You are on page 1of 20

Future Generation Computer Systems 94 (2019) 654–673

Contents lists available at ScienceDirect

Future Generation Computer Systems


journal homepage: www.elsevier.com/locate/fgcs

Dual watermarking framework for privacy protection and content


authentication of multimedia

Nasir N. Hurrah a , Shabir A. Parah a , , Nazir A. Loan a , Javaid A. Sheikh a ,
Mohammad Elhoseny b , Khan Muhammad c
a
Post Graduate Department of Electronics and Instrumentation Technology, University of Kashmir, JK, 190006, India
b
Faculty of Computers and Information, Mansoura University, El Gomhouria St, Mansoura, Dakahlia 35516, Egypt
c
Intelligent Media Laboratory, Digital Contents Research Institute, Sejong University, Seoul, Republic of Korea

highlights

• Dual watermarking based system for privacy protection and content authentication of multimedia.
• High robustness, offering threat identification and localization.
• Preservation of stego image’s quality via strong coefficient correlation between two selected neighborhood blocks.
• Highly robust to both singular and hybrid attacks.

article info a b s t r a c t

Article history: In the current multimedia networked infrastructure, privacy breaches due to cyber-attacks result in huge
Received 20 July 2018 economic losses. Despite these threats there is ever increasing demand to share data over various insecure
Received in revised form 22 November 2018 networks for accomplishment of numerous tasks. In such a scenario there is a greater need to develop new
Accepted 15 December 2018
algorithms for strengthening the existing cybersecurity frameworks, ensure security, privacy, copyright
Available online 26 December 2018
protection and authentication of data. In this paper a new technique for copyright protection, data security
Keywords: and content authentication of multimedia images is presented. The copyright protection of the media is
Multimedia security taken care of by embedding a robust watermark using an efficient inter-block coefficient differencing
Cyber-attack algorithm and is proposed as Scheme I. Scheme II has been utilized to ensure both copyright protection,
Cybersecurity and content authentication. The authentication of the content has been ensured by embedding a fragile
Robustness
watermark in spatial domain while as copyright protection has been taken care of utilizing a robust
Copyright protection
watermark. In order to thwart an adversary and ensure that it has no access to actual embedded data, we
Content authentication
make use of a novel encryption algorithm in conjunction with Arnold transform to encrypt data prior to its
embedding. The experimental results reveal that the proposed framework offers high degree of robustness
against single/dual/triple attacks; with Normalized Correlation (NCC), more than or equal to 0.95. Besides,
the fragile watermark embedding makes the system capable of tamper detection and localization with
average BER more than 45% for all signal processing/geometric attacks. The average PSNR achieved for
both schemes is greater than 41 dB. A comparison of the proposed framework with various state-of-the-
art techniques demonstrate its effectiveness and superiority.
© 2018 Elsevier B.V. All rights reserved.

1. Introduction carry out several automatic or monitored tasks [1,2]. Such data may
include health information, banking records and secret documents
Technology has made its way in almost every sector of life in the form of images, text files, audio and videos, acquired through
like commerce, defense, banking, movie industry, health-sector various means and processed/stored by the different systems. The
information exchanged is usually sensitive, as it comprises of pri-
etc. Use of communication technology in the mentioned sectors
vate/secret data of individuals and organizations [3]. A minute
involves data collection/transfer 24 × 7, from millions of individu-
alteration could result in misleading information affecting decision
als and devices. In several complex state-of-art systems huge data
making of whole system. The presence of state-of-the-art multime-
is shared in real time between different sensors and modules to
dia editing tools are making it very easy to copy/edit and reproduce
various multimedia objects. Given to this fact, a large number
∗ Corresponding author. of data breaches caused due to various cyber-attacks have been
E-mail address: shabireltr@gmail.com (S.A. Parah). reported in recent years. In US alone the number of data breaches

https://doi.org/10.1016/j.future.2018.12.036
0167-739X/© 2018 Elsevier B.V. All rights reserved.
N.N. Hurrah, S.A. Parah, N.A. Loan et al. / Future Generation Computer Systems 94 (2019) 654–673 655

arouse from 1093 million in 2016 to 1579 million in 2017. The to improve the security of the proposed watermarking framework.
total electronic records exposed in 2017 was found to be five time The secret encrypted data bits of the watermark are embedded
greater than 2016 [4]. These breaches proved quite costly in many into the DC coefficients of the image blocks, to achieve better
cases as the companies lost a huge investment [5]. Electronic- robustness against the most of the signal processing attacks. As the
healthcare sector of late has been a target of various data breaches. proposed framework uses block processing procedure, it is flexible
In July 2017 a cyberattack resulted in theft of medical images and to adopt any of the image compression standards.
details of patient visits, related to more than 12,800 patients of The main contributions of the proposed work are summarized
Arkansas Oral Facial Surgery Centre [6]. The Detroit health system as follows:
reported a patient data breach in October 2017 due a cybercriminal
theft of some email credentials wherein data of 18,470 patients
• Strong robustness is achieved by embedding the watermark
bits in a way which ensures optimal difference between
was stolen [7]. Similar other multiple data breaches have been
the modified coefficients. The difference between two co-
reported where privacy of millions of individuals has been exposed
efficients is made to lie in four different zones where two
and thereby resulting in huge loses to the concerned organiza-
zones are used for watermark bit ‘1’ and the remaining two
tions due to legal actions enforced by law agencies [8–10]. The
are used to hold bit ‘0’. In addition, a sufficient guard band
healthcare organizations spend about $200 for every theft and
is used to separate the zones after embedding the bit ‘0’
more than $2 million for every data breach incident. The overall
and ‘1’. Since ample guard band is kept between the zones,
economic loss suffered by the US healthcare industry alone is
any manipulation of the coefficients due to attacks fail to
about $5.6 billion per year, for rectification and management of
shift the difference in the wrong zone. The performance
lost and stolen records [11]. In India the scenario is no different
against geometric attacks is enhanced due to the application
and according to a latest report from Motion Picture Distributors’
of Arnold transform which in addition to the security ensures
Association (India), the Indian film industry loses around 2.7 billion
that the neighboring bits of the watermark are embedded in
dollars and over 60,000 jobs every year because of piracy [12]. A
distant blocks. So the effect of geometric attacks which target
latest study reveals that the revenue at box-office would increase
the particular portion of the image is minimized.
by 15% in case piracy is completely eliminated [13]. The online
• The quality of the images is preserved by using only two coef-
platforms like dark net and overlay nets are the easy to access,
ficients out of 64 coefficients in an 8 × 8 block for embedding.
strong and unmonitored bases, for these hackers needing internet
Also an efficient coefficient correlation between two selected
access and few high configuration processors. Similarly, several
neighborhood block coefficients, ensures least modification
companies/agencies analyze the behavior of individuals sharing
done on the blocks due to embedding. The advantage of
their data through social network services (SNSs), and use number
using two separate pair of zones is that, the modification of
techniques with the help of researchers to channelize their strate-
coefficients required for embedding watermark bit ‘1’ and
gies accordingly [14]. Besides movie and healthcare industries,
‘0’ is not too high. Thus ensuring good quality watermarked
various data breaches have been reported in other industries [15–
image.
17]. So there is need to ensure extreme data security in all these
• To ensure the tamper identification and localization, a fragile
areas. The focus of the cybersecurity techniques has been mainly
watermark is embedded in the spatial domain. Employing
in the sectors like e-banking, e-commerce, defense, multimedia
proposed fragile watermarking algorithm ensures that any
industry, social media and e-healthcare. Cyber security is generally
minute tampering carried out on watermarked media effects
achieved using various technologies like hashing, steganography,
the hidden watermark drastically.
watermarking and digital signatures etc. [18]. However, of late dig-
• The effectiveness of the technique is tested for hybrid attacks
ital watermarking, has been proven, to be quite effective method
in addition to singular attacks. This is important because, in
for copyright protection and content authentication along with
real time scenarios the attacks on the image are usually mul-
security and privacy of users.
tiple. The proposed algorithm performs well for dual attacks
Digital watermarking deals with hiding of secret data water-
and even to most of the simultaneous triple attacks.
mark) in some digital content which can be extracted only with
the accurate knowledge of embedding procedure and some secret The rest of the paper is organized as follows. Section 2 describes
keys. Watermarking can be used by systems for applications like the related work. Watermark preparation has been discussed in
e-healthcare, defense, e-commerce, smart cities etc. [19–21]. Wa- Section 3. Section 4 describes the watermark embedding and ex-
termarking schemes are classified in many a ways [22]. Robust traction algorithms. Experimental results and discussion have been
and fragile watermarking techniques are required for copyright presented in Section 5. The paper concludes with Section 6.
protection and content authentication respectively. Some of the re-
cently reported fragile watermarking schemes capable of inform- 2. Related work
ing the receiver whether the information received is tempered or
not, could be seen in [23,24]. The fragile watermarking schemes, The rapid rise of information exchange through the internet
usually implemented in spatial domain, offer least complexity and has given birth to several kind of cyber threats faced by the orga-
high embedding capacity but are less resistant to common signal nizations working for the accomplishment of this data exchange.
processing attacks like compression [25]. Robust watermarking To counter such threats, and ensure data security and integrity
schemes, usually implemented in transform domain, in contrast during transit, a continuous research in multiple areas of relevant
focus on hiding the secret data in a cover media so that it could technologies is on worldwide. Digital watermarking has been es-
be recovered even if cover media is attacked [26–28]. tablished as one of the best techniques for realizing the multi-
In this paper, a blind dual watermarking framework using DWT, ple goals of authentication, copyright protection and security of
DCT, Arnold transform and a novel encryption algorithm has been the multimedia data being exchanged. Parah et al., have reported
proposed for privacy protection and content authentication of an efficient data hiding system referred to StegNmark [29]. The
multimedia images. The block-based (DCT) transform avoids the authors have combined steganography and fragile watermarking
blocking effects usually suffered by most watermarking schemes. techniques to ensure content authentication and early tamper
This technique offers multiple options for the user to embed water- detection. At present, the hybrid transform domain techniques are
mark as per various needs. Prior to embedding, Arnold transform very popular due to their combined advantages in terms of imper-
and a novel encryption technique are applied to the watermark, ceptivity and robustness. It has been shown that the performance
656 N.N. Hurrah, S.A. Parah, N.A. Loan et al. / Future Generation Computer Systems 94 (2019) 654–673

of DWT-based digital watermarking schemes could be improved robust and fragile watermark [46]. After applying IWT on the
by using a hybrid combination of DWT and other transformation cover image the scheme involves splitting the transformed image
domains [30]. In [31], a blind DWT–DCT watermarking scheme into three regions and embeds robust and fragile watermark in
has been proposed wherein two PN-sequences of scrambled bi- two regions while keeping a no watermark region. The scheme
nary watermark are embedded in mid frequency DCT coefficients however is silent regarding security of watermark. Similar state-of
of the first-level DWT LL-sub-band, after their block-based DCT art-techniques have been reported for watermarking in the other
transform is computed. In a similar way, multiple sub-bands and digital media like audio and video. A zero-watermarking scheme
multi-level DWT transform of cover image can be used to in- for privacy protection while sharing audio signals meant in area of
sert the watermark information [32]. A similar DWT–DCT based telemedicine. Unlike image watermarking, the watermark is usu-
watermarking scheme has been proposed in [33], however the ally embedded in some separate key instead of medical signal to
scheme offers payload of only 256 bits. A joint DWT and DFT avoid any wrong diagnosis because the audio signals are extremely
based transform domain watermarking algorithm has been pro- sensitive to any variation [4,41,47].
posed in [34]. The algorithm uses the decomposition property of
3. Watermark preperation
the transforms in order to embed the watermarks in the mid-
dle frequency coefficients. A similar watermarking scheme has
The security of the watermark is an important factor in both
been implemented using combined DCT–DWT domain [30]. Haar
the copyright protection and authentication applications. Usually
wavelets are used for embedding the secret data (watermark) in
there are some chances for an unauthorized user to crack the
the components of perceptual significance obtained from image
embedding algorithm by using a processor with high computa-
by employing block-based (DCT) transform. The application of DCT tional power and hence obtain the secret information (watermark)
on DWT coefficients considerably improves the performance of the hidden in some media. In order to increase the security of the
watermarking scheme as against using single transform technique watermark, which is the secret information to be hidden in a
as reported in [35]. Here the watermark has been embedded in the cover media, we use two different encryption techniques shown
sub-bands obtained after application of DWT on the original cover in Fig. 1. At the first level, Arnold transform is used for carrying out
image. Several other transform domain techniques could be used encryption on the watermark (W ) resulting in modification of its
together to improve the two important factors — imperceptivity spatial coordinates such that we obtain encrypted watermark as,
and robustness. An IWT-SVD-MOACO scheme has been proposed ‘W A ’. Hence security of the watermark is ensured by using arnold
in [36] to improve the perceptual quality and robustness of water- encryption with ‘K1 ’ number of iterations [48,49]. The parameter
marking technique and avoid false position problems. ‘K1 ’ is the only one parameter which acts as a secret key due to
A watermarking technique is said to be efficient if it provides which there are still chances for the attackers to decipher the
security in addition to strong imperceptivity, robustness and em- information after predicting the iteration count. So in order to
bedding capacity. This is needed in case the attacker successfully further strengthen the security of the secret information to a level
cracks the extraction algorithm thereby obtaining the secret infor- that is unbreakable, we use next level of encryption. This is taken
mation with no hindrance [37–40]. So there is need to secure the care of by using the proposed novel encryption technique which
watermark such that even if the attacker decodes the algorithm, changes the watermark information itself. In order to keep the
the secret information cannot be recovered in the original form. computational complexity at minimum possible level only a 32-bit
A robust watermarking scheme for copyright protection, based on key is used for encrypting the transformed watermark at second
chaotic map encryption has been proposed in [39]. Although the stage. The main secret key of 32-bits (K2 = a1 a2 a3 a4 a5 . . . a32 ) is
technique provides good security to the watermark the impercep- modified in such a manner that a single bit change in its content
tivity and robustness to the geometric attacks is not satisfactorily. will give the results that are totally meaningless. This 32-bit key
The Chaos-based watermark encryption approach has also been is expanded to form a 64-bit binary encoded sequence to encrypt
used for implementation of robust methods of zero-watermarking each row and column of the watermark. The steps involved in this
in case of audio signals containing medical information [41]. A spa- encryption process are described in Algorithm I. The watermark
tial domain based imperceptible watermarking technique for color (We ) obtained after two level encryption is embedded into the
images has been presented in [42]. The technique shows good im- cover images using proposed embedding techniques described in
perceptivity but no provision is provided for security of the secret Section 4.
information embedded. Further, the robustness against geometric
4. Proposed watermarking technique
attacks is weak. A mixed modulation scheme has been proposed
for embedding a watermark encrypted using Arnold transform in
Proposed watermarking system provides two variants for copy-
DCT domain [43]. Although imperceptivity with PSNR equal to 40
right and authentication. The two variants are referred to as Scheme
dB has been achieved the robustness against most of the attacks
I and Scheme II respectively. Scheme I is used for the generation of
demands further improvement. A blind frequency domain based robust watermarked images and as such could find applications
watermarking scheme using chaotic maps has been presented in the copyright protection and fingerprinting. We have used the
in [44]. In the proposed scheme binary logo has been embedded transform domain for embedding the watermarking data due to
in the mid-band frequency components of the color image after excellent spatial-frequency localization of DWT and energy com-
applying discrete wavelet transform on the image. Although, the paction property of DCT. These properties enable a watermarking
security of the scheme is very high, it has poor robustness against scheme to have high values of robustness and imperceptivity.
various attacks and embedding capacity is also low. A fragile water- Scheme II is used when both copyright and authentication are
marking algorithm for color images in lossless compressed and un- required. The first approach (Scheme I) utilizes only a single wa-
compressed format is presented in [45]. Embedding of watermark termark for copyright protection while as Scheme II utilizes two
is achieved in coefficients of cover image after applying KLT. Ge- watermarks; one for copyright protection and the other for authen-
netic algorithm and syndrome coding method is used to devise an tication purposes. Scheme I has been implemented in transform
optimum embedding procedure. Although, the imperceptivity and domain and Scheme II utilizes both spatial as well as transform
embedding capacity of this fragile watermarking scheme is high, domains. For both the schemes, to ensure security of the water-
temper localization algorithm and a security procedure is needed marking two level encryption (as has been already discussed) is
if algorithm fails to resist an attack. A region-adaptive semi-fragile applied prior to the embedding process. Table 1 shows a brief
dual watermarking scheme has been proposed for embedding both description of different variants of the proposed system.
N.N. Hurrah, S.A. Parah, N.A. Loan et al. / Future Generation Computer Systems 94 (2019) 654–673 657

Table 1
Robust and Semi-Fragile schemes.
Proposed scheme(s) Description of the scheme
Scheme I (Robust) Utilizes a single watermark in transform domain and is used for the purpose of copyright protection. This scheme is applicable to
both gray scale as well as color images.
Scheme II (Semi-Fragile) Utilizes two logos, one in transform domain and other one in spatial domain for achieving copyright protection and content
authentication: The color image is converted into three constituent Planes (RGB) and each plane is treated as a grayscale image.

4.1. Embedding algorithm detail in Section 4.2. Some other variants which can be easily
achieved using the proposed scheme include embedding a single
In the proposed work we have implemented an algorithm that fragile watermark in a gray/color image, embedding two robust
offers multiple options to the users for embedding a binary mes- watermarks in a RGB color image or embedding a fragile or robust
sage in a cover image. The transform domain embedding pro- watermark in a luminance component of color image.
cess has been done in the mid-band frequency coefficients of the
transformed cover image. The processes for embedding watermark 4.1.1. Scheme I: Embedding robust watermark
for copyright protection is totally different from that of fragile In this subsection, the process of robust watermarking in a gray-
watermark embedding process which is done in spatial domain. scale image is explained in detail. The same process can be used for
The generalized flow diagram for the two variants of the proposed color images to embed watermark in one of its components. The
scheme has been shown in Fig. 2. block diagram of this scheme can be thought to be same as Fig. 2
Both the schemes mentioned in Table 1 use different embed- with the blocks between points ‘A’ & ‘C’ and ‘D’ & ‘F’ removed. The
ding strategies. The watermark embedding for scheme I has been modification is such that the fragile channel is not used while we
discussed in Section 4.1.1 while as the watermark embedding in embed robust watermark and the input cover image is gray-scale.
Scheme II has been discussed in Section 4.1.2. The watermark The watermark embedding process starts with various inputs to
extraction from Scheme I and Scheme II have been discussed in the embedder such as a watermark image W (which generally is
658 N.N. Hurrah, S.A. Parah, N.A. Loan et al. / Future Generation Computer Systems 94 (2019) 654–673

Fig. 1. Flow diagram for encrypting watermark(s) before embedding stage.

Fig. 2. Flow diagram for embedding robust and/or fragile watermark(s).

a binary logo (s) of size P × Q) and a cover image of size M × of the image for embedding watermark. The stable nature of the
N. The cover image is first subjected to global DWT. In order to approximate sub-band (LL) due its possession of most of the energy
avoid the complexity issues posed by multilevel DWT only one of an image as compared to other three sub-bands makes it is
level DWT is used in the proposed technique. Haar wavelets have more difficult to get changed by attacks hence suitable for robust
been employed to obtain the significant perceptual components watermarking. This feature makes the approximate sub-band most
N.N. Hurrah, S.A. Parah, N.A. Loan et al. / Future Generation Computer Systems 94 (2019) 654–673 659

suitable candidate for robust watermark insertion. The steps of 4.1.2. Scheme II: Embedding a robust and fragile watermark
robust watermark embedding process are described as follows: In this scheme both robust and fragile watermarks are embed-
ded in a color image. The block diagram of this scheme is the
Step 1: Before embedding, the watermark data is encrypted as
complete flow diagram that has been shown in Fig. 2, which is
described in Section 3.
capable of embedding a robust and fragile watermark. The robust
Step 2: If color image is used then it is divided into its constituent watermark is embedded as per the steps described in scheme I
planes by the pre-processing unit and one of the three constituent while fragile watermarking steps are described in this subsection.
planes is chosen for embedding robust watermark. Single level This scheme can be used for both gray scale and color images.
DWT is directly applied on the input gray-scale image, due to The modification in Fig. 2 for such a case is that robust channel
which image gets decomposed into four sub-bands; LL, LH, HL and is not used when fragile watermark is embedded. For embedding
HL, each of size M/2 × N/2. Since, original real image adjacent a fragile watermark in color images one of the planes (RGB) has
pixels are highly correlated, the first-level LL sub-band which is to be chosen. The block diagram of scheme II could be thought
approximation coefficients matrix, gives the close approximation to be same as Fig. 2 with the blocks between point ‘A’& ‘B’ and
of the real image and HL, LH, and HH sub-bands are set of detail ‘E’ & ‘D’ removed. The watermark embedding process involves
coefficients. hiding an encrypted watermark into a cover image. The fragile
watermark embedding involves embedding the watermark bit in
Step 3: The LL sub-band selected for data embedding is decom- a block twice for achieving tamper detection and localization. This
posed into 8 × 8 non-overlapping blocks. Thus the total no. of 8 is done by embedding the bit first in whole block (Bxy ) barring
× 8 blocks obtained from LL sub-band (after 1L DWT) is given by a predefined pixel, Bxy (g, h). The pixel Bxy (g, h) is then used
Eq. (1). for embedding duplicate version of the same watermark bit. The
M /2 × N /2 fragile watermark is embedded using Algorithm II.
n= (1)
8×8
4.2. Watermark extraction
Each of the 8 × 8 block is further divided into four sub-blocks (Bxr :
r = 1, 2, 3, 4 and x = 1,2, 3, . . . . n). The dimensions of each of these The proposed watermarking scheme is the blind because it
sub blocks are 4 × 4. Thus total number of sub blocks obtained from does not require the original image at the extraction stage. The
a given block of size 8 × 8 is 4. It is pertinent to mention that total extraction process starts with watermarked image which is firstly
number of bits that could be embedded in an image is 4n. Where n processed for necessary extraction of image components in which
is computed using Eq. (1). watermark is embedded. The processed image is put forward to
Step 4: DCT is performed on each of the 4 × 4 block to produce the extraction step, wherein an extraction algorithm which is
corresponding DCT-transformed blocks B′ 1 , B′ 2 , B′ 3 and B′ 4 . different for robust watermark extraction and fragile one is used.
The process of extracting robust watermark has been discussed
Step 5: The encrypted watermark sequence bits WF are embedded in Section 4.2.1 while as that for extracting fragile watermark has
in the DCT transformed sub-blocks by modifying the difference been presented in Section 4.2.2.
between the two pre-defined DCT coefficients selected from a pair
of 4 × 4 adjacent blocks. Table 2 shows the procedure of assigning 4.2.1. Robust watermark extraction
pair of sub-blocks out of four sub-blocks within an 8 × 8 block (Bx ). The watermark extraction process goes through almost similar
The difference (D) between a selected pair of DCT coefficients steps in the reverse order as the embedding process. The extrac-
from sub blocks Ba and Bb is defined in Eq. (2). tion process is in analogy with embedding up to the step 3, and
uses the 4 × 4 sub-blocks respectively. The difference between
D = Ba (i, j) − Bb (l, m) (2) two predefined neighboring block DCT coefficients results into a
where Ba (i, j) and Bb (l, m) are the DCT coefficients chosen within zone for which watermark bit is defined. After pre-processing, the
a sub-block having different coordinates. The embedding will pro- received image is transformed using 1-level 2D discrete wavelet
duce two transformed and modified (by watermarking) sub-blocks transform. The LL sub-band approximation coefficients are se-
Ba ′ and Bb ′ as per the procedure shown in Fig. 3. The parameters like lected and further divided into the 4 × 4 blocks. The 4 × 4 blocks
µ, δ and α are the initial parameters that are very sensitive to even undergo DCT transform. The DCT coefficients are obtained from
a fractional change in their values. Alfa (α ) is the strength of wa- which watermark bits are extracted according to the values of the
termark embedding on which the imperceptivity and robustness resulting differences between two pre-defined coefficients within
is dependent. Watermark embedding has been done in such a way a sub-block. As defined during the embedding, if the difference
that the difference (D) is made to lie in either of four different zones lies within a particular zone the decision is made about whether
defined in Fig. 3. the bit is ‘0’ or ‘1’. Even if the watermarked image undergoes an
The zone occupied by the D is determined by the actual differ- attack or signal processing operations, the proposed scheme is
ence between two coefficients under comparison and the water- able to extract well recognizable copy of the watermark (robust
mark bit to be embedded. For embedding the bit ‘0’ the difference watermark) whose quality depends on the strength of the attacks.
‘D’ is made to lie in the Zone 2 or Zone 4. Similarly, for embedding
4.2.2. Fragile watermark extraction
the bit ‘1’ the difference ‘D’ is made to lie in the Zone 1 or Zone 3.
The extraction process used in fragile watermarking is inverse
Step 6: Perform IDCT transform of the modified image blocks (Ba ′ of the corresponding embedding process. After doing some nec-
and Bb ′ ). essary pre-processing of the watermarked image the resulting
watermark logo is obtained from the image in spatial domain. For
Step 7: Perform the IDWT of the modified approximation coeffi-
an arbitrary block B̂xy (say first block) of the watermarked image
cients LL* and the original detail coefficients (HL, LH, and HH sub-
plane (IM ) with dimension’s 8 × 8 the watermark bit is extracted
bands).
using Algorithm III.
Step 8: Construct the watermarked image I ′ by performing several For localization of tampering the two extracted watermark bits
post-processing steps which involve some post conditioning of We (a) and WLSB (a) are compared. If they are same that means the
image, conversions between color/gray formats, modification of block is not tampered and is represented with dark color block
pixel values by adding of 128 to each element so that the pixel (i.e. B̂xy = 0) otherwise it is tampered represented by white block
intensities lie in the range from 0 to 255, and combining image (B̂xy = 1). This way we are able to localize the tamper at block level
planes in case of RGB image. and some example of tamper localization are shown in Fig. 17.
660 N.N. Hurrah, S.A. Parah, N.A. Loan et al. / Future Generation Computer Systems 94 (2019) 654–673

Fig. 3. Pictorial view of robust watermark embedding algorithm.


N.N. Hurrah, S.A. Parah, N.A. Loan et al. / Future Generation Computer Systems 94 (2019) 654–673 661

Table 2
Procedure for assigning 4 × 4 sub-blocks in an 8 × 8 block.
1st Four Sub-blocks 2nd Four Sub-blocks xth Four Sub-blocks
Ba = B′ 11 and Bb = B′ 12 Ba = B′ 21 and Bb = B′ 22 – Ba = B′ x1 and Bb = B′ x2
Ba = B′ 12 and Bb = B′ 13 Ba = B′ 22 and Bb = B′ 23 – Ba = B′ x2 and Bb = B′ x3
Ba = B′ 13 and Bb = B′ 14 Ba = B′ 23 and Bb = B′ 24 – Ba = B′ x3 and Bb = B′ x4
Ba = B′ 14 and Bb = B′ 11 Ba = B′ 24 and Bb = B′ 21 – Ba = B′ x4 and Bb = B′ x1

5. Experimental results Correct Ratio (BCR), defined as:

BCR (%) = [1 − BER]×100 (4)


In this section, we present the subjective and objective qual-
ity metrics obtained during the experimental evaluation of the The closer the value of NCC to unity the more is the robustness
proposed algorithm. Several standard color and gray scale cover of the watermarking system. The BCE parameter has been used in
images like Lena, Baboon, Boat, Peppers, Plane, etc. are used for some cases to check the robustness of a watermarking scheme. BCE
evaluation and experimentation of the proposed scheme. Some of stands for the number of Bits Correctly Extracted. BCE is given by
the test images of size 512 × 512 and watermarks used for the
BCE = Wo − We (5)
analysis are shown in Fig. 4. The two main evaluation parameters to
describe performance of a watermarking scheme are imperceptiv- where ‘Wo’ (Wo = P × Q ) is the total number of bits embedded
ity and robustness. The imperceptivity of a watermarking scheme in a watermark and ‘We’ gives the total number of bits in error at
may be defined as measure of similarity between the original im- extraction step.
age and watermarked image. To evaluate the imperceptivity of the
watermarked image, the parameter PSNR and SSIM [50] are used. 5.1. Imperceptivity analysis
Robustness describes the resistance of the watermarking scheme
against image manipulations due to attacks such as filtering, crop- In this section, the perceptual quality of the watermarked im-
ping, rotation, noise attack, and so on. The robustness is usually ages is presented and the results are thoroughly analyzed. For
measured in terms of NCC and BER with respect to the original evaluating the perceptual quality of the watermarked image the
watermark and the extracted watermark in the presence of signal two quality metrics adopted in this work are SSIM and PSNR.
processing attacks. Similarly, parameters like Bit error rate (BER),
5.1.1. Imperceptivity analysis for Scheme I
Normalized Cross correlation (NCC), Bits Correctly Extracted (BCE)
In order to analyze the quality metrics of the proposed ro-
and Bit-Correct Ratio (BCR) are used for testing the robustness.
bust watermarking scheme the subjective and objective analysis
The quantitative metric that is commonly used at the extraction
is carried out. Fig. 5 shows the extracted watermarks from the
stage to evaluate the performance of the watermarking scheme is
different watermarked images under no attack condition. High
the Bit Error Rate (BER), which is calculated as follows:
⎡ ⎤ quality watermarked images with PSNR greater than 40 dB are
∑P −1 Q −1
∑ obtained. The unity value of NCC and zero value of BER proves that
BER (%) = 1/PQ ⎣ W (x, y) ⊕ Ŵ (x, y)⎦ ×100 (3) the watermark is extracted without an error under no attack.
x=0 y=0
The proposed technique has been compared with Hu et al. [43]
for gray scale images of size 512 × 512 and watermark size 64 ×
where (x, y) gives the coordinates of a pixel such that W (x, 64 and the results are shown in Fig. 6.
y) and Ŵ (x, y) are the pixel values of the original image and A similar comparison has been done with [33] by embedding
extracted image respectively at location (x, y). The value of BER 256 bits of watermark in a 512 × 512 gray scale image and the
should be as low as possible and if BER converges to zero then results have been shown in Fig. 7. For this case blocks used for
the original watermark is said to be completely recovered. Some embedding are taken with the size 16 × 16 due to which a very
of the techniques analyze robustness in terms of the parameter Bit high imperceptivity is achieved.
662 N.N. Hurrah, S.A. Parah, N.A. Loan et al. / Future Generation Computer Systems 94 (2019) 654–673

Fig. 4. Some of the gray scale images, color images and the watermarks used in proposed scheme(s).

Fig. 5. Watermarked images, extracted watermarks and corresponding metrics under no attack at α = 36.

From Figs. 6 and 7 it is clear that the proposed watermarking 64) for varied values of embedding factor ranging from 5 to 75. The
scheme offers better imperceptivity than the schemes under com- imperceptivity remains at a sufficient level up to embedding factor
parison and the watermark is extracted without any error at the of 75 because PSNR remains above 36 dB and perceptual quality is
authorized receiver. maintained. In the proposed scheme(s) ‘α ’ has been set with the
value of 36.
5.1.2. Imperceptivity analysis for Scheme II As evident from Fig. 9, quality of the watermarked image can
Some of the watermarked images and the corresponding ex- be varied to a desirable range by just varying the embedding factor
tracted watermarks in case of Scheme II have been shown in Fig. 8 (α ). The applications which involve the authenticity of the data
under no attack. As can be seen from the figure, highly impercep- need a fragile watermark to be embedded in the cover image.
tible watermarked images are obtained even after embedding two When the watermarked image is attacked, the recipient does not
watermarks. Fig. 9 shows the average PSNR values of different 512 extract the watermark in its original form. The proposed fragile
× 512 color images after embedding two watermark logos (64 × watermarking scheme attains a PSNR value around 67 dB for a 64
N.N. Hurrah, S.A. Parah, N.A. Loan et al. / Future Generation Computer Systems 94 (2019) 654–673 663

Fig. 6. Imperceptivity Comparison with different gray scale images against Hu et al. [43].

Fig. 7. Imperceptivity comparison with different gray scale images against Banoraira [33].

× 64 watermark embedded in one of the components of a color in various tables and subjective results in various figures. The
image with block size 8 × 8. The embedding capacity and PSNR results hence achieved have been compared with some already
achieved on embedding of the fragile watermark in a color image existing state of art techniques to prove the effectiveness of the
component with respect to different block sizes is shown in the proposed scheme.
Table 3.
5.2.1. Robustness analysis of Scheme I
5.2. Robustness and fragility analysis
As mentioned the Scheme I involves embedding a robust water-
mark in a grayscale image. Fig. 10 shows various quality metrics
For the cases like copyright protection the robustness of a
watermarking scheme is the most important factor. Robustness achieved for the proposed scheme when subjected to different
underscores the capability of a watermarking system to withstand attacks.
various operations/attacks. In this section the watermarked image From Fig. 10, it is clear that the proposed watermarking al-
is subjected to several attacks and the results hence recorded gorithm is robust against various attacks carried out on the wa-
are analyzed for robustness. For the said purpose operations like termarked Lena. The proposed scheme could be seen completely
filtering, noise addition, compression, geometric attacks, etc. have robust to Gaussian Low pass filtering while as BER values of 0.2 to
been carried out on the watermarked image. We have tested the 7% could be seen for various attacks. One of the most important
watermarked images for singular and simultaneous attacks. NCC attributes of the proposed scheme is it high degree of robustness
and BER are the two objective metrics which have been used for to JPEG. As seen, for a very low quality factor of 20, our scheme only
evaluation of the robustness of the proposed scheme. Also, we have reports a BER of 0.2%. The proposed scheme has been compared for
used parameters like BCE and BCR at many places for comparison JPEG compression with [33] and the objective metrics have been
purposes. The objective results hence obtained have been recorded plotted in Fig. 11.
664 N.N. Hurrah, S.A. Parah, N.A. Loan et al. / Future Generation Computer Systems 94 (2019) 654–673

Fig. 8. Watermarked images and extracted watermarks under no attack at α = 36.

Fig. 9. Imperceptivity against varying Embedding factor (α ).

Table 3
Average PSNR and embedding capacity achieved with different block sizes for fragile component.
Cover image size Watermark size Block size used Embedding capacity (bits) PSNR (dB)
512 64 × 64 8×8 4096 (212 ) 67.17
512 128 × 128 4×4 16 384 (214 ) 59.20
512 256 × 256 2×2 65 536 (216 ) 52.11

It is clear from the comparison results shown in Fig. 11 that the 5.2.2. Robustness analysis for Scheme II
proposed scheme outperforms the technique under comparison. For both copyright and authentication purposes a robust and
Similarly, for the case of 512 × 512 gray scale images and 64 × 64 a fragile watermark has been embedded in a color image. This
watermark logo the proposed scheme has been compared with Hu section presents the results, when watermarked images obtained
et al. [43]. The BER comparison results are shown in Table 4. using Scheme II, are subjected to different signal processing and
From Table 4, it is clear that the proposed watermarking al- geometric attacks.
gorithm outperforms the scheme under comparison in terms of
robustness. The proposed scheme shows higher robustness against A. Robustness Analysis for Singular Attacks
all of the attacks except JPEG compression below quality factor The proposed watermarking scheme has been tested for many
of 30. image processing attacks taken one at a time in order to evaluate
N.N. Hurrah, S.A. Parah, N.A. Loan et al. / Future Generation Computer Systems 94 (2019) 654–673 665

Fig. 10. Extracted watermarks and corresponding NCC and BER metrics at α = 35 for Lena image.

Fig. 11. Comparison of different images in terms BCR for JPEG compression against Banoraira [33].

Table 4 the rotated watermarked image and watermark have been shown
Average BER (in percentage) comparison for different attacks. at an embedding factor 36.
Attack type Hu et al. [43] Proposed
None 0 0 • Filtering/noise attacks The performance of the proposed
JPEG/QF = 60 0 0 scheme has been analyzed for the filtering attacks like Me-
JPEG/QF = 30 NA 0 dian filtering (MF), Average filtering (AF), Low pass filtering
JPEG/QF = 20 0.03 0.30
JPEG2000/CR = 4 0.07 0
(LPF) and Weiner filtering (WF) and the results have been
JPEG2000/CR = 8 3.22 0.39 shown in Table 5. During the transmission of a watermarked
Gaussian noise @0.001 1.06 0.68 signal and other circuit operations, there are high chances of
Salt-and-Pepper noise @1% 8.72 8.05 noise addition to the signal. Some of the prominent noises
3 × 3 median filter 7.52 5.98
3 × 3 Gaussian LPF 0.34 0.04
involved are Gaussian noise (GN), Speckle noise (SN), Salt and
Scaling recovery 3.08 2.03 Pepper noise (S & P), Poisson noise (PN) etc. The performance
Rotation recovery (45◦ ) 11.82 8.58 of the proposed scheme has been evaluated against these
Brightening (+20) 0 0 noises and the results have been recorded in Table 5.
Darkening (−20) 0.59 0
• Rotation attack: The robustness of the watermark images has
been analyzed by rotating the watermarked image through
different angles. We have carried out rotation attack of varied
its performance. The three types of geometric attacks used to test degrees (1◦ –45◦ ) on the watermarked images. The extracted
our scheme are rotation, scaling and cropping. For analysis against watermarks have been shown in Fig. 12.
compression the effect of JPEG compression has been analyzed. • Scaling and cropping: Like rotation attack the proposed
Similarly, various filtering attacks and noise additions are per- scheme has been evaluated for other geometric attacks like
formed on the watermarked images. It is pertinent to mention that resizing and cropping. The watermarked image is tested for
666 N.N. Hurrah, S.A. Parah, N.A. Loan et al. / Future Generation Computer Systems 94 (2019) 654–673

crop by percentages of 25% and 50% and results are recorded size of 96 × 36. The PSNR of 43.28 is obtained for the RGB Lena
in Table 5. Similarly, the scaling of watermarked image is image. The watermarks extracted using proposed scheme and the
done by resizing the image by 400%. The results thus obtained BER comparison results have been shown in Fig. 16.
have been shown in Fig. 13.
• Compression attacks: For a good watermarking algorithm, it 5.3. Temper localization
is necessary that it survives the compression process effec-
tively such that the retrieval of the watermark is easily possi- One of the desired features of a watermarking system is that it
ble at the extraction step. Fig. 13 shows the results obtained, should be able to predict and localize the nature of attacks acting
after watermarked images are compressed with quality factor on the watermarked image. Usually many intruders replace the
of 40 using JPEG compression. portions of an image with portions of different image so that a
different message is conveyed. So a watermarking system should
It is evident from Table 5 that BER obtained is of small value and have the capability of correctly locating the attacked portions of
NCC value is high in case of robust logos embedded which implies
image. The results of the proposed scheme after different forgery
that our system is resilient to these attacks. This claim is authen-
attacks on the watermarked image are shown in Fig. 17. As seen
ticated with BER of less than 4% for extracted robust watermarks
from the results the proposed scheme can correctly locate the
and BER of greater than 40% for extracted fragile watermarks.
tempered portions of the watermarked image.
From Figs. 12 and 13, it is clear that the proposed Scheme II
robust watermark shows high resilience against JPEG compression
5.4. Security analysis
and fragile watermark watermarks are totally destroyed thereby
concluding that the data received has been tampered during tran-
The security strength of an encryption and cryptographic tech-
sit. And as such a recognizable robust watermark is extracted even
nique depends on secret keys as described by Kirchhoff’s principle
after compression quality factor of 40. So in all it can be concluded
[28]. Since, the cryptosystem is dependent only on the secret keys,
that the proposed technique is highly robust against all of the
therefore, it should be nearly impossible to retrieve the informa-
geometric, filtering, noise and compression attacks. The results
tion without the exact secret keys. So, the strength of security of an
in Fig. 12, Fig. 13 and Table 5 are sufficient to prove our claim for
encryption technique is dependent on sensitivity of the keys used
the Scheme II.
in the algorithm. The proposed watermarking system uses differ-
B. Robustness Analysis for Combined Attacks ent keys at the different stages of watermark generation discussed
Due to the fact that in real case scenario the watermarked in Section 3. While employing different keys for enhancing security
images undergo multiple attacks at a time instead of singular of the watermarking algorithm, the complexity has been taken into
attacks the proposed watermarking algorithm has been evaluated consideration. Although, high levels of security can be achieved by
for simultaneous multiple attacks. Different attacks were enforced using keys with large key space, the complexity of computations
on the watermarked images one after other and the results have to perform encryption also increase proportionally. So, an optimal
been shown in Table 6. For better analysis the proposed scheme has key space is used in the present work such that both key space and
been subjected to even three continuous attacks to claim working sensitivity requirements are met up to an efficient level. There are
of proposed scheme in a real case scenario. at least two sub-keys used during encryption: 6-bit key for Arnold
From Table 6, it is evident that the proposed watermarking encryption and 32-bit key for second level of novel encryption. The
algorithm shows high robustness even against hybrid attacks. After final master key length becomes 38 bits such that there can be up
almost all of attacks including geometric, noise, filtering and other to 238 keys possible. Hence a large computation power and time is
signal processing operations are applied in combination, recog- required for an adversary to obtain the correct key. Further, as the
nizable robust watermarks are retrieved. This proves the claim proposed watermarking system deals with images, a continuous
that proposed scheme shows high level of robustness to combined human monitoring is required for deciding whether the decrypted
attacks. The BER of greater than 55% shows weak resistance of watermark is meaningful or not. Adding all these factors it becomes
fragile watermark as such temper detection is easily achieved. almost impossible to crack into the algorithm without accurate
C. Comparative Analysis of Scheme II information about different keys.
The proposed robust watermarking technique is compared with
some state of art algorithms already proposed in literature. The 5.4.1. Key sensitivity analysis
proposed scheme is compared against Abrahim [42] for a color The keys used in the proposed algorithm are very sensitive to
image of size 512 × 512 and watermark of size 64 × 64. The any change. Even a single bit change in the key will give the results
comparison against the JPEG compression attack has been plotted that are totally meaningless. For analyzing the sensitivity of the
in Fig. 14 to show the effect on robust watermark. key used in the proposed algorithm a least possible change in the
Similarly, the comparison results of robust watermark against master key is done and the decrypted message is extracted.
various attacks have been plotted against [42] in Fig. 15. In Fig. 15 In the proposed algorithm, a master key ‘K’ comprising of two
BCE parameter is used to analyze the number of bits correctly sub-keys K1 and K2 , of length 6-bit and 32-bit respectively. Let
extracted between the two techniques under comparison. As ev- us suppose the value of K2 used at encryption is 865 765 757 and
ident from the figure the number of bits correctly extracted using if a change of just one bit is done such that value of K2 used at
proposed scheme are more for every attack under the consider- extraction is K2 ′ = 865 765 756. This change is analyzed with
ation. In case of cropping at 75% the proposed scheme performs K1 kept unchanged and the results are depicted in upper four
well as compared to scheme under comparison where watermark columns of Fig. 18. The Number of Pixels Change Rate (NPCR) is
is almost destroyed with only 1000 out of 4096 bits extracted used to measure the effect of changing the key on the encrypted
correctly. watermark by the proposed encryption algorithm. The parameter
The comparison results in terms of NCC and BER are presented NPCR is usually used to calculate the percentage of dissimilar pixel
in the Table 7. It could be seen that even after embedding the two values between two images [51]. As there are only two values
watermarks (fragile and robust) the proposed scheme shows better (0 and 1) in a binary watermark so an NCPR of above 50% on
results in terms of average NCC and BER than [42]. a single bit key change shows strength of encryption algorithm.
The proposed scheme II has been also compared with Ghe- Similarly, keeping K2 unchanged and changing K1 by one bit, say
bleh [44] for the color image of size 512 × 512 and watermark from K1 = 55 at encryption to K1′ = 56 at extraction, sensitivity
N.N. Hurrah, S.A. Parah, N.A. Loan et al. / Future Generation Computer Systems 94 (2019) 654–673 667

Table 5
Objective metrics of robust and fragile watermarks for cropping, filtering and noise attacks.
Attacks Watermark type Peppers Lena Aeroplane Medical
BER NCC BER NCC BER NCC BER NCC
Robust 7.25 1 8.20 0.99 8.45 0.99 6.50 1
Crop upper left (25%)
Fragile 22.14 0.75 25.41 0.72 24.74 0.73 24.20 0.70

Robust 7.27 0.99 8.22 0.98 8.65 0.99 8.45 0.99


Crop lower right (25%)
Fragile 22.88 0.74 25.88 0.73 23.31 0.73 24.54 0.72

Robust 14.59 0.98 16.43 0.97 18.07 0.96 16.62 0.97


Crop lower half (50%)
Fragile 45.16 0.49 50.21 0.45 62.08 0.40 59.82 0.43

Robust 1.04 0.99 2.34 0.98 1.90 0.98 0.09 0.99


Median filter [3,3]
Fragile 45.62 0.57 47.97 0.52 42.04 0.54 40.16 0.60

Robust 3.02 0.97 4.17 0.96 4.44 0.96 0.19 0.99


Low pass filter
Fragile 48.09 0.50 49.41 0.50 49.37 0.51 48.12 0.52

Robust 2.97 0.97 4.17 0.96 5.41 0.95 0.17 0.99


Average filter [3,3]
Fragile 50.02 0.51 47.97 0.50 49.70 0.51 48.21 0.54

Robust 0.65 0.99 1.56 0.98 2.27 0.98 0.12 0.99


Weiner filter [3,3]
Fragile 49.58 0.50 49.92 0.50 51.90 0.51 48.24 0.55

Robust 5.49 0.95 5.27 0.95 4.66 0.95 5.59 0.95


S & P noise (0.01)
Fragile 36.85 0.72 33.80 0.76 39.44 0.70 37.44 0.72

Robust 0.43 0.99 0.07 0.99 0.09 0.99 0.19 0.99


Gaussian noise (0.001)
Fragile 49.95 0.49 50.26 0.49 51.70 0.48 48.53 0.51

Robust 2.27 0.98 4.02 0.96 3.80 0.97 3.24 0.97


Speckle noise (0.01)
Fragile 47.68 0.54 49.63 0.50 51.46 0.48 51.22 0.49

Robust 2.63 0.97 3.14 0.97 2.82 0.97 2.88 0.97


Poisson noise (0.01)
Fragile 49.56 0.50 49.87 0.50 50.07 0.49 50.80 0.49

Fig. 12. Watermarked images and extracted watermarks after rotation attacks (θ = 15◦ ).

is checked. The decrypted logos extracted after this least possible MATLAB 2015b platform using Windows OS with processor Intel
alteration corresponding to K1 ′ key are presented in lower three Core i5-4600U@2.10 GHz and the resulted are shown in Table 8.
rows of Fig. 18. It is clear from the extracted logos that the key It is pertinent to mention that 64-bit key has been using while
used in the proposed algorithm is highly sensitive to any minute encrypting the data.
alteration. The encryption and decryption time has been found to be less
than 0.5 s which clearly shows that in addition to high security
the proposed algorithm is computationally fast. Hence an optimum
5.5. Run-time overheads of proposed encryption algorithm runtime overhead is offered by proposed algorithm and as such
suits for real-time IoT operations where response time should be
One of the important parameters for analyzing efficiency of fast. It is in place to mention here that [52] presents the encryption
an algorithm is the amount of time taken while encrypting and timing analysis, for an IoT based data securing system. It has been
decrypting the secret information. For an algorithm to be feasible shown that various encryption techniques used like, AES, Curupira
for high speed application, the execution time becomes even more and Trivium have a comparatively lesser computational overhead
important and in a real-time scenario it should be as minimum compared to our scheme. The increased encryption time in our
as possible. The experimental analysis in terms of execution time case could be attributed to use of double layer encryption (Arnold
of the proposed encryption algorithm has been performed on transform followed by proposed encryption algorithm).
668 N.N. Hurrah, S.A. Parah, N.A. Loan et al. / Future Generation Computer Systems 94 (2019) 654–673

Table 6
Analysis against combined (dual and triple) attacks.
Attacks Watermark type Peppers Lena Aeroplane Medical
BER NCC BER NCC BER NCC BER NCC
Robust 7.42 0.96 6.83 0.97 6.20 0.96 5.25 0.97
S & P Noise (0.01) + Gaussian Noise (0.001)
Fragile 49.68 0.50 49.65 0.49 48.77 0.51 48.00 0.48

Robust 2.12 0.98 2.39 0.98 3.05 0.98 2.09 0.99


S & P Noise (0.01) + MF (3 × 3)
Fragile 49.84 0.56 50.65 0.52 56.02 0.54 54.30 0.60

Robust 9.88 0.96 10.13 0.96 10.30 0.96 10.59 0.96


Rotate (10◦ ) + Crop (25%)
Fragile 55.01 0.60 60.50 0.54 58.01 0.55 60.10 0.52

Robust 11.40 0.96 11.66 0.96 11.40 0.96 11.45 0.96


Salt & Pepper + Crop (25%)
Fragile 60.40 0.57 59.62 0.55 63.79 0.53 63.04 0.54

Robust 3.12 0.99 3.61 0.98 4.02 0.98 4.27 0.98


Rotate (10◦ ) + Scaling (400%)
Fragile 61.13 0.58 61.02 0.48 57.63 0.51 57.64 0.61

Robust 6.41 0.97 5.85 0.98 5.95 0.97 6.02 0.98


Salt & Pepper + MF + Sharpening
Fragile 59.95 0.49 60.19 0.49 58.46 0.51 60.39 0.49

Robust 11.30 0.95 12.35 0.95 12.47 0.95 10.69 0.97


Sharp + Rotate (10◦ ) + Crop (25%)
Fragile 61.96 0.34 61.45 0.35 59.13 0.37 60.74 0.35

Robust 11.28 0.95 12.43 0.95 12.37 0.95 12.09 0.95


Rotate (10◦ ) + Scaling (400%) + Crop (25%)
Fragile 57.01 0.60 62.50 0.54 62.01 0.55 58.21 0.52

Fig. 13. The watermarked image and extracted watermark after rescaling and JPEG compression.

Fig. 14. Comparison of Scheme II with Abrahim [42] for JPEG compression.

5.6. Summary and discussion of different techniques used for compar- processing attacks including unintentional and geometric attacks.
ison At the same time temper detection is reported on any kind of attack
on the watermarked image through fragile watermark. From the
The comparison results show the superiority of the proposed results it is clear that the fragile watermark does not withstand
scheme against some already reported state of art schemes. The any of the signal processing attacks and hence suits perfectly for
proposed scheme has proven to be robust against all of the signal medical and high security applications where a single bit change
N.N. Hurrah, S.A. Parah, N.A. Loan et al. / Future Generation Computer Systems 94 (2019) 654–673 669

Fig. 15. Comparison of Scheme II with Abrahim [42] for various attacks.

Table 7
Comparative analysis of Scheme II against different attacks.
Attack Lena Baboon Flower
[42] Proposed [42] Proposed [42] Proposed
NCC BER NCC BER NCC BER NCC BER NCC BER NCC BER
No attack 1 0 1 0 1 0 1 0 1 0 1 0
Salt & Pepper .97 .0391 .96 .0556 .9680 .0449 .956 .0639 .9835 .0234 .976 .045
Poisson .9713 .1270 .996 .0028 .9137 .1201 .994 .0048 .9390 .0859 .996 .002
Speckle .91 .1211 .97 .0161 .8986 .1406 .986 .0188 .9254 .1045 .986 .019
Avg. Filtering .9451 .0771 .96 .0417 .7991 .2686 .843 .2110 .8156 .2471 .819 .0883
Gaussian LPF .9993 .0010 1 .0024 .9563 .0615 .9928 .0068 .9827 .0244 1 0
Sharpening .9455 .0781 .975 0.066 .7888 .3008 .975 .0615 .8470 .2246 .977 .0621
Cropping 25% .7500 .2500 1 .0166 .7500 .2500 1 .0366 .7500 .2500 1 .0366
Cropping 50% .5000 .5000 .998 .0753 .5000 .5000 .999 .0712 .5000 .5000 .998 .0717
Cropping 75% .2500 .7500 .989 .073 .2500 .7500 .959 .089 .2500 .7500 .988 .0898
LSB reset (1or 2) 1 0 1 0 1 0 1 0 1 0 1 0
LSB reset (1–3) 1 .0117 1 0 .9959 .0059 .9973 .0036 .9857 .0205 1 .0100
LSB reset (1–4) .9205 .1104 .974 .0567 .9214 .1094 .9632 .0773 .9152 .1191 .975 .0623
Resizing 50% .9633 .0518 .99 .001 .8188 .2441 0.97 .0134 .8374 .2187 .999 .0042

Table 8 as NCC greater than 0.96 has been obtained when watermarked
Timing analysis of run time overheads. image is subjected to singular attacks. The NCC is greater than
Message size (bytes) Encryption time (ms) Decryption time (ms) or equal to 0.95 for combined attacks while other schemes have
512 410 356 not tested this case scenario due to their weak robustness. For
256 277 245
JPEG compression with quality factor (QF) less than 30 the pro-
128 183 167
64 97 81 posed Scheme I offers less robustness than [43]. In addition to
32 54 48 high robustness the proposed Scheme II is able to achieve tamper
16 31 28 detection and localization without effecting the imperceptivity.
8 22 20
The proposed technique (Scheme II) can be improved in to correct
the detected tampered region, as the presented version is only able
to detect the tampered region.
can totally produce judgmental errors. Table 9 shows the summary
of different techniques used for comparison in this work. 6. Conclusion
As evident from Table 9, proposed technique offers a best com-
bination of different requirements needed by an application from In this paper two new watermarking schemes namely Scheme
a watermarking scheme. It provides adequate security, robustness, I and Scheme II have been proposed for copyright protection and
payload and imperceptivity as has been analyzed and presented in authentication of digital content exchanged through insecure net-
depth in Section 5. The imperceptivity of the proposed technique works. The schemes have been evaluated for gray-scale, color and
is more than 40 dB in all the cases which is nearly same or more medical images. Scheme I uses combined features of DWT and DCT
than rest of the schemes under comparison. The proposed scheme to embed a robust watermark in a gray-scale image. Scheme II
offers very high security and a single bit change in secret key results embeds a robust watermark and a fragile logo in the host RGB
in an extracted watermark with no meaningful information, as image. Scheme I has been developed with an aim to develop a
discussed in Section 5.4. The robustness of the scheme is very high highly robust watermarking framework for copyright protection
670 N.N. Hurrah, S.A. Parah, N.A. Loan et al. / Future Generation Computer Systems 94 (2019) 654–673

Fig. 16. Extracted watermark after different attacks and BER comparison with Ghebleh [44].

Fig. 17. Temper localization results in case of different forgery attacks.


N.N. Hurrah, S.A. Parah, N.A. Loan et al. / Future Generation Computer Systems 94 (2019) 654–673 671

Fig. 18. Extracted watermarks with variation in keys, K1 and K2 .

Table 9
Comparative analysis of proposed schemes against different techniques.
Scheme Benoraira [33] Hu et al. [43] Proposed Scheme I Abrahim [42] Ghebleh [44] Proposed Scheme II
Cover image Gray Gray Gray Color Color Color
Embedding domain Transform Transform Transform Spatial Transform Spatial + Transform
Watermark embedded Robust Robust Robust Robust Robust Robust + Fragile
Watermark type Binary Binary Binary Binary Binary Binary
Watermark size 16 × 16 64 × 64 64 × 64 or 16 × 16 64 × 64 96 × 36 64 × 64 or 96 × 36
Imperceptivity (SSIM) ∼1 ∼1 ∼1 ∼1 ∼1 ∼1
Robustness Low Medium High Medium Low High
Analysis for hybrid attacks Not done Not done High Not done Not done High
Security Low Low High Low Low High
Tamper detection No No No No No Yes
Localization No No No No No Yes

applications, which takes care of singular as well as hybrid attacks. by Department of Science and Technology (DST) New Delhi, India
It has been found that Scheme I shows better robustness against under DST inspire scheme.
various image processing attacks such as resizing, cropping, scal-
ing, filtering, random noise compared to various state-of-art tech- References
niques. Further, the embedded watermark is highly secure as it is
provided with a double layer of security. As such Scheme I can find [1] Y. Liu, L. Nie, L. Han, L. Zhang, D.S. Rosenblum, Action2Activity: Recognizing
wide range of applications in the areas of multimedia copyright complex activities from sensor data, in: IJCAI (Vol. 2015), 2015, pp. 1617–
protection. In certain situations, besides copyright protection the 1623.
content authentication of multimedia objects is of greater impor- [2] Y. Liu, L. Nie, L. Liu, D.S. Rosenblum, From action to activity: sensor-based
activity recognition, Neurocomputing 181 (2016) 108–115.
tance. For such situation Scheme II has been developed and tested.
[3] M.M. Ahsan, I. Ali, M.Y.I.B. Idris, M. Imran, M. Shoaib, Countering statistical
The results prove that the fragile watermark embedded into the attacks in cloud-based searchable encryption, Int. J. Parallel Program. (2018)
cover image shows high sensitivity for all the image processing 1–26.
and geometric attacks. The fragile watermark gets destroyed even [4] Statista. Annual number of data breaches and exposed records in the
if a minute change is made to the watermarked media. The fragile United States from 2005 to 2018 (in millions). URL https://www.statista.
watermark serves the purpose of initial stage authentication. If the com/statistics/273550/data-breaches-recorded-in-the-united-states-by-
number-of-breaches-and-records-exposed/.
extracted watermark is same as embedded one, i.e. error free, it is
[5] Z. Ali, M. Imran, M. Alsulaiman, T. Zia, M. Shoaib, A zero-watermarking
considered to be authentic, otherwise the decision could be used algorithm for privacy protection in biomedical signals, Future Gener. Comput.
to make a retransmission request. One of the main issues with the Syst. 82 (2018) 290–303.
proposed approach, is that we are only able to detect a tampered [6] Healthcare IT News. 128, 000 records breached in ransomware
region in an image. Scheme II in its present form is unable to correct attack on Arkansas Oral Facial Surgery Centre (2017). URL http:
the tampered region. We intend to extend the work to facilitate //www.healthcareitnews.com/news/ransomware-attack-breaches-128000-
patient-records-arkansas-provider.
recovery of the image after tamper has been localized. Further, the
[7] Healthcare IT News. The biggest healthcare breaches of 2017 (2017).
schemes will also be tested for watermarking in video files. URL https://www.healthcareitnews.com/slideshow/biggest-healthcare-
breaches-2017-so-far?page=8.
Acknowledgments [8] J.A. Kaw, N.A. Loan, S.A. Parah, K. Muhammad, J.A. Sheikh, G.M. Bhat, A re-
versible and secure patient information hiding system for iot driven e-health,
Int. J. Inf. Manag. (2018) Available at: http://dx.doi.org/10.1016/j.ijinfomgt.
This publication is an outcome of the R&D work undertaken
2018.09.008.
project under the Visvesvaraya PhD Scheme of Ministry of Elec- [9] Healthcare Informatics. 4.4M Patient Records Breached in Q3 2018, Protenus
tronics & Information Technology, Government of India, being Finds. (2018). URL https://www.healthcare-informatics.com/news-item/
implemented by Digital India Corporation and in part is supported cybersecurity/44m-patient-records-breached-q3-2018-protenus-finds.
672 N.N. Hurrah, S.A. Parah, N.A. Loan et al. / Future Generation Computer Systems 94 (2019) 654–673

[10] I. Yaqoob, E. Ahmed, M.H. Rehman, A.I.A. Ahmed, M.A. Al-Garadi, M. Imran, [34] X. Kang, J. Huang, Y.Q. Shi, Y. Lin, A DWT-DFT composite watermarking
M. Guizani, The rise of ransomware and emerging security challenges in the scheme robust to both affine transform and jpeg compression, IEEE Trans.
internet of things, Comput. Netw. 129, Part 2 (2017) 444–458. Circuits. Syst. Vid. 13 (2003) 776–786, http://dx.doi.org/10.1109/TCSVT.2003.
[11] Norwich University Online. Healthcare Data Breaches - The Costs 815957.
and Solutions. (2016). URL https://online.norwich.edu/academic- [35] A. Al-Haj, Combined dwt-dct digital image watermarking, J. Comput. Sci. 3 (9)
programs/masters/nursing/resources/infographics/healthcare-data- (2007) 740–746.
breaches-the-costs-and-solutions. [36] Nasrin M. Makbol, Bee Ee Khoo, Taha H. Rassem, Khaled Loukhaoukha, A new
[12] Business Standard. Indian films make $2 bn - but lose $2.7 bn to piracy. reliable optimized image watermarking scheme based on the integer wavelet
(2016). URL http://www.business-standard.com/article/news-ians/indian- transform and singular value decomposition for copyright protection, Inform.
films-make-2-bn-but-lose-2-7-bn-to-piracy-116082100356_1.html. Sci. 417 (2017) 381–400.
[13] Liye Ma, Alan Montgomery, Michael D. Smith, The Dual Impact of Movie Piracy [37] R. Hamza, K. Muhammad, A. Nachiappan, G.R. González, Hash based encryp-
on Box-Office Revenue: Cannibalization and Promotion (2016). Available at tion for keyframes of diagnostic hysteroscopy, IEEE Access 6 (2017) 60160–
SSRN: https://ssrn.com/abstract=2736946. 60170, http://dx.doi.org/10.1109/ACCESS.2017.2762405.
[14] Y. Liu, L. Zhang, L. Nie, Y. Yan, D.S. Rosenblum, Fortune teller: predicting your [38] S.A. Parah, J.A. Sheikh, N. Dey, G.M. Bhat, Realization of a new robust and
career path, in: AAAI (Vol. 2016), 2016, pp. 201–207. secure watermarking technique using dc coefficient modification in pixel
[15] Christian Peukert, Claussen Jörg, Kretschmer Tobias, Piracy and box office domain and chaotic encryption, J. Global Inf. Manage. (JGIM) 25 (4) (2017)
movie revenues: evidence from megaupload (january 17, 2017), Int. J. Ind. 80–102.
Organ. 52 (2017) 188–215, Available at SSRN: http://dx.doi.org/10.2139/ssrn. [39] A.A. Shah, S.A. Parah, Chaos based novel cryptographic technique based on a
2176246. new logistic map, Int. J. Soc. Comput. Cyber-Phys. Syst. 2 (1) (2017) 73–94.
[16] Jonathan Lee, Pirate Purchase, Publicize: The Effect of Private-Network File [40] K. Muhammad, M. Sajjad, S.W. Baik, Dual-level security based cyclic18
Sharing on Album Sales. (2016) Queen’s University, Department. Working steganographic method and its application for secure transmission of
paper, 1354. [Online]. Available: http://hdl.handle.net/10419/149080. keyframes during wireless capsule endoscopy, J. Med. Syst. 40 (5) (2016) 114.
[17] Imke Reimers, Can private copyright protection be effective? evidence from [41] Z. Ali, M. Imran, M. Alsulaiman, M. Shoaib, S. Ullah, Chaos-based robust
book publishing, J. Law Econ. 59 (2) (2016) 411–440. method of zero-watermarking for medical signals, Future Gener. Comput.
[18] K. Muhammad, M. Sajjad, I. Mehmood, S. Rho, S.W. Baik, A novel magic LSB Syst. (2018) http://dx.doi.org/10.1016/j.future.2018.05.058.
substitution method (M-LSB-SM) using multi-level encryption and achro- [42] J. Abraham, V. Paul, An imperceptible spatial domain color image watermark-
matic component of an image, Multimedia Tools Appl. 75 (22) (2016) 14867– ing scheme, J. King Saud Univ.-Comput. Inf. Sci. (2016) http://dx.doi.org/10.
14893. 1016/j.jksuci.2016.12.004.
[19] N.A. Loan, S.A. Parah, J.A. Sheikh, J.A. Akhoon, G.M. Bhat, Hiding electronic [43] H.T. Hu, L.Y. Hsu, A mixed modulation scheme for blind image watermarking,
patient record (epr) in medical images: a high capacity and computationally AEU-Int. J. Electron. Commun. 70 (2) (2016) 172–178.
efficient technique for e-healthcare applications, J. Biomed. Inf. 73 (2017) [44] M. Ghebleh, A. Kanso, H.S. Own, A blind chaos-based watermarking technique,
125–136. Secur. Commun. Netw. 7 (4) (2014) 800–811.
[20] K. Muhammad, M. Sajjad, I. Mehmood, S. Rho, S.W. Baik, Image steganogra- [45] M. Botta, D. Cavagnino, V. Pomponiu, A modular framework for color image
phy using uncorrelated color space and its application for security of visual watermarking, Signal Process. 119 (2016) 102–114.
contents in online social networks, Future Gener. Comput. Syst. (2016) http: [46] H. Shi, M.C. Li, C. Guo, R. Tan, A region-adaptive semi-fragile dual watermark-
//dx.doi.org/10.1016/j.future.2016.11.029. ing scheme, Multimedia Tools Appl. 75 (1) (2016) 465–495.
[21] S.A. Parah, J.A. Sheikh, J.A. Akhoon, N.A. Loan, Electronic Health Record hid- [47] Z. Ali, M.S. Hossain, G. Muhammad, M. Aslam, New zero-watermarking al-
ing in Images for smart city applications: A computationally efficient and gorithm using hurst exponent for protection of privacy in telemedicine, IEEE
reversible information hiding technique for secure communication, Future Access 6 (2018) 7930–7940.
Gener. Comput. Syst. (2018) http://dx.doi.org/10.1016/j.future.2018.02.023.
[48] V.I. Arnold, A. Avez, Ergodic problems of classical mechanics, in: Advanced
[22] I. Cox, M. Miller, J. Bloom, J. Fridrich, T. Kalker, Digital Watermarking and Book Classics, Benjamin, 1968.
Steganography, second ed., Morgan Kaufmann Publishers Inc., San Francisco,
[49] M. Li, T. Liang, Y. He, Arnold transform based image scrambling method,
CA, USA, 2008.
Atlantis press 130 (2013) 9–1316.
[23] S.A. Parah, J.A. Sheikh, N.A. Loan, F. Ahad, G.M. Bhat, Utilizing neighborhood
[50] W. Zhou, A.C. Bovik, E.P. Simoncelli, Image quality assessment: from error
coefficient correlation: A new image watermarking technique robust to sin-
visibility to structural similarity, IEEE Trans. Image Process. 13 (4) (2004) 600–
gular and hybrid attacks, Multidimens. Syst. Signal Process. 29 (3) (2018)
612.
1095–1117.
[51] A. Webster, S.E. Tavares, On the design of s-boxes, in: Conference on the
[24] G. Bhatnagar, B. Raman, Q. Wu, Robust watermarking using fractional wavelet
Theory and Application of Cryptographic Techniques, Springer, 1985, pp. 523–
packet transform, IET Image Process. 6 (4) (2012) 386–397.
534.
[25] S.A. Parah, J.A. Sheikh, U.I. Assad, G.M. Bhat, Realisation and robustness eval-
[52] Geovandro C.C.F. Pereira, Renan C.A. Alves, Felipe L. da Silva, Roberto M.
uation of a blind spatial domain watermarking technique, Int. J. Electron. 104
Azevedo, Bruno C. Albertini, Cíntia B. Margi, Performance evaluation of cryp-
(4) (2017) 659–672.
tographic algorithms over IoT platforms and operating systems, Secur. Com-
[26] H. Zhang, C. Wang, X. Zhou, Fragile watermarking for image authentication
mun. Netw. 2017 (2017) 2046735, http://dx.doi.org/10.1155/2017/2046735.
using the characteristic of SVD, Algorithms 10 (1) (2017) 27.
[27] N.N. Hurrah, N.A. Loan, S.A. Parah, J.A. Sheikh, A transform domain based
robust color image watermarking scheme for single and dual attacks, in: In
Image Information Processing (ICIIP), 2017 Fourth International Conference Nasir N. Hurrah is a doctoral student in the Depart-
on, IEEE, 2017, pp. 1–6. ment of Electronics and IT, University of Kashmir. He is
[28] Z. Yan, P. Zhang, A.V. Vasilakos, A survey on trust management for internet of pursuing Ph.D. under VISVESVARAYA PHD Scheme for
things, J. Netw. Comput. Appl. 42 (2014) 120–134. Electronics and I.T., sponsored by Ministry of Electronics
[29] S.A. Parah, J.A. Sheikh, G.M. Bhat, StegNmark: a joint stego-watermark ap- & Information Technology Government of India and is
proach for early tamper detection, in: In Intelligent Techniques in Signal currently working on the Development of Robust image
Processing for Multimedia Security, Springer, Cham, 2017, pp. 427–452. watermarking techniques for copyright protection and
[30] Y. Zhao, P. Campisi, D. Kundur, Dual domain watermarking for authentication authentication.
and compression of cultural heritage images, IEEE Trans. Image Process. 13
(2004) 430–448, http://dx.doi.org/10.1109/TIP.2003.821552.
[31] L.P. Feng, L.B. Zheng, P. Cao, A DWT-DCT based blind watermarking algorithm
for copyright protection, in: 3rd IEEE International Conference on Computer
Science and Information Technology (ICCSIT), Vol. 7, 2010, pp. 455–458, http: Shabir A. Parah has completed his M.Sc., M. Phil and
//dx.doi.org/10.1109/ICCSIT.2010.5565101. Ph.D. in Electronics from University of Kashmir, Srinagar
[32] R.H. Laskar, M. Choudhury, K. Chakraborty, S. Chakraborty, Computer net- in the year 2004, 2010 and 2013 respectively in the field
works and intelligent computing. communications in computer and infor- of Signal processing and Data hiding. He is working as
mation science, in: A Joint DWT-DCT Based Robust Digital Watermarking Assistant Professor in the department of Electronics and
Algorithm for Ownership Verification of Digital Images, Vol. 157, Springer I.T, University of Kashmir, Srinagar. His fields of interest
Berlin, Germany, 2011, pp. 482–491, http://dx.doi.org/10.1007/978-3-642- are Multimedia Signal Processing, Secure Communica-
22786-8_61. tion, Digital Watermarking and Steganography. Dr. Shabir
[33] A. Benoraira, K. Benmahammed, N. Boucenna, Blind image watermarking A. Parah has guided about twenty five PG projects. He
technique based on differential embedding in DWT and DCT domains, has published more than 100 research papers in Interna-
EURASIP J. Adv. Signal Process. 2015 (1) (2015) 55. tional/National journals and conference proceedings.
N.N. Hurrah, S.A. Parah, N.A. Loan et al. / Future Generation Computer Systems 94 (2019) 654–673 673

Nazir A. Loan is a doctoral scholar in the Department of Supercomputing. Besides, he is an Associate Editor of several journals such as IEEE
Electronics and IT, University of Kashmir and is currently Access, and PLOS One journal. Dr. Elhoseny guest-edited several special issues
working on the Development of Robust watermarking at many journals published by IEEE, Hindawi, Springer, Inderscience, and MDPI.
algorithms for multimedia applications. He is INSPIRE Moreover, he served as the co-chair, the publication chair, the program chair, and a
fellow of Department of Science and Technology Govern- track chair for several international conferences published by IEEE and Springer.
ment of India. Dr. Elhoseny is a TPC Member or Reviewer in 30+ International Conferences
and Workshops. Furthermore, he has been reviewing papers for 20+ International
Journals including IEEE Communications Magazine, IEEE Transactions on Intelligent
Transportation Systems, IEEE Sensors Letters, IEEE Communication Letters, Elsevier
Computer Communications, Computer Networks, Sustainable Cities and Society,
Wireless Personal Communications, and Expert Systems with Applications.

Javaid A. Sheikh has completed his M.Sc., M. Phil and


Ph.D. in Electronics from University of Kashmir, Srina- Khan Muhammad is a researcher at Intelligent Media
gar in the year 2004, 2008 and 2012 respectively in Laboratory (IM Lab), Sejong University, Seoul, South Ko-
the field of communications and Signal Processing. He rea. His research interests include medical image analysis
is working as Assistant Professor in the department of (brain MRI, diagnostic hysteroscopy and wireless cap-
Electronics and I.T University of Kashmir, Srinagar. His sule endoscopy), information security (steganography,
fields of interest are Wireless Communications, design encryption, watermarking and image hashing), video
and development of efficient MIMO OFDM based wireless summarization, multimedia, computer vision, fire/smoke
communication techniques, Spread Spectrum modula- detection and surveillance video analysis. He has pub-
tion, Digital Signal Processing, Electromagnetics. He has lished over 50 papers in peer-reviewed international
published about ninety research papers in International journals and conferences in these research areas with
and National journals and conference proceedings. target venues as IEEE TII, TIE, TSMC-Systems, IoT, Access,
TSC, Elsevier IJIM, INS, Neurocomputing, PRL, FGCS, COMCOM, COMIND, JPDC, PMC,
BSPC, CAEE, Springer MTAP, JOMS, and RTIP, etc. He is serving as a professional
Mohamed Elhoseny received the Ph.D. degree in Com- reviewer for over 40 well-reputed journals and conferences including IEEE TII,
puter and Information from Mansoura University, Egypt COMMAG, NETWORK, WCOM, IoT, TIP, TCSVT, TVT, Access, ACM TMCCA, Elsevier
(in a scientific research channel with Department of FGCS, IJIM, INS, INFFUS, Neurocomputing, PRL, JNCA, COMCOM, SIGPROC, COMNET,
Computer Science and Engineering, University of North COMIND, JPDC, CAEE, Springer MTAP, MONET, JOMS, SIVP, EURASIP JIVP, T& F
Texas, USA). Dr. Elhoseny is currently an Assistant Pro- Journal of Experimental and Theoretical AI, SAGE IJDSN, CCCT 2015, ICNC 2017,
fessor at the Faculty of Computers and Information, Man- AINA 2017, and CMES-2018. He also acted as TPC member of AINA 2017 for the
soura University. Collectively, Dr. Elhoseny authored/co- track ‘‘Multimedia Systems and Applications’’. He is currently involved in editing of
authored over 70 International Journal articles, Con- several special issues as GE/LGE. He is a member of the IEEE.
ference Proceedings, Book Chapters, and 3 Springer
books. Dr. Elhoseny serves as the Editor-in-Chief of
Big Data and Cloud Innovation Journal and Frontiers of

You might also like