Invisible Watermark based Image Authentication System with 5/3 Integer Wavelet Transform
DOI:
https://doi.org/10.26438/ijcse/v10i6.2226Keywords:
Watermarking, Lifting Scheme, IWT, Randomization, AuthenticationAbstract
The authentication techniques deals with the originality of an object. It may be image, text, audio etc. Image authentication widely use watermarking techniques both in spatial and transform domain, especially discrete wavelet based techniques are preferred for features like multilevel analysis and lossless reconstruction. Again, integer wavelets has added advantage of generating only integer coefficients which further make computation simpler and faster. This work initially used forward 5/3 integer wavelet transform (IWT) on cover image to generate sub bands. A watermark image is taken and its SHA256 hash code is generated. The watermark and hash code are embedded in two different sub bands using dynamic random position map and the sub bands are inverse 5/3 IWT transformed to generate stego image. During extraction, the opposite process is adopted and the hash code of extracted watermark is computed and compared with original hash code for verification of authenticity. The experimental observation of the proposed method revealed around 61.5dB peak signal to noise ratio (PSNR), near zero mean square error (MSE) and very high structural similarity index measure (SSIM) with 8448 bit payload and PSNR 55 dB with 33024 bits of payload.
References
[1] B. Li, J. He, J. Huang, Y. Q. Shi, "A Survey on Image Steganography and Steganalysis", Journal of Information Hiding and Multimedia Signal Processing., Vol. 2, Issue.2, pp.142-172, 2011.
[2] J. Kadhim, P. Premaratne, P. J. Vial,B. Halloran , "Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research", Neurocomputing, Vol.335,Issue.1, pp.300-306,2019
[3] J. Fridrich, M. Goljan, R. Du, “Reliable Detection of LSB Steganography in Color and Grayscale Images”, In the Proceedings of the Workshop on Multimedia and Security: New Challenges, ACM, New York, pp. 27-30, 2001.
[4] A. R. Calderbank, I. Daubechies, W. Sweldens, B.L. Yeo, "Wavelet Transforms that Map Integers to Integers", Applied and Computational Harmonic Analysis,Vol.5,Issue.3,pp.332-369, 1998.
[5] N. Muhammad, N. Bibi, Z. Mahmood,D.G. Kim, "Blind Data Hiding Technique using the Fresnelet Transform", SpringerPlus, Vol.4,Issue.1,pp.1-15, 2015.
[6] H. Daren, L. Jiufen, H. Jiwu,L. Hongmei, "A DWT-Based Image Watermarking Algorithm", In IEEE International Conference on Multimedia and Expo 2001- ICME 2001, IEEE Computer Society, Tokyo, pp.313-316, 2001.
[7] S. Subburam, S. Selvakumar,S. Geetha, “High Performance Reversible Data Hiding Schemethrough Multilevel Histogram Modification in Lifting Integer Wavelet Transform”, Multimedia Tools and Applications. Vol.77,Issue.6,pp.7071-7095, 2018.
[8] W. Sweldens, "The Lifting Scheme: A Construction of Second Generation Wavelets", SIAM journal on Mathematical Analysis, Vol.29,Issue.2,pp.511-546, 1998.
[9] A. Shaik,V. Thanikaiselvan,"Comparative Analysis of Integer Wavelet Transforms in Reversible Data Hiding Using Threshold Based Histogram Modification",Journal of King Saud University-Computer and Information Sciences, Vol.33, Issue.7,pp.878-889, 2021.
[10] S. Fazli,M. Moeini,"A Robust Image Watermarking Method Based on DWT, DCT, and SVD Using a New Technique for Correction of Main Geometric Attacks",Optik Vol.127, Issue.2,pp. 964-972, 2016
[11] Y. He and Y. Hu., "A Proposed Digital Image Watermarking Based on DWT-DCT-SVD," in 2nd IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), IEEE, Xian,pp.1214-1218,2018.
[12] M. Islam, A. Roy and L. R. Hussain, "Neural Network Based Robust Image Watermarking Technique in LWT Domain", Journal of Intelligent & Fuzzy Systems, Vol. 34,Issue.3, pp.1691-1700, 2018.
[13] A. A. Khaleel ,O. Serkan,"A Novel Hybrid DCT and DWT Based Robust Watermarking", Multimedia Tools and Applications, Vol.12, Issue.78, pp.17027-17049, 2019.
[14] R. Liu,T. Tan, "An SVD-Based Watermarking Scheme for Protecting Rightful Ownership", IEEE Transactions on Multimedia,Vol.4,No.1,pp.121-128, 2002.
[15] S. Kumar,S. B. Kumar,"DWT Based Color Image Watermarking using Maximum", Multimedia Tools and Applications, Vol.80,Issue.10,pp.15487-15510, 2021.
[16] O.J. Kwon, S. Choi,B. Lee,"A Watermark-Based Scheme for Authenticating JPEG Image Integrity", IEEE Access, Vol. 6,Issue.1,pp. 46194-46205, 2018.
[17] M. J. Barani, M. Y. Valandar,P. Ayubi, "A New Digital Image Tamper Detection Algorithm Based on Integer Wavelet Transform and Secured by Encrypted Authentication Sequence With 3D Quantum Map",Optik-International Journal of Light and Electron Optics,Vol.187,Issue.1, pp.205-222, 2019.
[18] M. D. Adams, F. Kossentini,R. K. Ward, "Generalized S Transform", IEEE Transactions on Signal Processing , Vol. 50, Issue.11, pp.2831-2842, 2002.
[19] I. Ahmad,A. S. Das,"Hardware Implementation Analysis of SHA-256 and SHA-512 Algorithms on FPGAs",Computers & Electrical Engineering,Vol.31,Issue.6,pp.345-360, 2005.
[20] A. Pradhan, A. K. Sahu, G. Swain,K. R. Sekhar, "Performance Evaluation Parameters of Image Steganography Techniques", In 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS), IEEE, Banglore, pp.1-8, 2016.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
