Research Article |
Multi-image Feature Map-Based Watermarking Techniques Using Transformer
Author(s): Aberna Palani1* and Agilandeeswari Loganathan2
Published In : International Journal of Electrical and Electronics Research (IJEER) Volume 11, Issue 2
Publisher : FOREX Publication
Published : 30 May 2023
e-ISSN : 2347-470X
Page(s) : 339-344
Abstract
Nowadays, protecting multimedia data is a significant challenge because of the advancement of technology and software. The embedding process heavily relies on watermarking to accomplish multimedia security in terms of content authentication, proof of ownership, and tamper detection. Our objective is to develop an invariant watermark that can survive different signal-processing attacks. We presented a unique hybrid technique (DWT-QR-SWT) and multi-image invariant features generated as a watermark using a Transformer encoder-decoder model. The encoded image features are subsampled using PCA in order to decrease the dimensionality of the watermark image. The first two images are used as watermark1 and the next two images as watermark2 to produce multi-watermark feature maps. To embed the watermark, a hybrid DWT-QR decomposition has been applied to the original image1. On the primary watermarked image, two Level Stationary Wavelet Transform (SWT) were applied to embed the secondary watermark2. At the extraction phase, the tampered image is recovered by passing the extracted watermark image as input to the transformer decoder. A multi-image watermark increases data embedding capabilities and also achieves two-level content authentication, tamper detection, localization, and recovery. With a PSNR of 59.05 dB, the testing result demonstrates great resilience and improved imperceptibility.
Keywords: Transformer
, Tamper detection
, QR decomposition
, Discrete Wavelet Transform
, Stationary Wavelet Transform
, Principal component analysis
.
Aberna Palani*, Research Scholar, School of Information Technology and Engineering (SITE), Vellore Institute Of Technology, Vellore, India; Email: aberna.p@vitstudent.ac.in
Agilandeeswari Loganathan, Professor, School of Information Technology and Engineering (SITE), Vellore Institute Of Technology, Vellore, India; Email: agila.l@vit.ac.in
-
[1] N. Shyamala and D. S. Geetha, "Compression of Medical Images Using Wavelet Transform and Metaheuristic Algorithm for Telemedicine Applications," IJEER, vol. 10(2), pp. 161-166, 2022. [Cross Ref]
-
[2] L.Agilandeeswari, Sunny. S (2013) Secure data sharing of patient record in cloud environment using attribute based encryption, International Journal of Applied Engineering Research, (IJAER), Vol 8, Spec. Issue 19, pp 2423-2426.
-
[3] Singh, J., & Singla, M. (2022). Image Steganography Technique based on Singular Value Decomposition and Discrete Wavelet Transform. International Journal of Electrical and Electronics Research, 10(2), 122-125. [Cross Ref]
-
[4] G. Zhou and D. Lv, "An overview of digital watermarking in image forensics," 2011 Fourth International Joint Conference on Computational Sciences and Optimization, pp. 332-335, April 2011. [Cross Ref]
-
[5] S. Kaur and J. Patel, "A Robust Image Mosaicing Technique Using Frequency Domain.," IJEER, vol. 6(1), pp. 1-8, 2018. [Cross Ref]
-
[6] T. K. Tsui, X. P. Zhang, and D. Androutsos, "Color image watermarking using multidimensional Fourier transforms, "IEEE Transactions on Information Forensics and Security, vol. 3(1), pp. 16-28, 2008. [Cross Ref]
-
[7] Agilandeeswari, L., & Ganesan, K. (2018). RST invariant robust video watermarking algorithm using quaternion curvelet transform. Multimedia Tools and Applications, 77(19), 25431-25474. [Cross Ref]
-
[8] D. Ariatmanto and F. Ernawan, "Adaptive scaling factors based on the impact of selected DCT coefficients for image watermarking", Journal of King Saud University-Computer and Information Sciences, 2020. [Cross Ref]
-
[9] L.Agilandeeswari, K.Ganesan, K.Muralibabu, (2013). A Side View Based Video in Video Watermarking Using DWT and Hilbert Transform, Security in Computing and Communications, Communications in Computer and Information Science (CCIS) Series – Springer, page 366-367. [Cross Ref]
-
[10] L.Agilandeeswari, K.Muralibabu (2013). A Robust Video Watermarking Algorithm for Content Authentication using Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD), International Journal of Security and its Applications, Vol 7(4), pp. 145-158. [Cross Ref]
-
[11] P. V. Nagarjuna and K. T. Ranjeet, "Robust blind digital image watermarking scheme based on stationary wavelet transform," In 2013 Sixth International Conference on Contemporary Computing (IC3). IEEE., pp. 451-454, 2013, August. [Cross Ref]
-
[12] L.Agilandeeswari and K. Ganesan. (2016) An Efficient Hilbert and Integer Wavelet Transform based Video Watermarking. Journal of Engineering Science and Technology, Vol.11, Issue.3, Page. 327 - 345.
-
[13] Agilandeeswari, L., Prabukumar, M., & Alenizi, F. A. (2023). A robust semi-fragile watermarking system using Pseudo-Zernike moments and dual tree complex wavelet transform for social media content authentication. Multimedia Tools and Applications, 1-53. [Cross Ref]
-
[14] L.Agilandeeswari, K.Ganesan, (2016) “A Robust Color Video Watermarking scheme based on Hybrid Embedding Techniques” MULTIMEDIA TOOLS AND APPLICATIONS (Springer), Vol. 75, Issue 14, Page 8745 – 8780. [Cross Ref]
-
[15] P. T. Nha, T. M. Thanh, and N. T. Phong, "Consideration of a robust watermarking algorithm for color image using improved QR decomposition," Soft Computing, vol. 26(11), pp. 5069-5093, 2022. [Cross Ref]
-
[16] L. Y. Hsu, H. T. Hu, and H. H. Chou, "A high-capacity QRD-based blind color image watermarking algorithm incorporated with AI technologies," Expert Systems with Applications, vol. 117134, pp. 199, 2022. [Cross Ref]
-
[17] Rana, M. M., & Abdelhadi, A. (2020, February). Optimal Image Watermark Technique Using Singular Value Decomposition with PCA. In 2020 22nd International Conference on Advanced Communication Technology (ICACT) (pp. 342-347). IEEE. [Cross Ref]
-
[18] M. Rezaei and H. Taheri, "Digital image self-recovery using CNN networks," Optik, p. 169345, 2022. [Cross Ref]
-
[19] F. Khan and M. S. Raeen, "Robust and Blind Multiple Image Watermarking Using CNN and DWT in Video". [Cross Ref]
-
[20] T. Song, X. Yu, S. Yu, Z. Ren, and Y. Qu, "Feature Extraction Processing Method of Medical Image Fusion Based on Neural Network Algorithm," Complexity, 2021. [Cross Ref]
-
[21] Loganathan, A., & Kaliyaperumal, G. (2016). An adaptive HVS based video watermarking scheme for multiple watermarks using BAM neural networks and fuzzy inference system. Expert Systems with Applications, 63, 412-434. [Cross Ref]
-
[22] Agilandeeswari, L., Ganesan, K. A bi-directional associative memory based multiple image watermarking on cover video. Multimed Tools Appl 75, 7211–7256 (2016). [Cross Ref]
-
[23] A. Dosovitskiy, L. K. A. Beyer, D. Weissenborn, X. Zhai, T. Unterthiner, ... and N. Houlsby, "An image is worth 16x16 words: Transformers for image recognition at scale," arXiv preprint arXiv:2010.11929, 2020.
-
[24] A. Vaswani, N. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. N. .. Gomez, and I. Polosukhin (2017). "Attention is all you need," Advances in neural information processing systems, pp. 30, 2017.
-
[25] N. N. Hurrah, S. A. Parah, N. A. Loan, J. A. Sheikh, M. Elhoseny and K. Muhammad, "Dual watermarking framework for privacy protection and content authentication of multimedia," Future generation computer Systems, vol. 94, pp. 654-673, 2019. [Cross Ref]
-
[26] A. Soualmi, A. Alti and L. Laouamer, "An Imperceptible Watermarking Scheme for Medical Image Tamper Detection," International Journal of Information Security and Privacy (IJISP), vol. 16(1), pp. 1-18, 2022. [Cross Ref]