Professional Documents
Culture Documents
‘Aqilah Abd. Ghani1, Syifak Izhar Hisham1, Nur Alya Afikah Usop1 , Nasrul Hadi Johari2
1
Faculty of Computing, University Malaysia Pahang, Pahang, Malaysia
2
Faculty of Mechanical and Automotive Engineering Technology, University Malaysia Pahang, Pahang, Malaysia
Corresponding Author:
‘Aqilah Abd. Ghani
Power Electronics and Renewable Energy Research Laboratory (PEAR-L), University of Malaya
Balai Cerap UTM, Lengkok Suria, 81310 Skudai, Johor, Malaysia
Email: saad@um.edu.my
1. INTRODUCTION
Crimes related to cyber abuse such as cheating, harassment, scam, dispersion of fake news and
private data, attack almost every online user nowadays. This so called ‘complicated cybercrimes’ happen
because of an unfair technology [1]. Hence, the manipulated image is included. Taking a picture of payment
receipt, medical information, registration form, workers agreement and document related due to the
development of smart gadgets. According to [2], anyone can steal private information from the computer
screen by taking a picture without any leaving evidence. Thus, this issue needs a pivotal security such as
image authentication system. To ensure the image is original, free form any attacks, the authentication
process is need.
One of the techniques to implement the authentication process is using digital image watermarking, the act
of embedding secret data to an image for security [3]. As for the authentication purpose, fragile image
watermarking in spatial domain was chosen. As stated by [4], fragile domain watermarking suitable with
authentication demanding because of its characteristic. While, to embed the watermark, an image needs to
have some compression which most of the researchers use the conventional lossless image compression,
raster pattern before watermark embedding. The usage of raster paster causes the redundancy of an image [5]
which can affect the image output. A scheme from [6] implemented the mapping sequence method before
watermark embedding state that the hacking process will become easier when using basic raster pattern.
Thus, to ensure the security of confidential images are at the top, different numbering pattern need to
implement.
Recent strategy related to image watermarking for authentication purpose have detection, localization, and
recovery features [7]. Most of the scheme used block-wise approach for watermark embedding.
2. METHOD
2.1. Research Design
To complete the study in a strategic way, this research consists of three main segmentations, namely
planning and analysis, development and testing, and conclusion. more on improving the algorithm. To
illustrate this, Figure 1 shows the research design.
Digital watermarking has two general techniques which are visible and invisible watermark with
two main domains, spatial and transform [8] [9]. The main feature in transform domain is robustness, while
spatial domain usually known with fragile. As mentioned before, fragile watermarking suit with
authentication purpose because of the private key based feature, which the embedded watermark can stand
with various modifications [10]. Also, it can detect and localize the tampered area of the image itself.
TELKOMNIKA Telecommun Comput El Control, Vol. 99, No. 1, Month 2099: 1-1x
TELKOMNIKA Telecommun Comput El Control 3
processing time of localization phase. While, the intensity of each sub-block, Cs use as recovery watermark.
Watermark bits from the comparison of average intensity of block, AvgC and average intensity of sub-block,
AvgCs denote as v. If AvgC is bigger than AvgCs, v is equal to 0, while if AvgCs is lower than AvgC, v is
equal to 1 as shown in equation below:
Zigzag SCAN is one of the 15 basic SCAN patterns which can be extended or reduced by specific
application and six transformations of SCAN patterns [16]. This pattern was also known as the Zigzag
pattern, which [17] used Zigzag order for embedding and extracting binary watermark generated by a secret
key which 2-D Cartesian pixels was mapped into 1-D position in Zigzag order. Another study of the diagonal
SCAN pattern by [18] mentioned that diagonal sub-scans scanning move constantly from top-left to the
TELKOMNIKA Telecommun Comput El Control, Vol. 99, No. 1, Month 2099: 1-1x
TELKOMNIKA Telecommun Comput El Control 5
bottom-right corner inside the transform block of the processed image. In term of image encryption, the
benefits of Zigzag SCAN is it produced good key sequence and strong enough to fight from differential
attacks [19]. Figure 5 illustrated the numbers movement of 4 × 4 image block in the text image sample using
Zigzag SCAN pattern from the workspace of MATLAB software.
3. PROPOSED SCHEME
The proposed scheme of Zigzag-LSB adapted from [20] consist of block numbering and mapping,
watermark generation and embedding, tampered detection and localization, and finally the recovery phases.
Each step of those phases is elaborate as below:
1) Block numbering and mapping: This phase as shown in Fig.6 aim to ensure the watermark bits
embed far from the original bits of the cover image. The Zigzag SCAN was chosen as a mapping
sequence to give the simple yet efficient route for image block numbering. As the cover image was
first divided into 8×8, each blocks present as one number which next will follow the forward Zigzag
SCAN with 15 diagonals orientation as in Fig.7. After the numbering place is located, the 3-tuple
watermark is embedded into the LSB of each sub-block. The mapping and embedding process
occur using one dimensional transformation equation as below:
𝑩 = [(k × o) mod 𝑵𝒃 ] + 1
Paper’s should be the fewest possible that accurately describe … (First Author)
6 ISSN: 1693-6930
2) Watermark generation and embedding: This phase as shown Fig.8 generate the watermark bits
from the block division, C (8 × 8) and sub-block division, Cs (4 × 4) of the cover image. The
watermark bits namely 3-tuple watermark consists of average intensity, v, parity check bit, p, and
recovery bits, r. The average intensity of C (AvgC) and average intensity of Cs (AvgCs) need to
compare before watermark embedding take place. From Cs, the parity bits, p is obtained. While the
recovery bits, r generate from the intensity bit of C after the block mapping process. The steps for
watermark generation are:
TELKOMNIKA Telecommun Comput El Control, Vol. 99, No. 1, Month 2099: 1-1x
TELKOMNIKA Telecommun Comput El Control 7
3) Detection, localization, and recovery: This phase as shown in Fig.9 operate after the
watermarked image was tampered with possible attacks. The two-level detection
implemented to get the best result of detection range and accuracy. For the first level
detection. The average v of the sub-block, Cs (4 × 4) is compared with average v to get the
value of v’ either 1 or 0. The total number of 1s in average Cs (AvgCs) state as Ps. If Ps is
even, p’ equal to 1, otherwise p’ equal to 0. Lastly, to know whether Cs was tampered, p’ is
compare with v’. If both equal, the Cs is marked as valid block. While level-2 detection is
for each valid block of C (8 × 8). The 7-bit intensity from each Cs is obtain by extracting
the Least Significant Bits (LSB) from each pixel of valid block C. Then, one zero is
padding to the end to make an 8-bit value. The valid block C is compared with AvgCs, if
the value is different, the block C mark as tampered. For recovery phase, both tampered
block C and Cs denote as T. First, the block number of recovery bits, R is calculated and
locate. The 7-bit is intensity of each Cs within block T, one zero is padding to the end to
make an 8-bit value which the new intensity of pixels will be created. Finally, the intensity
of each pixel within Cs need to replace with this new intensity to recover back all the
tampered blocks.
Paper’s should be the fewest possible that accurately describe … (First Author)
8 ISSN: 1693-6930
𝑀𝐴𝑋𝑓
𝑃𝑆𝑁𝑅 = 20 log10 ( )
√𝑀𝑆𝐸
TELKOMNIKA Telecommun Comput El Control, Vol. 99, No. 1, Month 2099: 1-1x
TELKOMNIKA Telecommun Comput El Control 9
4.2. Transparency
Transparency is one of the characteristics of efficient digital watermarking scheme, which is the quality
of the host images remain the same after watermark embedding [22]. Hence, to know the transparency of the
watermarked image, the comparison between original cover image and its watermarked image need to
validate. From the naked eyes, there are no different between them in term of the image’s interface. The
original content of the host image can be seen clearly after the watermarking process occur. Table 2 shows
the comparison of example PNG and BMP formats between original host image and watermarked image in
different sizes, dimensions, contents, and types of text document.
Paper’s should be the fewest possible that accurately describe … (First Author)
10 ISSN: 1693-6930
PNG
BMP
4.3. Robustness
To know the proposed scheme can detect, locate, and recover the tampered area of the cover image, the
watermarked image needs to manipulate with appropriate attacks. The benchmark study for selected attacks
is come from [23], which is general tampering attack (insertion), collage attack (image splicing and deletion).
Table 3 shows the explanations and examples of each attack mentioned with tampered areas detection. The
tampered area is red in color. Whereas, to prove that the proposed Zigzag-LSB can cover overall size and
dimension of the cover images, the implementation of attacks occurs in three different locations. The
locations are at the top, at the center, and the top. The results show that each location of attacks can be detect
and localize clearly. Table IV shows the example results of tampered area detection. The tampered area red
in color.
TELKOMNIKA Telecommun Comput El Control, Vol. 99, No. 1, Month 2099: 1-1x
TELKOMNIKA Telecommun Comput El Control 11
General tampering
(Tampered both
image content and
watermark)
Example: Insertion
Attack
Collage attack
(Tampered based on
block-independent)
Example: Image
Splicing Attack
Collage attack
(Tampered based on
block-independent)
Example: Deletion
Attack
Top Success
Paper’s should be the fewest possible that accurately describe … (First Author)
12 ISSN: 1693-6930
Centre Success
Bottom Success
(a) (b)
Figure. 10 PNG image format: (a) Tampered detection and localization image (b) Recovery image.
TELKOMNIKA Telecommun Comput El Control, Vol. 99, No. 1, Month 2099: 1-1x
TELKOMNIKA Telecommun Comput El Control 13
(a) (b)
Figure. 11 BMP image format: (a) Tampered detection and localization image (b) Recovery image .
Paper’s should be the fewest possible that accurately describe … (First Author)
14 ISSN: 1693-6930
Table 5. Average Processing Time for Watermark Embedding and Tampered Detection Phases
Figure. 12 The graph of watermark embedding processing time for PNG image format.
TELKOMNIKA Telecommun Comput El Control, Vol. 99, No. 1, Month 2099: 1-1x
TELKOMNIKA Telecommun Comput El Control 15
Figure. 13 The processing time of watermark embedding for PNG image format.
Figure. 14 The processing time of watermark embedding for PNG image format.
Figure. 15 The processing time of detection and localization for BMP image format
Paper’s should be the fewest possible that accurately describe … (First Author)
16 ISSN: 1693-6930
Table 7. Average PSNR Value for Watermark Embedding and Recovery Phase
Figure. 16 The PSNR value of watermark embedding for PNG and BMP image format.
5. CONCLUSION
This research proves that Zigzag-LSB result to an efficient digital image watermarking scheme especially
in term of computational complexity and transparency. The average processing time of watermark
embedding for both PNG and BMP image format are less than 60 second. While the average processing time
for detection, localization, and recovery phase are also quite fast. The PSNR value for watermarked images is
also high with an average of 56.0 dB for PNG and 61.2 dB for BMP. Hence, the usage of Zigzag SCAN
pattern for image mapping and numbering before watermark embedding is good to authenticate the text
image samples with different size, dimension, contents, and sources. The implementation of 3-tuple
watermark (v,p,r), Least Significant Bit (LSB), and 2-level detection also contribute to the successfully of the
TELKOMNIKA Telecommun Comput El Control, Vol. 99, No. 1, Month 2099: 1-1x
TELKOMNIKA Telecommun Comput El Control 17
proposed scheme for authentication purpose. As Zigzag-LSB is develop for PC-based only, developing a
scheme for mobile application is considered as future work.
REFERENCES
[1] H. Aldawood and G. Skinner, “Educating and Raising Awareness on Cyber Security Social Engineering: A Literature
Review,” Proc. 2018 IEEE Int. Conf. Teaching, Assessment, Learn. Eng. TALE 2018, no. December, pp. 62–68, 2019, doi:
10.1109/TALE.2018.8615162.
[2] H. Fang, W. Zhang, H. Zhou, H. Cui, and N. Yu, “Screen-Shooting Resilient Watermarking,” IEEE Trans. Inf. Forensics
Secur., vol. 14, no. 6, pp. 1403–1418, 2019, doi: 10.1109/TIFS.2018.2878541.
[3] S. A. Pinjari and N. N. Patil, “A pixel based fragile watermarking technique using LBP (Local Binary Pattern),” Proc. - Int.
Conf. Glob. Trends Signal Process. Inf. Comput. Commun. ICGTSPICC 2016, pp. 194–196, 2017, doi:
10.1109/ICGTSPICC.2016.7955296.
[4] H. Zhang, C. Wang, and X. Zhou, “Fragile Watermarking Based on LBP for Blind Tamper Detection in Images.pdf.”
Information Procssing System, pp. 385–399, 2017.
[5] T. Ouni, A. Lassoued, and M. Abid, “Adapted scan based lossless image compression,” Commun. Comput. Inf. Sci., vol. 260
CCIS, pp. 82–91, 2011, doi: 10.1007/978-3-642-27183-0_10.
[6] C. C. Chang, Y. H. Fan, and W. L. Tai, “Four-scanning attack on hierarchical digital watermarking method for image tamper
detection and recovery,” Pattern Recognit., vol. 41, no. 2, pp. 654–661, 2008, doi: 10.1016/j.patcog.2007.06.003.
[7] C. Li, F. Yang, and C. Lee, “An efficient . fragile watermarking scheme intended for image authentication and integrity
verification is proposed in this work . To watermark the underlying image , the gray scale of each pixel is adjusted by an
imperceptible quantity according to the c,” pp. 3445–3448.
[8] R. K. Singh, D. K. Shaw, and M. J. Alam, “Experimental Studies of LSB Watermarking with Different Noise,” Procedia
Comput. Sci., vol. 54, pp. 612–620, 2015, doi: 10.1016/j.procs.2015.06.071.
[9] B. S. Rahman, C. Saha, and T. A. Tamal, “Integer Wavelet Transform based Dual Watermarking Technique using Tent Map
and Local Binary Pattern,” vol. 18, no. 3, 2018.
[10] H. Zhang, C. Wang, and X. Zhou, “Fragile watermarking for image authentication using the characteristic of SVD,”
Algorithms, vol. 10, no. 1, 2017, doi: 10.3390/a10010027.
[11] H. He, F. Chen, H. M. Tai, T. Kalker, and J. Zhang, “Performance analysis of a block-neighborhood-based self-recovery
fragile watermarking scheme,” IEEE Trans. Inf. Forensics Secur., vol. 7, no. 1 PART 2, pp. 185–196, 2012, doi:
10.1109/TIFS.2011.2162950.
[12] P. L. Lin, C. K. Hsieh, and P. W. Huang, “A hierarchical digital watermarking method for image tamper detection and
recovery,” Pattern Recognit., vol. 38, no. 12, pp. 2519–2529, 2005, doi: 10.1016/j.patcog.2005.02.007.
[13] S. I. Hisham, “Enhanced Lsb Watermarking Methods Based on Scanning Patterns for Authentication of Medical Images
Syifak Izhar Hisham Faculty of Computer System and,” Phd Thesis, Univ. Malaysia Pahang, 2015.
[14] J. M. Zain, “DIGITAL WATERMARKING IN MEDICAL IMAGES A Thesis Submitted for the Degree of Doctor of
Philosophy,” no. November, 2005.
[15] “Tamper Localization and Recovery Watermarking Schemes for,” no. July, 2011.
[16] S. S. Maniccam and N. G. Bourbakis, “Lossless image compression and encryption using SCAN,” Pattern Recognit., vol. 34,
no. 6, pp. 1229–1245, 2001, doi: 10.1016/S0031-3203(00)00062-5.
[17] C. Li and F. Yang, “One-dimensional neighborhood forming strategy for fragile watermarking,” J. Electron. Imaging, vol. 12,
no. 2, p. 284, 2003, doi: 10.1117/1.1557156.
[18] T. Nguyen, H. Schwarz, H. Kirchhoffer, D. Marpe, and T. Wiegand, “IMPROVED CONTEXT MODELING FOR CODING
QUANTIZED TRANSFORM COEFFICIENTS IN VIDEO COMPRESSION Fraunhofer Institute for Telecommunications
Department of Telecommunication Systems,” pp. 378–381, 2010.
[19] R. Vidhya, M. Brindha, and N. A. Gounden, “Analysis of zig-zag scan based modified feedback convolution algorithm against
differential attacks and its application to image encryption,” Appl. Intell., 2020, doi: 10.1007/s10489-020-01697-1.
[20] S. I. Hisham, J. M. Zain, N. W. Arshad, and S. C. Liew, “HILBERT-LSB-C as authentication system for color medical
images,” 2015 4th Int. Conf. Softw. Eng. Comput. Syst. ICSECS 2015 Virtuous Softw. Solut. Big Data, pp. 15–20, 2015, doi:
10.1109/ICSECS.2015.7333114.
[21] D. Houcque, “Introduction To Matlab for Engineering Students,” no. August, 2005.
[22] A. Dixit and R. Dixit, “A Review on Digital Image Watermarking Techniques,” Int. J. Image, Graph. Signal Process., vol. 9,
no. 4, pp. 56–66, 2017, doi: 10.5815/ijigsp.2017.04.07.
[23] O. Hemida, Y. Huo, H. He, and F. Chen, “A restorable fragile watermarking scheme with superior localization for both natural
and text images,” Multimed. Tools Appl., vol. 78, no. 9, pp. 12373–12403, May 2019, doi: 10.1007/s11042-018-6664-3.
[24] L. Rakhmawati, W. Wirawan, and S. Suwadi, “A recent survey of self-embedding fragile watermarking scheme for image
authentication with recovery capability,” Eurasip J. Image Video Process., vol. 2019, no. 1, 2019, doi: 10.1186/s13640-019-
0462-3.
Paper’s should be the fewest possible that accurately describe … (First Author)
18 ISSN: 1693-6930
BIOGRAPHIES OF AUTHORS
‘Aqilah Abd. Ghani received her bachelor’s degree in Graphic and Multimedia
Technology from University Malaysia Pahang, Malaysia in 2017. She started to learn official
computing courses at Pahang Matriculation College (KMPh) and continue her study at
University Malaysia Pahang (UMP) until now. Currently, she is doing a Master of Research
in Image & Signal Processing at Faculty of Computing, UMP. Actively involved in
conferences and research presentation, she had done two Scopus indexed research papers,
ongoing paper journal and finishing her master study. She also aims to pursue her academic
journey as a Postdoctoral, Ph.D. researcher one day. She can be contacted at email:
aqilahghani.edu@gmail.com.
Syifak Izhar Hisham received the doctoral degree (Ph.D.) in computer science
from University Malaysia Pahang, Malaysia, with the Dissertation “Enhanced LSB
Watermarking Methods Based on Scanning Patterns for Authentication of Medical Images”.
She is a lecturer of Data Security in the Faculty of Computing, University Malaysia Pahang.
She believes that she has strong background in researching, academic writing and presenting
in various viva, speech conference, and product competition sessions. Her research
concentrations include Data Security, Digital Watermarking, Image Processing, E-Learning,
Multimedia Technology, and Images Authentication. She has experiences in lecturing and
teaching with 5 years experiences in various institutions and various field. She can be
contacted at email: syifakizhar@ump.edu.my
Nur Alya Afikah Usop graduated from Universiti Malaysia Sarawak (UNIMAS)
in 2019 with bachelor’s degree of Computational Science. Currently furthering master’s
degree in Universiti Malaysia Pahang (UMP) in Research of Multimedia which focusing on
image processing security. She actively involved in conferences and research presentation,
she had done two reviewed research papers, ongoing paper journal and finishing her master
study. She can be contacted at email:
TELKOMNIKA Telecommun Comput El Control, Vol. 99, No. 1, Month 2099: 1-1x