scispace - formally typeset
Search or ask a question

Showing papers on "Digital watermarking published in 2022"



Journal ArticleDOI
TL;DR: In this article , a 3D medical watermarking algorithm based on wavelet transform is proposed, which employs the principal component analysis (PCA) transform to reduce the data dimension, which can minimize the error between extracted components and the original data in the mean square sense.
Abstract: In a telemedicine diagnosis system, the emergence of 3D imaging enables doctors to make clearer judgments, and its accuracy also directly affects doctors’ diagnosis of the disease. In order to ensure the safe transmission and storage of medical data, a 3D medical watermarking algorithm based on wavelet transform is proposed in this paper. The proposed algorithm employs the principal component analysis (PCA) transform to reduce the data dimension, which can minimize the error between the extracted components and the original data in the mean square sense. Especially, this algorithm helps to create a bacterial foraging model based on particle swarm optimization (BF-PSO), by which the optimal wavelet coefficient is found for embedding and is used as the absolute feature of watermark embedding, thereby achieving the optimal balance between embedding capacity and imperceptibility. A series of experimental results from MATLAB software based on the standard MRI brain volume dataset demonstrate that the proposed algorithm has strong robustness and make the 3D model have small deformation after embedding the watermark.

167 citations


Journal ArticleDOI
TL;DR: In this paper , a two-stage reversible robust audio watermarking algorithm is proposed to protect medical audio data, which decomposes the medical audio into two independent embedding domains, embeds the robust watermark and the reversible watermark into the two domains respectively, and uses the Hurst exponent to find a suitable position for watermark embedding.
Abstract: The leakage of medical audio data in telemedicine seriously violates the privacy of patients. In order to avoid the leakage of patient information in telemedicine, a two-stage reversible robust audio watermarking algorithm is proposed to protect medical audio data. The scheme decomposes the medical audio into two independent embedding domains, embeds the robust watermark and the reversible watermark into the two domains respectively. In order to ensure the audio quality, the Hurst exponent is used to find a suitable position for watermark embedding. Due to the independence of the two embedding domains, the embedding of the second-stage reversible watermark will not affect the first-stage watermark, so the robustness of the first-stage watermark can be well maintained. In the second stage, the correlation between the sampling points in the medical audio is used to modify the hidden bits of the histogram to reduce the modification of the medical audio and reduce the distortion caused by reversible embedding. Simulation experiments show that this scheme has strong robustness against signal processing operations such as MP3 compression of 48 db, additive white Gaussian noise (AWGN) of 20 db, low-pass filtering, resampling, re-quantization and other attacks, and has good imperceptibility.

138 citations


Journal ArticleDOI
TL;DR: Experimental and analysis results demonstrate that the proposed concealed attack method has better imperceptibility and attack ability in comparison to the existing watermarking attack methods.
Abstract: While existing watermarking attack methods can disturb the correct extraction of watermark information, the visual quality of watermarked images will be greatly damaged. Therefore, a concealed attack based on generative adversarial network and perceptual losses for robust watermarking is proposed. First, the watermarked image is utilized as the input of generative networks, and its generating target (i.e. attacked watermarked image) is the original image. Inspired by the U-Net network, the generative networks consist of encoder-decoder architecture with skip connection, which can combine the low-level and high-level information to ensure the imperceptibility of the generated image. Next, to further improve the imperceptibility of the generated image, instead of the loss function based on MSE, a perceptual loss based on feature extraction is introduced. In addition, a discriminative network is also introduced to make the appearance and distribution of generated image similar to those of the original image. The addition of the discriminative network can remove watermark information effectively. Extensive experiments are conducted to verify the feasibility of the proposed concealed attack method. Experimental and analysis results demonstrate that the proposed concealed attack method has better imperceptibility and attack ability in comparison to the existing watermarking attack methods.

64 citations


Journal ArticleDOI
TL;DR: A comprehensive review on digital image watermarking methods that were published in recent years illustrating the conventional schemes in different domains can be found in this article , where the authors provide an overview of geometric invariant techniques and emerging watermark-based methods for novel medias, such as depth image based rendering (DIBR), high dynamic range (HDR), screen content images (SCIs), and point cloud model.

54 citations


Journal ArticleDOI
TL;DR: In this article , a counting-based secret sharing method was proposed to enhance image authentication by adjusting embedding the watermarking data over the images by innovative redistribution of shares to be embedded spread over all the images.

27 citations


Journal ArticleDOI
TL;DR: A new watermarking technique to add a code to digital images is presented: the method operates in the frequency domain embedding a pseudo-random sequence of real numbers in a selected set of DCT coefficient.
Abstract: Digital watermarking has been proposed as a viable solution to the need of copyright protection and authentication of multimedia data in a networked environment, since it makes possible to identify the author, owner, distributor or authorized consumer of a document. In this paper a new watermarking technique to add a code to digital images is presented: the method operates in the frequency domain embedding a pseudo-random sequence of real numbers in a selected set of DCT coefficient. And a new method for digital image watermarking which does not require the original image for watermark detection. The watermark is added in select coefficients with significant image energy in the transform domain in order to ensure non- erasability of the watermark. Advantages of the proposed method include: improved resistance to attacks on the watermark, implicit visual masking utilizing the time-frequency localization property of wavelet transform and a robust definition for the threshold which validates the watermark.. Experimental results demonstrate that this proposed technique is robust to most of the signal processing techniques and geometric distortions.

25 citations


Journal ArticleDOI
TL;DR: In this paper , a comprehensive study on watermarking using trending technologies, such as artificial intelligence, machine learning and deep learning, is presented, which briefly discusses the introduction of watermark, background information and the most interesting and utilized applications.

22 citations


Journal ArticleDOI
TL;DR: Wang et al. as mentioned in this paper proposed a robust reversible watermarking scheme in Encrypted Image with Secure Multi-party (RRWEI-SM) based on lightweight cryptography, where additive secret sharing and block-level scrambling are developed to generate the encrypted image.
Abstract: With the rapid development of network media, increasing research on reversible watermarking has focused on improving its robustness to resisting attacks during digital media transmission. There are some other reversible watermarking schemes that work in the encrypted domain for preserving the privacy of the cover image. The robustness of the watermarking and the privacy preserving of the cover image have become the key factors of reversible watermarking. However, there are few robust reversible watermarking schemes in the encrypted domain that could resist common attacks (such as JPEG compression, noise addition) and preserve privacy at the same time. In addition, the embedding capacity of a robust watermark and the efficiency of the encryption method must be considered. Recently, cloud computing technology has led to the rapid growth of network media, and many multimedia properties are owned by multiple parties, such as a film’s producer and multiple distributors. Multi-party watermarking has become an important demand for network media to protect all parties’ rights. In this paper, a Robust Reversible Watermarking scheme in Encrypted Image with Secure Multi-party (RRWEI-SM) based on lightweight cryptography is first proposed. Additive secret sharing and block-level scrambling are developed to generate the encrypted image. Then, the robust reversible watermarking based on significant bit Prediction Error Expansion (PEE) is performed by Secure Multi-party Computation (SMC). For applications with high robustness, a Modified RRWEI-SM is proposed by exploiting two-stage architecture. Furthermore, both the RRWEI-SM scheme and Modified RRWEI-SM scheme are separable and can be applied to multiparty copyright protection. The experimental results and theoretical analysis demonstrate here that the RRWEI-SM and the Modified RRWEI-SM are secure, robust and effective.

22 citations


Journal ArticleDOI
TL;DR: In this paper , a non-blind medical image watermarking scheme based on hybrid transform is propounded, which uses fingerprint of the patient as watermark for better authentication, identifying the original medical image and privacy of the patients.
Abstract: To protect the medical images integrity, digital watermark is embedded into the medical images. A non-blind medical image watermarking scheme based on hybrid transform is propounded. In this paper, fingerprint of the patient is used as watermark for better authentication, identifying the original medical image and privacy of the patients. In this scheme, lifting wavelet transform (LWT) and discrete wavelet transform (DWT) are utilized for amplifying the watermarking algorithm. The scaling and embedding factors are calculated adaptively with the help of Local Binary Pattern values of the host medical image to achieve better imperceptibility and robustness for medical images and fingerprint watermark, respectively. Two-level decomposition is done where for the first level LWT is utilized and for the second level decomposition DWT is utilized. At the extraction side, non-blind recovery of fingerprint watermark is performed which is similar to the embedding process. The propounded design is implemented on various medical images like Chest X-ray, CT scan and so on. The propounded design provides better imperceptibility and robustness with the combination of LWT-DWT. The result analysis proves that the proposed fingerprint watermarking scheme has attained best results in terms of robustness and authentication with different medical image attacks. Peak Signal to Noise Ratio and Normalized Correlation Coefficient metrics are used for evaluating the proposed scheme. Furthermore, superior results are obtained when compared to related medical image watermarking schemes.

22 citations


Journal ArticleDOI
TL;DR: In this paper , a discrete wavelet transform is applied to divide the medical image into four sub-bands and the watermark bits are then integrated by modulating the obtained mid-frequency coefficients.


Journal ArticleDOI
TL;DR: Wang et al. as discussed by the authors combined log-polar transform (LPT) and discrete cosine transform (DCT) for medical images, and realized the lossless embedding of patient information into medical images.
Abstract: Abstract In the information age, network security has gradually become a potentially huge problem, especially in the medical field, it is essential to ensure the accuracy and safety of images, and patient information needs to be included with minimal change. Combined log-polar transform (LPT) and discrete cosine transform (DCT), a novel robust watermarking algorithm for medical images, is proposed. It realized the lossless embedding of patient information into medical images. In the process of feature extraction and watermark embedding, the proposed algorithm reflects the characteristics of LPT, scale invariance and rotation invariance, and retains the advantages of DCT's ability to resist conventional attacks and robustness. As it adopts zero-watermarking embedding technology, it solves the defects caused by the traditional watermark embedding technology to modify the original image data and guaranteed the quality of medical images. The good experimental results show the effectiveness of this algorithm.

Journal ArticleDOI
TL;DR: This study introduces classification of digital watermarking schemes by their robustness towards various classes of attacks, and highlights the most promising solutions that further development could lead to schemes with better robustness compared to existing schemes.
Abstract: Digital watermarking is an important scientific direction located at the intersection of cybersecurity and multimedia processing. Digital watermarking is used for digital objects copyright protection and protection against forgery. The importance of those tasks is highlighted by the ongoing COVID-19 pandemic that lasts for more than a year and forced multiple industries to transit to online. The main digital watermarking application include active attackers whose goal is to destroy or damage watermarks. Thus, digital watermarking schemes must be robust to attacks. Despite of the large number of existing digital watermarking schemes, a comprehensive analysis of their robustness towards various attacks does not exist. Our study aims to fill this gap. In this article, latest years findings in digital watermarking are systematized. First of all, we review the most prominent distinctive features of watermarking schemes, attack types, and performance measures to facilitate navigation in digital image watermarking. Then, we introduce classification of digital watermarking schemes by their robustness towards various classes of attacks. We believe this classification could be useful for researchers who aim to choose a digital watermarking scheme for their application with a known set of attacks. Finally, we highlight the most promising solutions that further development could lead to schemes with better robustness compared to existing schemes.


Journal ArticleDOI
Achraf Daoui1, Hicham Karmouni1, Omar El Ogri1, Mhamed Sayyouri1, Hassan Qjidaa1 
Abstract: In this work, we first present a modified version of the traditional logistic chaotic map. The proposed version contains an additional parameter that is used to increase the security level of the proposed digital image copyright protection scheme. The latter merges two methods of image copyright protection, namely the image zero-watermarking and image encryption, which provides a high level of security when communicating images via the Internet. Next, we discuss the influence of geometric attacks on the efficiency of the proposed scheme, and then we introduce an efficient solution that can resist such attacks. The proposed solution involves the use of Sine Cosine Algorithm (SCA) with an appropriate algorithm suitable for the correction of geometric attacks (image translation, orientation and its combination) applied to the encrypted image. On the one hand, the simulation results show that the proposed scheme provides a high level of security and can resist various attacks (differential, common image processing, geometric, etc.). On the other hand, the conducted comparison in terms of robustness against geometric attacks clearly demonstrates the superiority of our scheme over recent image encryption ones.

Journal ArticleDOI
01 Mar 2022
TL;DR: In this article , a modified version of the traditional logistic chaotic map is presented, which merges two methods of image copyright protection, namely the image zero-watermarking and image encryption, which provides a high level of security when communicating images via the Internet.
Abstract: In this work, we first present a modified version of the traditional logistic chaotic map. The proposed version contains an additional parameter that is used to increase the security level of the proposed digital image copyright protection scheme. The latter merges two methods of image copyright protection, namely the image zero-watermarking and image encryption, which provides a high level of security when communicating images via the Internet. Next, we discuss the influence of geometric attacks on the efficiency of the proposed scheme, and then we introduce an efficient solution that can resist such attacks. The proposed solution involves the use of Sine Cosine Algorithm (SCA) with an appropriate algorithm suitable for the correction of geometric attacks (image translation, orientation and its combination) applied to the encrypted image. On the one hand, the simulation results show that the proposed scheme provides a high level of security and can resist various attacks (differential, common image processing, geometric, etc.). On the other hand, the conducted comparison in terms of robustness against geometric attacks clearly demonstrates the superiority of our scheme over recent image encryption ones.

Journal ArticleDOI
TL;DR: In this article , a discrete wavelet transform is applied to divide the medical image into four sub-bands and the watermark bits are then integrated by modulating the obtained mid-frequency coefficients.


Journal ArticleDOI
TL;DR: This work is the first to propose ownership protection on image captioning task and studies and proposes two different embedding schemes in the hidden memory state of a recurrent neural network to protect the image Captioning model.

Journal ArticleDOI
TL;DR: In this article , the authors proposed color image authentication based on blind fragile image watermarking for tamper detection and self-recovery named AuSR1, which divides each channel of the cover image into non-overlapping blocks with the size of 2 × 2 pixels.

Journal ArticleDOI
TL;DR: In this article , the authors proposed a region-based hybrid medical image watermarking (MIW) scheme to ensure the authenticity, authorization, integrity, and confidentiality of the medical images transmitted through a public network in IoMT.
Abstract: With the growth in Internet and digital technology, Internet of Medical Things (IoMT) and Telemedicine have become buzzwords in healthcare. A large number of medical images and information is shared through a public network in these applications. This paper proposes a region-based hybrid Medical Image Watermarking (MIW) scheme to ensure the authenticity, authorization, integrity, and confidentiality of the medical images transmitted through a public network in IoMT. In the proposed scheme, medical images are partitioned into Region of Interest (RoI) and Region of Non-Interest (RoNI). To ascertain integrity of RoI, tamper detection and recovery bits are embedded in RoI in the medical image. RoI is watermarked using adaptive Least Significant Bit (LSB) substitution with respect to the hiding capacity map for higher RoI imperceptibility and accuracy in tamper detection and recovery. Electronic Patient Record (EPR) is compressed using Huffman coding and encrypted using a pseudo-random key (secret key) to provide higher confidentiality and payload. QR code of hospital logo, Encrypted EPR, and RoI recovery bits are interleaved in RoNI using Discrete Wavelet Transform-Singular Value Decomposition (DWT-SVD) hybrid transforms to achieve a robust watermark. The proposed scheme is tested under various geometric and non-geometric attacks such as filtering, compression, rotation, salt and pepper noise and shearing. The evaluation results demonstrate that the proposed scheme has high imperceptibility, robustness, security, payload, tamper detection, and recovery accuracy under image processing attacks. Therefore, the proposed scheme can be used in the transmission of medical images and EPR in IoMT. Relevance of the proposed scheme is established by its superior performance in comparison to some of the popular existing schemes.

Journal ArticleDOI
TL;DR: Wang et al. as mentioned in this paper combined log-polar transform (LPT) and discrete cosine transform (DCT) for medical images, and realized the lossless embedding of patient information into medical images.
Abstract: Abstract In the information age, network security has gradually become a potentially huge problem, especially in the medical field, it is essential to ensure the accuracy and safety of images, and patient information needs to be included with minimal change. Combined log-polar transform (LPT) and discrete cosine transform (DCT), a novel robust watermarking algorithm for medical images, is proposed. It realized the lossless embedding of patient information into medical images. In the process of feature extraction and watermark embedding, the proposed algorithm reflects the characteristics of LPT, scale invariance and rotation invariance, and retains the advantages of DCT's ability to resist conventional attacks and robustness. As it adopts zero-watermarking embedding technology, it solves the defects caused by the traditional watermark embedding technology to modify the original image data and guaranteed the quality of medical images. The good experimental results show the effectiveness of this algorithm.

Journal ArticleDOI
TL;DR: A self-embedding watermark using a spiral block mapping for tamper detection and restoration of digital medical image has a potential to be manipulated by unauthorized persons due to advanced communication technology.
Abstract: —Digital medical image has a potential to be manipulated by unauthorized persons due to advanced communication technology. Verifying integrity and authenticity have become important issues on the medical image. This paper proposed a self-embedding watermark using a spiral block mapping for tamper detection and restoration. The block-based coding with the size of 3×3 was applied to perform self-embedding watermark with two authentication bits and seven recovery bits. The authentication bits are obtained from a set of condition between sub-block and block image, and the parity bits of each sub-block. The authentication bits and the recovery bits are embedded in the least significant bits using the proposed spiral block mapping. The recovery bits are embedded into different sub-blocks based on a spiral block mapping. The watermarked images were tested under various tampered images such as blurred image, unsharp-masking, copy-move, mosaic, noise, removal, and sharpening. The experimental results show that the scheme achieved a PSNR value of about 51.29 dB and a SSIM value of about 0.994 on the watermarked image. The scheme showed tamper localization with accuracy of 93.8%. In addition, the proposed scheme does not require external information to perform recovery bits. The proposed scheme was able to recover the tampered image with a PSNR value of 40.45 dB and a SSIM value of 0.994.


Journal ArticleDOI
TL;DR: Wang et al. as mentioned in this paper proposed a robust adaptive blind watermarking method to protect the copyright of color digital images, where the frequency domain characteristics of Slant transform are used to directly calculate the maximum energy coefficient of the pixel block, the maximum element of the coefficient matrix obtained after SLant transform in the spatial domain.

Journal ArticleDOI
TL;DR: This algorithm is based on the joint use of dual watermarking, nature-inspired optimization, and encryption schemes utilizing redundant-discrete wavelet transform (RDWT) and randomized-singular value decomposition (RSVD) to generate the final mark.
Abstract: With the growth and popularity of the utilization of medical images in smart healthcare, the security of these images using watermarks is one of the most recent research topics. This algorithm is based on the joint use of dual watermarking, nature-inspired optimization, and encryption schemes utilizing redundant-discrete wavelet transform (RDWT) and randomized-singular value decomposition (RSVD). The key idea of the proposed method is to embed system encoded media access control (MAC) address in patient's ID card image via discrete wavelet transform (DWT) to generate the final mark. Afterward, embed the generated watermark into computed tomography (CT) scan images of the COVID-19 patient and general images through employing the RDWT and RSVD. Further, we use a hybrid of particle swarm optimization (PSO) and Firefly optimization techniques to determine the optimal scaling factor for embedding purposes. After that, the watermarked CT scan image is encrypted using an encryption technique based on a nonlinear-chaotic map, random permutation, and singular value decomposition (SVD). Extensive evaluations establish the benefit of our proposed algorithm over the traditional schemes. The optimal robustness is more effective than the five traditional schemes at lower computational efficiency. IEEE

Journal ArticleDOI
TL;DR: A blind watermarking approach combining a Non-Subsampled Shearlet Transform and Singular Value Decomposition is proposed that allows guaranteeing the patients' successful authentication by integrating a watermark containing the patient's specific information as well as his photography in the audio file.

Journal ArticleDOI
TL;DR: In this paper , the authors improved upon the singular value decomposition (SVD) based color image watermarking by incorporating integer wavelet transform (IWT) and chaotic maps, which improved the robustness, security, imperceptibility, and capacity.
Abstract: Image watermarking commonly involves singular value decomposition (SVD) because of its simplicity and minimal effect on image quality. However, SVD-based image watermarking schemes suffer from some drawbacks such as the false positive problem (FPP), and an undesirable trade-off between vital properties such as imperceptibility, embedding capacity, and robustness. To address these drawbacks, we improve upon the SVD-based color image watermarking by incorporating integer wavelet transform (IWT) and chaotic maps. A grayscale image watermark is decomposed into eight gray levels (bit-planes) before being encrypted and re-ordered by a chaotic sequence. Each encrypted bit-plane is inserted into singular values of the sub-bands of a host image. The embedding process is controlled by chaos-based multiple scaling factors (MSF) which are updated in each embedded bit-plane. The resulting values are involved in generating a hash value at the end of the embedding processes. The hash value is used to overcome FPP issues and improves security. Our findings illustrate the proposed scheme’s robustness, security, imperceptibility, and capacity. It also exhibits excellent robustness against attacks and its performance surpasses a variety of existing schemes. In addition, the proposed scheme is hypersensitive to even the slightest secret key variations.

Journal ArticleDOI
TL;DR: In this article , a blind watermarking approach combining a Non-Subsampled Shearlet Transform and Singular Value Decomposition is proposed to secure the heartbeat sound exchanged in telemedicine, which allows guaranteeing the patients' successful authentication by integrating a watermark containing the patient specific information as well as his photography in the audio file.