scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

A Novel Approach for Securing Forensic Documents Using Rectangular Region-of-Interest (RROI)

19 Feb 2011-pp 198-201
TL;DR: DCT and DWT based transform domain watermarking techniques were implemented on RROI and the performance of the two were compared on the basis of PSNR to check the robustness of the watermark.
Abstract: Forensic watermarking is a tool for secure transmission of forensic questioned documents. The reported cases of fraudulent manipulation of forensic case documents are basic motivation behind the application proposed in this paper. Earlier approaches in forensic watermarking embed watermark onto whole document which is highly susceptible to attack. We have proposed a RROI based forensic watermarking of case documents which basically represents the rectangular region of a document (fingerprint/signature) that needs to be watermarked. In this, DCT and DWT based transform domain watermarking techniques were implemented on RROI and the performance of the two were compared on the basis of PSNR. Moreover, some attacks like scaling and addition of noise have been performed to check the robustness of the watermark.
Citations
More filters
Book ChapterDOI
01 Jan 2019
TL;DR: In this chapter, a reversible data hiding algorithm is proposed which also is capable of holding a large chunk of data without affecting the cover media and is developed on the spatial domain.
Abstract: Electronic health records (EHR) contain patients' medical as well as personal details. With the increased use of digital media, these data are stored and transferred through the electronic media all over the world. This makes it vulnerable to unauthorized people. Digital image watermarking can be a useful process of protecting these data from attacker but causes severe and unrecoverable damage to cover media. In the case of highly sensitive images like medical images, this might creates a problem during further diagnosis. In this chapter, a reversible data hiding algorithm is proposed which also is capable of holding a large chunk of data without affecting the cover media. The main cover image is first reconstructed and hidden behind a bigger media and then the extra pixels are used to hide encrypted forms of EHR data along with an authentication signature. As EHR data and the digital signature is passed through various encryption stages while encoding, it is made more secure. The algorithm is developed on the spatial domain adding some cautious measures which made it fragile as well.

4 citations

01 Jan 2012
TL;DR: I acknowledge and express my deep thanks to my dear family and beloved friends who were always with me during the hard and the good times, I am very grateful and I deeply appreciate your support, encouragement and everything you have done for me.
Abstract: ii COMMITTEE DECISION iii DEDICATION To my Father's soul, who was my source of success and inspiration, I'm proud of being his son. To my beloved Mother, who supported me with endless silent prayers, and encouragement. To my Wife, who fills my life with all meanings of kindness, love, peace, and empathy. To the candle who enlighten my life, to my daughter JOOD. To those who gave me special kind of feeling, my brothers, and sisters. ACKNOWLEDGMENT First of all and always I thank almighty " Allah " , who helped me with strength, faith and capability to accomplish my thesis in this way. Secondly, I owe a lot to my acknowledge and express my deep thanks to my dear family and beloved friends who were always with me during the hard and the good times, I am very grateful and I deeply appreciate your support, encouragement and everything you have done for me.

1 citations

Book ChapterDOI
09 Sep 2022
TL;DR: In this article , a reversible data hiding algorithm is proposed which also is capable of holding a large chunk of data without affecting the cover media, where the main cover image is first reconstructed and hidden behind a bigger media and then the extra pixels are used to hide encrypted forms of EHR data along with an authentication signature.
Abstract: Electronic health records (EHR) contain patients' medical as well as personal details. With the increased use of digital media, these data are stored and transferred through the electronic media all over the world. This makes it vulnerable to unauthorized people. Digital image watermarking can be a useful process of protecting these data from attacker but causes severe and unrecoverable damage to cover media. In the case of highly sensitive images like medical images, this might creates a problem during further diagnosis. In this chapter, a reversible data hiding algorithm is proposed which also is capable of holding a large chunk of data without affecting the cover media. The main cover image is first reconstructed and hidden behind a bigger media and then the extra pixels are used to hide encrypted forms of EHR data along with an authentication signature. As EHR data and the digital signature is passed through various encryption stages while encoding, it is made more secure. The algorithm is developed on the spatial domain adding some cautious measures which made it fragile as well.
Book ChapterDOI
03 Jun 2022
TL;DR: In this article , a reversible data hiding algorithm is proposed which also is capable of holding a large chunk of data without affecting the cover media, where the main cover image is first reconstructed and hidden behind a bigger media and then the extra pixels are used to hide encrypted forms of EHR data along with an authentication signature.
Abstract: Electronic health records (EHR) contain patients' medical as well as personal details. With the increased use of digital media, these data are stored and transferred through the electronic media all over the world. This makes it vulnerable to unauthorized people. Digital image watermarking can be a useful process of protecting these data from attacker but causes severe and unrecoverable damage to cover media. In the case of highly sensitive images like medical images, this might creates a problem during further diagnosis. In this chapter, a reversible data hiding algorithm is proposed which also is capable of holding a large chunk of data without affecting the cover media. The main cover image is first reconstructed and hidden behind a bigger media and then the extra pixels are used to hide encrypted forms of EHR data along with an authentication signature. As EHR data and the digital signature is passed through various encryption stages while encoding, it is made more secure. The algorithm is developed on the spatial domain adding some cautious measures which made it fragile as well.
References
More filters
Journal ArticleDOI
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Abstract: This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data. We advocate that a watermark should be constructed as an independent and identically distributed (i.i.d.) Gaussian random vector that is imperceptibly inserted in a spread-spectrum-like fashion into the perceptually most significant spectral components of the data. We argue that insertion of a watermark under this regime makes the watermark robust to signal processing operations (such as lossy compression, filtering, digital-analog and analog-digital conversion, requantization, etc.), and common geometric transformations (such as cropping, scaling, translation, and rotation) provided that the original image is available and that it can be successfully registered against the transformed watermarked image. In these cases, the watermark detector unambiguously identifies the owner. Further, the use of Gaussian noise, ensures strong resilience to multiple-document, or collusional, attacks. Experimental results are provided to support these claims, along with an exposition of pending open problems.

6,194 citations


"A Novel Approach for Securing Foren..." refers background in this paper

  • ...The main purpose of forensic watermarking [3] [4] [5] is to protect the distribution of case documents....

    [...]

Journal ArticleDOI
TL;DR: This paper proposes a wavelet-tree-based blind watermarking scheme for copyright protection that embeds each watermark bit in perceptually important frequency bands, which renders the mark more resistant to frequency based attacks.
Abstract: This paper proposes a wavelet-tree-based blind watermarking scheme for copyright protection. The wavelet coefficients of the host image are grouped into so-called super trees. The watermark is embedded by quantizing super trees. The trees are so quantized that they exhibit a large enough statistical difference, which will later be used for watermark extraction. Each watermark bit is embedded in perceptually important frequency bands, which renders the mark more resistant to frequency based attacks. Also, the watermark is spread throughout large spatial regions. This yields more robustness against time domain geometric attacks. Examples of various attacks will be given to demonstrate the robustness of the proposed technique.

329 citations


"A Novel Approach for Securing Foren..." refers methods in this paper

  • ...[6] presented an asymmetrical watermarking method for copyright protection that satisfies the zero knowledge principle with the intention to overcome the weaknesses of contemporary symmetric watermarking methods....

    [...]

  • ...For securing these evidences from manipulations we have proposed a novel application of RROI based watermarking so as to provide enhanced security [6] to Forensic case documents....

    [...]

Proceedings ArticleDOI
TL;DR: This paper reviews proposed attacks on spread spectrum watermarks are systematically, and modifications for watermark embedding and extraction are presented to avoid and counterattack these attacks.
Abstract: Most watermarking methods for images and video have been proposed are based on ideas from spread spectrum radio communications, namely additive embedding of a (signal adaptive or non-adaptive) pseudo-noise watermark pattern, and watermark recovery by correlation. Even methods that are not presented as spread spectrum methods often build on these principles. Recently, some skepticism about the robustness of spread spectrum watermarks has arisen, specifically with the general availability of watermark attack software which claim to render most watermarks undetectable. In fact, spread spectrum watermarks and watermark detectors in their simplest form are vulnerable to a variety of attacks. However, with appropriate modifications to the embedding and extraction methods, spread spectrum methods can be made much more resistant against such attacks. In this paper, we review proposed attacks on spread spectrum watermarks are systematically. Further, modifications for watermark embedding and extraction are presented to avoid and counterattack these attacks. Important ingredients are, for example, to adapt the power spectrum of the watermark to the host signal power spectrum, and to employ an intelligent watermark detector with a block-wise multi-dimensional sliding correlator, which can recover the watermark even in the presence of geometric attacks.

298 citations


"A Novel Approach for Securing Foren..." refers methods in this paper

  • ...ATTACKS ON WATERMARKED DOCUMENT We performed several operations like noise addition, scaling, cropping on the watermarked document to check its ability to resist different types of attacks [11]....

    [...]

Journal ArticleDOI
TL;DR: A novel method for embedding and detecting a chaotic watermark in the digital spatial image domain is introduced, based on segmenting the image and locating regions that are robust to several image manipulations.
Abstract: We introduce a novel method for embedding and detecting a chaotic watermark in the digital spatial image domain, based on segmenting the image and locating regions that are robust to several image manipulations. The robustness of the method is confirmed by experimental results that display the immunity of the embedded watermark to several kinds of attacks, such as compression, filtering, scaling, cropping, and rotation.

129 citations


"A Novel Approach for Securing Foren..." refers background in this paper

  • ...The main purpose of forensic watermarking [3] [4] [5] is to protect the distribution of case documents....

    [...]

Journal ArticleDOI
TL;DR: A novel copyright protection scheme for digital images based on visual cryptography and statistics is proposed that can register multiple secret images without altering the host image and can identify the rightful ownership without resorting to the original image.
Abstract: A novel copyright protection scheme for digital images based on visual cryptography and statistics is proposed. The proposed method employs sampling distribution of means and visual cryptography to achieve the requirements of robustness and security. Our method can register multiple secret images without altering the host image and can identify the rightful ownership without resorting to the original image. Moreover, the proposed method enables the secret images to be of any size regardless of the size of the host image. Finally, experimental re- sults show that the proposed scheme can resist several common attacks. © 2005 Society of Photo-Optical Instrumentation Engineers.

86 citations


"A Novel Approach for Securing Foren..." refers background in this paper

  • ...presented a digital watermarking technique and intended to solve some important issues in the digital world, such as copyright protection, copy protection, and content authentication through their extensive research [8]....

    [...]