[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Robust and secured watermarking using Ja-Fi optimization for digital image transmission in social media

Published: 01 December 2022 Publication History

Abstract

Widespread transmission of digital image in social media has come up with security, confidentiality and authentication issues. Ensuring copyright protection of digital images shared through social media has become inevitable. To address these issues, a robust and secure digital image watermarking scheme using Redundant discrete wavelet transform (RDWT) - Singular value decomposition (SVD) hybrid transform is proposed in this paper. In the proposed scheme, digital image is divided into 4 × 4 non-overlapping blocks, and low information blocks are selected for embedding to ensure higher imperceptibility. For watermark embedding 1-level RDWT is applied on the selected blocks followed by SVD decomposition to make the proposed scheme highly robust against common attacks. One watermark bit is embedded in each left and right singular SVD matrices by adjusting the coefficients. This makes the proposed scheme free from false positive error and achieve high embedding capacity. Before embedding, watermark encryption is done by using a pseudo random key. The pseudo random key is generated adaptively from the cover image by using discrete wavelet transform saliency map, block mean approach and cosine functions. High imperceptibility and robustness is indispensable for the digital images shared through social media. But, these watermarking characteristics are in trade-off. In the proposed scheme, the trade-off is balanced by using optimized scaling factor (embedding strength). Scaling factor is optimized by using the proposed JAYA-Firefly (Ja-Fi) optimization. Experimental results demonstrate that the proposed scheme provides high imperceptibility, robustness, embedding capacity and security. Furthermore, performance comparison with the recent state-of-the-art schemes affirms that the proposed scheme has superior performance.

Highlights

We present a blind digital image watermarking scheme using hybrid RDWT–SVD transform.
To increase security and imperceptibility, encrypted watermark is embedded in randomly selected low entropy blocks.
Ja-Fi is proposed for scaling factor optimization to balance watermarking characteristics.

References

[1]
da Costa K.A., Papa J.P., Passos L.A., Colombo D., Del Ser J., Muhammad K., de Albuquerque V.H.C., A critical literature survey and prospects on tampering and anomaly detection in image data, Appl. Soft Comput. 97 (2020).
[2]
Haghighi B.B., Taherinia A.H., Harati A., Rouhani M., WSMN: An optimized multipurpose blind watermarking in shearlet domain using MLP and NSGA-II, Appl. Soft Comput. 101 (2021).
[3]
Li W., Wang G.G., Gandomi A.H., A survey of learning-based intelligent optimization algorithms, Arch. Comput. Methods Eng. 28 (5) (2021) 3781–3799.
[4]
Singh K.N., Singh A.K., Towards integrating image encryption with compression: A survey, ACM Trans. Multimedia Comput., Commun., Appl. (TOMM) 18 (3) (2022) 1–21.
[5]
Fares K., Khaldi A., Redouane K., Salah E., DCT & DWT based watermarking scheme for medical information security, Biomed. Signal Process. Control 66 (2021) 1746–8094.
[6]
Begum M., Ferdush J., Uddin M.S., A hybrid robust watermarking system based on discrete cosine transform, discrete wavelet transform, and singular value decomposition, J. King Saud Univ.-Comput. Inf. Sci. (2021) 1319–1578.
[7]
Li M., Xiao D., Zhu Y., Zhang Y., Sun L., Commutative fragile zero-watermarking and encryption for image integrity protection, Multimedia Tools Appl. 78 (16) (2019) 22727–22742.
[8]
Maheshkar S., An optimized color image watermarking technique using differential evolution and svd–dwt domain, in: Proceedings of Fifth International Conference on Soft Computing for Problem Solving, Springer, Singapore, 2016, pp. 105–116.
[9]
Nazir Hira, Bajwa Imran Sarwar, Samiullah Muhammad, Anwar Waheed, Moosa Muhammad, Robust secure color image watermarking using 4D hyperchaotic system, DWT, HbD, and SVD based on improved FOA algorithm, Secur. Commun. Networks 2021 (6617944) (2021).
[10]
Zainol Z., Teh J.S., Alawida M., An FPP-resistant SVD-based image watermarking scheme based on chaotic control, Alex. Eng. J. 61 (7) (2022) 5713–5734.
[11]
Makbol Nasrin M., Khoo Bee Ee, Rassem Taha H., Loukhaoukha Khaled, A new reliable optimized image watermarking scheme based on the integer wavelet transform and singular value decomposition for copyright protection, Inform. Sci. 417 (2017) 381–400.
[12]
Maheshkar Sushila, Region-based hybrid medical image watermarking for secure telemedicine applications, Multimedia Tools Appl. 76 (3) (2017) 3617–3647.
[13]
Alshoura W.H., Zainol Z., Teh J.S., Alawida M., A new chaotic image watermarking scheme based on SVD and IWT, IEEE Access 8 (2020) 43391–43406.
[14]
Vali Mohammad Hassan, Aghagolzadeh Ali, Baleghi Yasser, Optimized watermarking technique using self-adaptive differential evolution based on redundant discrete wavelet transform and singular value decomposition, Expert Syst. Appl. 114 (2018) 296–312.
[15]
Sharma Sourabh, Sharma Harish, Sharma Janki Ballabh, An adaptive color image watermarking using RDWT-SVD and artificial bee colony based quality metric strength factor optimization., Appl. Soft Comput. 84 (2019).
[16]
Zeebaree D.Q., Robust watermarking scheme based LWT and SVD using artificial bee colony optimization, Indonesian J. Electr. Eng. Comput. Sci. 21 (2) (2021) 1218–1229.
[17]
Moeinaddini E., Selecting optimal blocks for image watermarking using entropy and distinct discrete firefly algorithm, Soft Comput. 23 (19) (2019) 9685–9699.
[18]
Najafi Esmaeil, Loukhaoukha Khaled, Hybrid secure and robust image watermarking scheme based on SVD and sharp frequency localized contourlet transform, J. Inf. Secur. Appl. 44 (2019) 144–156.
[19]
Gao X., Mou J., Banerjee S., Cao Y., Xiong L., Chen X., An effective multiple-image encryption algorithm based on 3D cube and hyperchaotic map, J. King Saud Univ.-Comput. Inf. Sci. 34 (4) (2022) 1535–1551.
[20]
Ansari Irshad Ahmad, Pant Millie, Ahn Chang Wook, ABC optimized secured image watermarking scheme to find out the rightful ownership, Optik 127 (14) (2016) 5711–5721.
[21]
Attaullah Shah T., Jamal S.S., An improved chaotic cryptosystem for image encryption and digital watermarking, Wirel. Pers. Commun. 110 (3) (2020) 1429–1442.
[22]
Salehnia Taybeh, Fathi Abdolhossein, Fault tolerance in LWT-SVD based image watermarking systems using three module redundancy technique, Expert Syst. Appl. 179 (2021) 0957–4174.
[23]
Luo A., Gong L., Zhou N., et al., Adaptive and blind watermarking scheme based on optimal SVD blocks selection, Multimedia Tools Appl. 79 (1) (2020) 243–261.
[24]
Vellasques Eduardo, Sabourin Robert, Granger Eric, Fast intelligent watermarking of heterogeneous image streams through mixture modeling of PSO populations, Appl. Soft Comput. 13 (6) (2013) 3130–3148.
[25]
Vellasques Eduardo, Sabourin Robert, Granger Eric, A high throughput system for intelligent watermarking of bi-tonal images, Appl. Soft Comput. 11 (8) (2011) 5215–5229.
[26]
Ullah I., Jian M., Hussain S., Guo J., Yu H., Wang X., Yin Y., A brief survey of visual saliency detection, Multimedia Tools Appl. 79 (45) (2020) 34605–34645.
[27]
Fowler James E., The redundant discrete wavelet transform and additive noise, IEEE Signal Process. Lett. 12 (9) (2005) 629–632.
[28]
Ali Musrrat, Ahn Chang Wook, Pant Millie, A robust image watermarking technique using SVD and differential evolution in DCT domain, Optik 125 (1) (2014) 428–434.
[29]
Chang Chin-Chen, Tsai Piyu, Lin Chia-Chen, SVD-based digital image watermarking scheme., Pattern Recognit. Lett. 26 (10) (2005) 1577–1586.
[30]
Rao R., Jaya: A simple and new optimization algorithm for solving constrained and unconstrained optimization problems, Int. J. Ind. Eng. Comput. 7 (1) (2016) 19–34.
[31]
Xin-she Yang, Nature-Inspired Metaheuristic Algorithms, Luniver Press, 83–96, 2008.
[32]
Khan W.A., Hamadneh N.N., Tilahun S.L., Ngnotchouye J.M., A review and comparative study of firefly algorithm and its modified versions, Optim. Algorithms-Methods Appl. 45 (2016) 281–313.
[33]
The USC-SIPI image database, 2021, Available online: https://sipi.usc.edu/database/. (Accessed 09 October 2021).
[34]
The Kaggle image database, 2021, Available online: https://www.kaggle.com/datasets. (Accessed 09 October 2021).
[35]
Katoch S., Chauhan S.S., Kumar V., A review on genetic algorithm: Past, present, and future, Multimedia Tools Appl. 80 (5) (2021) 8091–8126.
[36]
Prabha K., Sam I.S., Robust color image watermarking by elliptical phase modification based on Walsh Hadamard transform and triangular vertex transform, Sādhanā 46 (1) (2021) 1–16.
[37]
Balaska N., Ahmida Z., Belmeguenai A., Boumerdassi S., Image encryption using a combination of grain-128a algorithm and Zaslavsky chaotic map, IET Image Process. 14 (6) (2020) 1120–1131.
[38]
Sehra K., Raut S., Mishra A., Kasturi P., Wadhera S., Saxena G.J., Saxena M., Robust and secure digital image watermarking technique using Arnold transform and memristive chaotic oscillators, IEEE Access 9 (2021) 72465–72483.

Cited By

View all

Index Terms

  1. Robust and secured watermarking using Ja-Fi optimization for digital image transmission in social media
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Please enable JavaScript to view thecomments powered by Disqus.

            Information & Contributors

            Information

            Published In

            cover image Applied Soft Computing
            Applied Soft Computing  Volume 131, Issue C
            Dec 2022
            1278 pages

            Publisher

            Elsevier Science Publishers B. V.

            Netherlands

            Publication History

            Published: 01 December 2022

            Author Tags

            1. RDWT–SVD
            2. Digital image watermarking
            3. Hybrid optimization
            4. Pseudo random key
            5. JAYA
            6. Firefly
            7. Genetic algorithm
            8. Saliency map

            Qualifiers

            • Research-article

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0
            Reflects downloads up to 01 Jan 2025

            Other Metrics

            Citations

            Cited By

            View all
            • (2024)Image Robust Watermarking Method Based on DWT-SVD Transform and Chaotic MapComplexity10.1155/2024/66183822024Online publication date: 1-Jan-2024
            • (2024)Resnet50 and logistic Gaussian map-based zero-watermarking algorithm for medical color imagesNeural Computing and Applications10.1007/s00521-024-10121-536:31(19707-19727)Online publication date: 1-Nov-2024
            • (2023)A robust watermarking scheme via optimization-based image reconstruction techniqueMultimedia Tools and Applications10.1007/s11042-023-14363-882:16(25039-25060)Online publication date: 19-Jan-2023
            • (2023)Image data hiding schemes based on metaheuristic optimization: a reviewArtificial Intelligence Review10.1007/s10462-023-10537-w56:12(15375-15447)Online publication date: 1-Dec-2023
            • (2023)An Optimized Deep Fusion Convolutional Neural Network-Based Digital Color Image Watermarking Scheme for Copyright ProtectionCircuits, Systems, and Signal Processing10.1007/s00034-023-02299-142:7(4019-4050)Online publication date: 6-Feb-2023

            View Options

            View options

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media