islam is an academic researcher from National Institute of Technology, Silchar. The author has contributed to research in topics: Digital watermarking & Robustness (computer science). The author has an hindex of 4, co-authored 9 publications receiving 56 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: Comparative analysis suggests that the proposed sub-band provides improved performance over some benchmark methods in most of the cases, whereas variation of robustness performance on different sub-bands depend on the type of attacks.
Abstract: In this paper, a robust image watermarking system in lifting wavelet transform domain using different sub-bands has been proposed. SVM classifier is used during watermark extraction to obtain improved robustness under diverse attack conditions. In this work, a detailed analysis of imperceptibility and robustness performance with the use of different sub-bands has been presented. The performance on different sub-band has been analyzed so as to maximize the robustness against different attacks keeping imperceptibility at adequate level. Robustness is observed against various attacks such as noising attacks, denoising attacks, image processing attacks, lossy compression attacks and geometric attacks. It is seen that high-frequency sub-band provides better invisibility, whereas variation of robustness performance on different sub-bands depend on the type of attacks. It is observed from the performance analysis that all the attacks do not have exactly same effect on the frequency content of the image. For instance, noising attack affects every frequency component of the image almost equally, whereas the embedding in high-frequency band makes the system fragile to lossy compression attack. The algorithm is tested on a large image database to observe the variation in the performance of the system. Comparative analysis suggests that the proposed sub-band provides improved performance over some benchmark methods in most of the cases.

46 citations

Journal ArticleDOI
TL;DR: Experimental results suggest that the proposed watermarking scheme provides significant improvement in terms of robustness and security of the watermark, and the subjective analysis suggests that proposed scheme provides improved performance over some of the recent existing techniques.
Abstract: With the advent of technology, digital image watermarking turns to be an effective technique to protect digital images from illegal usages and manipulation. In digital image watermarking, one of the major challenges is to provide robustness against geometrical attack maintaining adequate level of imperceptibility and security. In this work, a robust digital image watermarking scheme is proposed based on the combination of lifting wavelet transform(LWT) and singular value decomposition(SVD). To achieve better correlation between the extracted and original watermark, SVM-based binary classification approach is integrated in watermark extraction. In the proposed technique, geometric distortion correction based approach is incorporated with SVM based binary watermark detection to achieve improved robustness against de-synchronization attack. The 3-level LWT is performed on the cover image where horizontal (HL) sub-band is chosen for binary watermark insertion. The training and testing patterns are formed using an optimized set of features along with the singular values of corresponding blocks. In case of de-synchronization attacks, geometrical distortion correction is required before performing watermark extraction. In the detection process, the geometric distortion parameters of the attacked watermarked image are estimated by the geometric correction method. This algorithm provides high robustness against both the geometrical and non-geometrical attacks. It has been observed that the algorithm gives average imperceptibility of ~42.27 dB with the watermark capacity of 512 bits. Experimental results suggest that the proposed watermarking scheme provides significant improvement in terms of robustness and security of the watermark. The subjective analysis also suggests that proposed scheme provides improved performance over some of the recent existing techniques.

34 citations

Journal ArticleDOI
TL;DR: In this article, a detailed study of the existing literature on hashing-based image authentication techniques is presented, which highlights the merits and demerits associated with various state-of-the-art techniques.
Abstract: In the recent digitization era, image hashing is a key technology, including image recognition, authentication and manipulation detection, among many multimedia security applications. The primary challenge in hashing schemes is to extract its robust feature. For a better understanding and design of a robust image hashing algorithm, it is very crucial to look into few important parameters like discrimination, robustness, reliability, etc. This paper reflects a detailed study of the existing literature on hashing-based image authentication techniques. This work provides a systematic overview and highlights the merits and demerits associated with various state-of-the-art techniques. In particular, the basic features and categories of image authentication techniques based on hashing are explored along with their properties. Moreover, different performance measures such as output metrices, receiver operating characteristics (ROC) parameters, execution time, etc., have been discussed in this work. The paper also compares the performances of various existing algorithms related to different content preserving operations on diverse data sets. This paper summarizes all the techniques and provides the most optimum solutions in regard to image hashing techniques based on different parameters.

9 citations

Journal ArticleDOI
TL;DR: In this paper , a convolutional stacked denoising autoencoder (CSDAE) is utilized for producing hash codes that are robust against different content preserving operations (CPOs).
Abstract: With the advancement of technology, it has become easier to modify or tamper with digital data effortlessly. In recent times, the image hashing algorithm has gained popularity for image authentication applications. In this paper, a convolutional stacked denoising autoencoder (CSDAE) is utilized for producing hash codes that are robust against different content preserving operations (CPOs). The CSDAE algorithm comprises mapping high-dimensional input data into hash codes while maintaining their semantic similarities. This implies that the images having similar content should have similar hash codes. To demonstrate the effectiveness of the model, the correlation between hash codes of semantically similar images has been evaluated. Subsequently, tampered localization is done by comparing the decoder output of the manipulated image with the hash of the actual image. Then, the localization ability of the model was measured by computing the f 1 scores between the predicted region and the original tampered region. Based on the comparative performance and receiver-operating characteristics (ROC) curve, we may conclude that the proposed hashing proposed algorithm provides improved performance compared to various state-of-the-art techniques.

7 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A thorough review of existing types of image steganography and the recent contributions in each category in multiple modalities including general operation, requirements, different aspects, different types and their performance evaluations is provided.

253 citations

Journal ArticleDOI
TL;DR: Experimental results show that the proposed method is robust to the linear and nonlinear attacks and the transparency of the watermarked images has been protected.
Abstract: In this paper, a novel robust color image watermarking method based on Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) is proposed. In this method, RGB cover image is divided into red, green and blue components. DCT and DWT are applied to each color components. Grayscale watermark image is scrambled by using Arnold transform. DCT is performed to the scrambled watermark image. Transformed watermark image is then divided into equal smaller parts. DCT coefficients of each watermark parts are embedded into four DWT bands of the color components of the cover image. The robustness of the proposed color image watermarking has been demonstrated by applying various image processing operations such as rotating, resizing, filtering, jpeg compression, and noise adding to the watermarked images. Experimental results show that the proposed method is robust to the linear and nonlinear attacks and the transparency of the watermarked images has been protected.

98 citations

Journal ArticleDOI
TL;DR: A reliable digital watermarking technique that provides high imperceptibility and robustness for copyright protection using an optimal discrete cosine transform (DCT) psychovisual threshold and is tested under several signal processing and geometric attacks.
Abstract: This paper presents a reliable digital watermarking technique that provides high imperceptibility and robustness for copyright protection using an optimal discrete cosine transform (DCT) psychovisual threshold. An embedding process in this watermarking technique utilizes certain frequency regions of DCT, such that insertion of watermark bits causes the least image distortion. Thus, the optimal psychovisual threshold is determined to embed the watermark in the host image for the best image quality. During the insertion of watermark bits into the certain frequencies of the image, watermark bits are not directly inserted into the frequency coefficient; rather, the certain coefficients are modified based on some rules to construct the watermarked image. The embedding frequencies are determined by using modified entropy finding large redundant areas. Furthermore, the watermark is scrambled before embedding to provide an additional security. In order to verify the proposed technique, our technique is tested under several signal processing and geometric attacks. The experimental results show that our technique achieves higher invisibility and robustness than the existing schemes. The watermark extraction produces high image quality after different types of attacks.

94 citations

Journal ArticleDOI
TL;DR: Comparative analysis suggests that the proposed sub-band provides improved performance over some benchmark methods in most of the cases, whereas variation of robustness performance on different sub-bands depend on the type of attacks.
Abstract: In this paper, a robust image watermarking system in lifting wavelet transform domain using different sub-bands has been proposed. SVM classifier is used during watermark extraction to obtain improved robustness under diverse attack conditions. In this work, a detailed analysis of imperceptibility and robustness performance with the use of different sub-bands has been presented. The performance on different sub-band has been analyzed so as to maximize the robustness against different attacks keeping imperceptibility at adequate level. Robustness is observed against various attacks such as noising attacks, denoising attacks, image processing attacks, lossy compression attacks and geometric attacks. It is seen that high-frequency sub-band provides better invisibility, whereas variation of robustness performance on different sub-bands depend on the type of attacks. It is observed from the performance analysis that all the attacks do not have exactly same effect on the frequency content of the image. For instance, noising attack affects every frequency component of the image almost equally, whereas the embedding in high-frequency band makes the system fragile to lossy compression attack. The algorithm is tested on a large image database to observe the variation in the performance of the system. Comparative analysis suggests that the proposed sub-band provides improved performance over some benchmark methods in most of the cases.

46 citations

Journal ArticleDOI
TL;DR: Soft computing based watermarking approaches providing robustness, imperceptibility and good embedding capacity are compared systematically and major issues and potential solutions for soft computing-basedWatermarking are discussed to encourage further research in this area.
Abstract: Image watermarking techniques are used to provide copyright protection and verify ownership of media/entities. This technique refers to the concept of embedding of secret data/information of an owner in a given media/entity for determining any ownership conflicts that can arise. Many watermarking approaches have been offered by various authors in the last few years. However, there are not enough studies and comparisons of watermarking techniques in soft computing environments. Nowadays, soft computing techniques are used to improve the performance of watermarking algorithms. This paper surveys soft computing-based image watermarking for several applications. We first elaborate on novel applications, watermark characteristics and different kinds of watermarking systems. Then, soft computing based watermarking approaches providing robustness, imperceptibility and good embedding capacity are compared systematically. Furthermore, major issues and potential solutions for soft computing-based watermarking are also discussed to encourage further research in this area. Thus, this survey paper will be helpful for researchers to implement an optimized watermarking scheme for several applications.

40 citations