Preview

Proceedings of Telecommunication Universities

Advanced search

A Watermarking Method for Selective Image Authentication Tollerant to JPEG Compression, Brightness and Contrast Adjustments

https://doi.org/10.31854/1813-324X-2020-6-3-92-99

Abstract

One of the most promising application of the digital watermarking is the selective image authentication (SIA) systems. In order to implement such a system one requires an embedding algorithm with an appropriate capacity. In addition, an embedding method is to be robust for the class of non-malicious manipulations which the SIA system is designed for. We propose the new method which has a significant embedding capacity while still being tolerant to JPEG compression, brightness and contrast adjustments. This was possible due to the extension of the well-known discrete wavelet transform embedding technique. We propose two-step embedding scheme and the use of image histogram equalisation and recovering operations. The experiment results show acceptable tolerance to JPEG compression, brightness and contrast adjustments with good visual quality in terms of PSNR just after embedding.

About the Author

A. .. Zhuvikin
The Bonch-Bruevich Saint-Petersburg State University of Telecommunications
Russian Federation


References

1. Cisco Annual Internet Report (2018-2023). Available from: https://www.cisco.com/c/en/us/solutions/collateral/ executive-perspectives/annual-internet-report/white-paper-c11-741490.pdf (дата обращения 05.08.2020)

2. Haouzia A., Noumeir R. Methods for image authentication: a survey // Multimed Tools and Applications. 2008. Vol. 39. Iss. 1-46. DOI:10.1007/s11042-007-0154-3

3. Korzhik V., Zhuvikin A., Morales-Luna G. Selective image authentication tolerant to JPEG compression // Proceedings of the 6th International Conference on Information, Intelligence, Systems and Applications (IISA, Corfu, Greece, 6-8 July 2015). IEEE, 2015. DOI:10.1109/IISA.2015.7388076

4. Zhuvikin A., Korzhik V., Morales-Luna G. Semi-Fragile Image Authentication based on CFD and 3-Bit Quantization // Indian Journal of Science and Technology. 2016. Vol. 9. Iss. 48. PP. 1-7. DOI:10.17485/ijst/2016/v9i48/109167

5. Daofu G., Fenlin L., Xiangyang L., Ping W. Robust Image Watermarking against Brightness and Contrast Change // Proceedings of the 4th International Conference on Multimedia Information Networking and Security (Nanjing, China, 2-4 November 2012). IEEE, 2012. PP. 995-998. DOI:10.1109/MINES.2012.252

6. Li X.-D. Image digital watermarking algorithm in DCT domain for resisting brightness-and-contrast adjusting attack // Journal of Optoelectronics. Laser. 2013. Vol. 6. URl: http://en.cnki.com.cn/Article_en/CJFDTotal-GDZJ201306027.htm (дата обращения 03.08.2020)

7. Muñoz-Ramirez D.-O., Ponomaryov V., Reyes-Reyes R., Kyrychenko V., Pechenin O., Totsky A. A robust watermarking scheme to JPEG compression for embedding a color watermark into digital images // Proceedings of the 9th International Conference on Dependable Systems, Services and Technologies (DESSERT, Kiev, Ukraine, 24-27 May 2018). IEEE, 2018. PP. 619-624. DOI:10.1109/DESSERT.2018.8409206

8. Nguyen P., Beghdadi A., Luong M. Perceptual watermarking robust to JPEG compression attack // Proceedings of the 5th International Symposium on Communications, Control and Signal Processing, Rome, Italy, 2-4 May 2012). IEEE, 2012. PP. 1-4. DOI:10.1109/ISCCSP.2012.6217798

9. Wang X., Feng X., He N., Jia Q., Zou Y. JPEG image compression algorithm analysis and local optimization // Proceedings of the International Conference on Advanced Management Science (ICAMS 2010, Chengdu, China, 9-11 July 2010). IEEE, 2010. PP. 5-7. DOI:10.1109/ICAMS.2010.5553016

10. Gallager R.G. Low-density parity-check codes. Cambridge: M.I.T. Press, 1963.

11. Zhu Y., Huang C. Histogram equalization algorithm for variable gray level mapping // Proceedings of the 8th World Congress on Intelligent Control and Automation (Jinan, China, 7-9 July 2010). IEEE, 2010. PP. 6022-6025. DOI:10.1109/WCICA.2010.5554587

12. The USC-SIPI Image Database // University of Southern California. Viterbi School of Engineering. URL: http://sipi.usc.edu/database (дата обращения 17.06.2020)

13. Brown D. The Exact Security of ECDSA // In Advances in Elliptic Curve Cryptography. Cambridge: Cambridge University Press, 2000.

14. Huynh-Thu Q., Ghanbari M. Scope of validity of PSNR in image/video quality assessment // Electronics letters. 2008. Vol. 44. Iss. 13. PP. 800-801. DOI:10.1049/el:20080522


Review

For citations:


Zhuvikin A... A Watermarking Method for Selective Image Authentication Tollerant to JPEG Compression, Brightness and Contrast Adjustments. Proceedings of Telecommunication Universities. 2020;6(3):92-99. (In Russ.) https://doi.org/10.31854/1813-324X-2020-6-3-92-99

Views: 2411


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1813-324X (Print)
ISSN 2712-8830 (Online)