Digital watermarking technology plays an important role in detecting malicious tampering and protecting image copyright.However,in practical applications,this technology faces various problems such as severe image dis...Digital watermarking technology plays an important role in detecting malicious tampering and protecting image copyright.However,in practical applications,this technology faces various problems such as severe image distortion,inaccurate localization of the tampered regions,and difficulty in recovering content.Given these shortcomings,a fragile image watermarking algorithm for tampering blind-detection and content self-recovery is proposed.The multi-feature watermarking authentication code(AC)is constructed using texture feature of local binary patterns(LBP),direct coefficient of discrete cosine transform(DCT)and contrast feature of gray level co-occurrence matrix(GLCM)for detecting the tampered region,and the recovery code(RC)is designed according to the average grayscale value of pixels in image blocks for recovering the tampered content.Optimal pixel adjustment process(OPAP)and least significant bit(LSB)algorithms are used to embed the recovery code and authentication code into the image in a staggered manner.When detecting the integrity of the image,the authentication code comparison method and threshold judgment method are used to perform two rounds of tampering detection on the image and blindly recover the tampered content.Experimental results show that this algorithm has good transparency,strong and blind detection,and self-recovery performance against four types of malicious attacks and some conventional signal processing operations.When resisting copy-paste,text addition,cropping and vector quantization under the tampering rate(TR)10%,the average tampering detection rate is up to 94.09%,and the peak signal-to-noise ratio(PSNR)of the watermarked image and the recovered image are both greater than 41.47 and 40.31 dB,which demonstrates its excellent advantages compared with other related algorithms in recent years.展开更多
With the rapid advancement of visual generative models such as Generative Adversarial Networks(GANs)and stable Diffusion,the creation of highly realistic Deepfake through automated forgery has significantly progressed...With the rapid advancement of visual generative models such as Generative Adversarial Networks(GANs)and stable Diffusion,the creation of highly realistic Deepfake through automated forgery has significantly progressed.This paper examines the advancements inDeepfake detection and defense technologies,emphasizing the shift from passive detection methods to proactive digital watermarking techniques.Passive detection methods,which involve extracting features from images or videos to identify forgeries,encounter challenges such as poor performance against unknown manipulation techniques and susceptibility to counter-forensic tactics.In contrast,proactive digital watermarking techniques embed specificmarkers into images or videos,facilitating real-time detection and traceability,thereby providing a preemptive defense againstDeepfake content.We offer a comprehensive analysis of digitalwatermarking-based forensic techniques,discussing their advantages over passivemethods and highlighting four key benefits:real-time detection,embedded defense,resistance to tampering,and provision of legal evidence.Additionally,the paper identifies gaps in the literature concerning proactive forensic techniques and suggests future research directions,including cross-domain watermarking and adaptive watermarking strategies.By systematically classifying and comparing existing techniques,this review aims to contribute valuable insights for the development of more effective proactive defense strategies in Deepfake forensics.展开更多
Watermarking is embedding visible or invisible data within media to verify its authenticity or protect copyright.The watermark is embedded in significant spatial or frequency features of the media to make it more resi...Watermarking is embedding visible or invisible data within media to verify its authenticity or protect copyright.The watermark is embedded in significant spatial or frequency features of the media to make it more resistant to intentional or unintentional modification.Some of these features are important perceptual features according to the human visual system(HVS),which means that the embedded watermark should be imperceptible in these features.Therefore,both the designers of watermarking algorithms and potential attackers must consider these perceptual features when carrying out their actions.The two roles will be considered in this paper when designing a robust watermarking algorithm against the most harmful attacks,like volumetric scaling,histogram equalization,and non-conventional watermarking attacks like the Denoising Convolution Neural Network(DnCNN),which must be considered in watermarking algorithm design due to its rising role in the state-of-the-art attacks.The DnCNN is initialized and trained using watermarked image samples created by our proposed Covert and Severe Attacks Resistant Watermarking Algorithm(CSRWA)to prove its robustness.For this algorithm to satisfy the robustness and imperceptibility tradeoff,implementing the Dither Modulation(DM)algorithm is boosted by utilizing the Just Noticeable Distortion(JND)principle to get an improved performance in this sense.Sensitivity,luminance,inter and intra-block contrast are used to adjust the JND values.展开更多
Biometric template protection is essential for finger-based authentication systems,as template tampering and adversarial attacks threaten the security.This paper proposes a DCT-based fragile watermarking scheme incorp...Biometric template protection is essential for finger-based authentication systems,as template tampering and adversarial attacks threaten the security.This paper proposes a DCT-based fragile watermarking scheme incorporating AI-based tamper detection to improve the integrity and robustness of finger authentication.The system was tested against NIST SD4 and Anguli fingerprint datasets,wherein 10,000 watermarked fingerprints were employed for training.The designed approach recorded a tamper detection rate of 98.3%,performing 3–6%better than current DCT,SVD,and DWT-based watermarking approaches.The false positive rate(≤1.2%)and false negative rate(≤1.5%)were much lower compared to previous research,which maintained high reliability for template change detection.The system showed real-time performance,averaging 12–18 ms processing time per template,and is thus suitable for real-world biometric authentication scenarios.Quality analysis of fingerprints indicated that NFIQ scores were enhanced from 2.07 to 1.81,reflecting improved minutiae clarity and ridge structure preservation.The approach also exhibited strong resistance to compression and noise distortions,with the improvements in PSNR being 2 dB(JPEG compression Q=80)and the SSIM values rising by 3%–5%under noise attacks.Comparative assessment demonstrated that training with NIST SD4 data greatly improved the ridge continuity and quality of fingerprints,resulting in better match scores(260–295)when tested against Bozorth3.Smaller batch sizes(batch=2)also resulted in improved ridge clarity,whereas larger batch sizes(batch=8)resulted in distortions.The DCNN-based tamper detection model supported real-time classification,which greatly minimized template exposure to adversarial attacks and synthetic fingerprint forgeries.Results demonstrate that fragile watermarking with AI indeed greatly enhances fingerprint security,providing privacy-preserving biometric authentication with high robustness,accuracy,and computational efficiency.展开更多
Image watermarking is a powerful tool for media protection and can provide promising results when combined with other defense mechanisms.Image watermarking can be used to protect the copyright of digital media by embe...Image watermarking is a powerful tool for media protection and can provide promising results when combined with other defense mechanisms.Image watermarking can be used to protect the copyright of digital media by embedding a unique identifier that identifies the owner of the content.Image watermarking can also be used to verify the authenticity of digital media,such as images or videos,by ascertaining the watermark information.In this paper,a mathematical chaos-based image watermarking technique is proposed using discrete wavelet transform(DWT),chaotic map,and Laplacian operator.The DWT can be used to decompose the image into its frequency components,chaos is used to provide extra security defense by encrypting the watermark signal,and the Laplacian operator with optimization is applied to the mid-frequency bands to find the sharp areas in the image.These mid-frequency bands are used to embed the watermarks by modifying the coefficients in these bands.The mid-sub-band maintains the invisible property of the watermark,and chaos combined with the second-order derivative Laplacian is vulnerable to attacks.Comprehensive experiments demonstrate that this approach is effective for common signal processing attacks,i.e.,compression,noise addition,and filtering.Moreover,this approach also maintains image quality through peak signal-to-noise ratio(PSNR)and structural similarity index metrics(SSIM).The highest achieved PSNR and SSIM values are 55.4 dB and 1.In the same way,normalized correlation(NC)values are almost 10%–20%higher than comparative research.These results support assistance in copyright protection in multimedia content.展开更多
In the current digital context,safeguarding copyright is a major issue,particularly for architectural drawings produced by students.These works are frequently the result of innovative academic thinking combining creat...In the current digital context,safeguarding copyright is a major issue,particularly for architectural drawings produced by students.These works are frequently the result of innovative academic thinking combining creativity and technical precision.They are particularly vulnerable to the risk of illegal reproduction when disseminated in digital format.This research suggests,for the first time,an innovative approach to copyright protection by embedding a double digital watermark to address this challenge.The solution relies on a synergistic fusion of several sophisticated methods:Krawtchouk Optimized Octonion Moments(OKOM),Quaternion Singular Value Decomposition(QSVD),and Discrete Waveform Transform(DWT).To improve watermark embedding,the biologically inspired algorithm Chaos-White Shark Optimization(CWSO)is used,which allows dynamically adapting essential parameters such as the scaling factor of the insertion.Thus,two watermarks are inserted at the same time:an institutional logo and a student image,encoded in the main image(the architectural plan)through octonionic projections.This allows minimizing the amount of data to be integrated while increasing resistance.The suggested approach guarantees a perfect balance between the discreetness of the watermark(validated by PSNR indices>47 dB and SSIM>0.99)and its resistance to different attacks(JPEG compression,noise,rotation,resizing,filtering,etc.),as proven by the normalized correlation values(NC>0.9)obtained following the extraction.Therefore,this method represents a notable progress for securing academic works in architecture,providing an effective,discreet and reversible digital protection,which does not harm the visual appearance of the original works.展开更多
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore popular.Social image sharing can also raise privacy concerns.Image encryption can protect social...With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore popular.Social image sharing can also raise privacy concerns.Image encryption can protect social images.However,most existing image protection methods cannot be applied to multimedia social platforms because of encryption in the spatial domain.In this work,the authors propose a secure social image-sharing method with watermarking/fingerprinting and encryption.First,the fingerprint code with a hierarchical community structure is designed based on social network analysis.Then,discrete wavelet transform(DWT)from block discrete cosine transform(DCT)directly is employed.After that,all codeword segments are embedded into the LL,LH,and HL subbands,respectively.The selected subbands are confused based on Game of Life(GoL),and then all subbands are diffused with singular value decomposition(SVD).Experimental results and security analysis demonstrate the security,invisibility,and robustness of our method.Further,the superiority of the technique is elaborated through comparison with some related image security algorithms.The solution not only performs the fast transformation from block DCT to one-level DWT but also protects users’privacy in multimedia social platforms.With the proposed method,JPEG image secure sharing in multimedia social platforms can be ensured.展开更多
Satellite images are widely used for remote sensing and defence applications,however,they are subject to a variety of threats.To ensure the security and privacy of these images,theymust be watermarked and encrypted be...Satellite images are widely used for remote sensing and defence applications,however,they are subject to a variety of threats.To ensure the security and privacy of these images,theymust be watermarked and encrypted before communication.Therefore,this paper proposes a novel watermarked satellite image encryption scheme based on chaos,Deoxyribonucleic Acid(DNA)sequence,and hash algorithm.The watermark image,DNA sequence,and plaintext image are passed through the Secure Hash Algorithm(SHA-512)to compute the initial condition(keys)for the Tangent-Delay Ellipse Reflecting Cavity Map(TD-ERCS),Henon,and Duffing chaotic maps,respectively.Through bitwise XOR and substitution,the TD-ERCS map encrypts the watermark image.The ciphered watermark image is embedded in the plaintext image.The embedded plaintext image is permuted row-wise and column-wise using the Henon chaotic map.The permuted image is then bitwise XORed with the values obtained from the Duffing map.For additional security,the XORed image is substituted through a dynamic S-Box.To evaluate the efficiency and performance of the proposed algorithm,several tests are performed which prove its resistance to various types of attacks such as brute-force and statistical attacks.展开更多
Evolutionary algorithms have been extensively utilized in practical applications.However,manually designed population updating formulas are inherently prone to the subjective influence of the designer.Genetic programm...Evolutionary algorithms have been extensively utilized in practical applications.However,manually designed population updating formulas are inherently prone to the subjective influence of the designer.Genetic programming(GP),characterized by its tree-based solution structure,is a widely adopted technique for optimizing the structure of mathematical models tailored to real-world problems.This paper introduces a GP-based framework(GPEAs)for the autonomous generation of update formulas,aiming to reduce human intervention.Partial modifications to tree-based GP have been instigated,encompassing adjustments to its initialization process and fundamental update operations such as crossover and mutation within the algorithm.By designing suitable function sets and terminal sets tailored to the selected evolutionary algorithm,and ultimately derive an improved update formula.The Cat Swarm Optimization Algorithm(CSO)is chosen as a case study,and the GP-EAs is employed to regenerate the speed update formulas of the CSO.To validate the feasibility of the GP-EAs,the comprehensive performance of the enhanced algorithm(GP-CSO)was evaluated on the CEC2017 benchmark suite.Furthermore,GP-CSO is applied to deduce suitable embedding factors,thereby improving the robustness of the digital watermarking process.The experimental results indicate that the update formulas generated through training with GP-EAs possess excellent performance scalability and practical application proficiency.展开更多
Ensuring digital media security through robust image watermarking is essential to prevent unauthorized distribution,tampering,and copyright infringement.This study introduces a novel hybrid watermarking framework that...Ensuring digital media security through robust image watermarking is essential to prevent unauthorized distribution,tampering,and copyright infringement.This study introduces a novel hybrid watermarking framework that integrates Discrete Wavelet Transform(DWT),Redundant Discrete Wavelet Transform(RDWT),and Möbius Transformations(MT),with optimization of transformation parameters achieved via a Genetic Algorithm(GA).By combining frequency and spatial domain techniques,the proposed method significantly enhances both the imper-ceptibility and robustness of watermark embedding.The approach leverages DWT and RDWT for multi-resolution decomposition,enabling watermark insertion in frequency subbands that balance visibility and resistance to attacks.RDWT,in particular,offers shift-invariance,which improves performance under geometric transformations.Möbius transformations are employed for spatial manipulation,providing conformal mapping and spatial dispersion that fortify watermark resilience against rotation,scaling,and translation.The GA dynamically optimizes the Möbius parameters,selecting configurations that maximize robustness metrics such as Peak Signal-to-Noise Ratio(PSNR),Structural Similarity Index Measure(SSIM),Bit Error Rate(BER),and Normalized Cross-Correlation(NCC).Extensive experiments conducted on medical and standard benchmark images demonstrate the efficacy of the proposed RDWT-MT scheme.Results show that PSNR exceeds 68 dB,SSIM approaches 1.0,and BER remains at 0.0000,indicating excellent imperceptibility and perfect watermark recovery.Moreover,the method exhibits exceptional resilience to a wide range of image processing attacks,including Gaussian noise,JPEG compression,histogram equalization,and cropping,achieving NCC values close to or equal to 1.0.Comparative evaluations with state-of-the-art watermarking techniques highlight the superiority of the proposed method in terms of robustness,fidelity,and computational efficiency.The hybrid framework ensures secure,adaptive watermark embedding,making it highly suitable for applications in digital rights management,content authentication,and medical image protection.The integration of spatial and frequency domain features with evolutionary optimization presents a promising direction for future watermarking technologies.展开更多
A new digital watermarking algorithm based on the contourlet transform is proposed to improve the robustness and anti-attack performances of digital watermarking. The algorithm uses the Arnold scrambling technique and...A new digital watermarking algorithm based on the contourlet transform is proposed to improve the robustness and anti-attack performances of digital watermarking. The algorithm uses the Arnold scrambling technique and the singular value decomposition (SVD) scheme. The Arnold scrambling technique is used to preprocess the watermark, and the SVD scheme is used to find the best suitable hiding points. After the contourlet transform of the carrier image, intermediate frequency sub-bands are decomposed to obtain the singularity values. Then the watermark bits scrambled in the Arnold rules are dispersedly embedded into the selected SVD points. Finally, the inverse contourlet transform is applied to obtain the carrier image with the watermark. In the extraction part, the watermark can be extracted by the semi-blind watermark extracting algorithm. Simulation results show that the proposed algorithm has better hiding and robustness performances than the traditional contourlet watermarking algorithm and the contourlet watermarking algorithm with SVD. Meanwhile, it has good robustness performances when the embedded watermark is attacked by Gaussian noise, salt- and-pepper noise, multiplicative noise, image scaling and image cutting attacks, etc. while security is ensured.展开更多
A novel blind digital watermarking algorithm based on neural networks and multiwavelet transform is presented. The host image is decomposed through multiwavelet transform. There are four subblocks in the LL- level of ...A novel blind digital watermarking algorithm based on neural networks and multiwavelet transform is presented. The host image is decomposed through multiwavelet transform. There are four subblocks in the LL- level of the multiwavelet domain and these subblocks have many similarities. Watermark bits are added to low- frequency coefficients. Because of the learning and adaptive capabilities of neural networks, the trained neural networks almost exactly recover the watermark from the watermarked image. Experimental results demonstrate that the new algorithm is robust against a variety of attacks, especially, the watermark extraction does not require the original image.展开更多
To make digital watermarking accomplish several goals, a new method for simultaneously embedding multiple watermarks into the same audio signal is proposed. First, the original audio signal is segmented into frames of...To make digital watermarking accomplish several goals, a new method for simultaneously embedding multiple watermarks into the same audio signal is proposed. First, the original audio signal is segmented into frames of appointed lengths and all the element watermarks are encoded to achieve a mixed watermark. Then, the binary bits in the mixed watermark are embedded into the audio frames with the echo hiding technique. The watermark extraction can be performed without an original audio signal. Furthermore, in order to enhance the extraction accuracy and the robustness of the proposed algorithm against common signal manipulations, the autocorrelafion of the power cepstrum is utilized to estimate the echo delays in the watermarked audio frames to extract the mixed watermark and the corresponding decoding method is applied to achieve the element watermarks. Computer simulation results indicate that the proposed scheme has great robustness against common signal manipulations of Mp3 compressing, re-sampling, re-quantizing, low-pass filtering and white noise addition.展开更多
The leakage of medical audio data in telemedicine seriously violates the privacy of patients.In order to avoid the leakage of patient information in telemedicine,a two-stage reversible robust audio watermarking algori...The leakage of medical audio data in telemedicine seriously violates the privacy of patients.In order to avoid the leakage of patient information in telemedicine,a two-stage reversible robust audio watermarking algorithm is proposed to protect medical audio data.The scheme decomposes the medical audio into two independent embedding domains,embeds the robust watermark and the reversible watermark into the two domains respectively.In order to ensure the audio quality,the Hurst exponent is used to find a suitable position for watermark embedding.Due to the independence of the two embedding domains,the embedding of the second-stage reversible watermark will not affect the first-stage watermark,so the robustness of the first-stage watermark can be well maintained.In the second stage,the correlation between the sampling points in the medical audio is used to modify the hidden bits of the histogram to reduce the modification of the medical audio and reduce the distortion caused by reversible embedding.Simulation experiments show that this scheme has strong robustness against signal processing operations such as MP3 compression of 48 db,additive white Gaussian noise(AWGN)of 20 db,low-pass filtering,resampling,re-quantization and other attacks,and has good imperceptibility.展开更多
基金supported by Postgraduate Research&Practice Innovation Program of Jiangsu Province,China(Grant No.SJCX24_1332)Jiangsu Province Education Science Planning Project in 2024(Grant No.B-b/2024/01/122)High-Level Talent Scientific Research Foundation of Jinling Institute of Technology,China(Grant No.jit-b-201918).
文摘Digital watermarking technology plays an important role in detecting malicious tampering and protecting image copyright.However,in practical applications,this technology faces various problems such as severe image distortion,inaccurate localization of the tampered regions,and difficulty in recovering content.Given these shortcomings,a fragile image watermarking algorithm for tampering blind-detection and content self-recovery is proposed.The multi-feature watermarking authentication code(AC)is constructed using texture feature of local binary patterns(LBP),direct coefficient of discrete cosine transform(DCT)and contrast feature of gray level co-occurrence matrix(GLCM)for detecting the tampered region,and the recovery code(RC)is designed according to the average grayscale value of pixels in image blocks for recovering the tampered content.Optimal pixel adjustment process(OPAP)and least significant bit(LSB)algorithms are used to embed the recovery code and authentication code into the image in a staggered manner.When detecting the integrity of the image,the authentication code comparison method and threshold judgment method are used to perform two rounds of tampering detection on the image and blindly recover the tampered content.Experimental results show that this algorithm has good transparency,strong and blind detection,and self-recovery performance against four types of malicious attacks and some conventional signal processing operations.When resisting copy-paste,text addition,cropping and vector quantization under the tampering rate(TR)10%,the average tampering detection rate is up to 94.09%,and the peak signal-to-noise ratio(PSNR)of the watermarked image and the recovered image are both greater than 41.47 and 40.31 dB,which demonstrates its excellent advantages compared with other related algorithms in recent years.
基金supported by the National Fund Cultivation Project from China People’s Police University(Grant Number:JJPY202402)National Natural Science Foundation of China(Grant Number:62172165).
文摘With the rapid advancement of visual generative models such as Generative Adversarial Networks(GANs)and stable Diffusion,the creation of highly realistic Deepfake through automated forgery has significantly progressed.This paper examines the advancements inDeepfake detection and defense technologies,emphasizing the shift from passive detection methods to proactive digital watermarking techniques.Passive detection methods,which involve extracting features from images or videos to identify forgeries,encounter challenges such as poor performance against unknown manipulation techniques and susceptibility to counter-forensic tactics.In contrast,proactive digital watermarking techniques embed specificmarkers into images or videos,facilitating real-time detection and traceability,thereby providing a preemptive defense againstDeepfake content.We offer a comprehensive analysis of digitalwatermarking-based forensic techniques,discussing their advantages over passivemethods and highlighting four key benefits:real-time detection,embedded defense,resistance to tampering,and provision of legal evidence.Additionally,the paper identifies gaps in the literature concerning proactive forensic techniques and suggests future research directions,including cross-domain watermarking and adaptive watermarking strategies.By systematically classifying and comparing existing techniques,this review aims to contribute valuable insights for the development of more effective proactive defense strategies in Deepfake forensics.
文摘Watermarking is embedding visible or invisible data within media to verify its authenticity or protect copyright.The watermark is embedded in significant spatial or frequency features of the media to make it more resistant to intentional or unintentional modification.Some of these features are important perceptual features according to the human visual system(HVS),which means that the embedded watermark should be imperceptible in these features.Therefore,both the designers of watermarking algorithms and potential attackers must consider these perceptual features when carrying out their actions.The two roles will be considered in this paper when designing a robust watermarking algorithm against the most harmful attacks,like volumetric scaling,histogram equalization,and non-conventional watermarking attacks like the Denoising Convolution Neural Network(DnCNN),which must be considered in watermarking algorithm design due to its rising role in the state-of-the-art attacks.The DnCNN is initialized and trained using watermarked image samples created by our proposed Covert and Severe Attacks Resistant Watermarking Algorithm(CSRWA)to prove its robustness.For this algorithm to satisfy the robustness and imperceptibility tradeoff,implementing the Dither Modulation(DM)algorithm is boosted by utilizing the Just Noticeable Distortion(JND)principle to get an improved performance in this sense.Sensitivity,luminance,inter and intra-block contrast are used to adjust the JND values.
文摘Biometric template protection is essential for finger-based authentication systems,as template tampering and adversarial attacks threaten the security.This paper proposes a DCT-based fragile watermarking scheme incorporating AI-based tamper detection to improve the integrity and robustness of finger authentication.The system was tested against NIST SD4 and Anguli fingerprint datasets,wherein 10,000 watermarked fingerprints were employed for training.The designed approach recorded a tamper detection rate of 98.3%,performing 3–6%better than current DCT,SVD,and DWT-based watermarking approaches.The false positive rate(≤1.2%)and false negative rate(≤1.5%)were much lower compared to previous research,which maintained high reliability for template change detection.The system showed real-time performance,averaging 12–18 ms processing time per template,and is thus suitable for real-world biometric authentication scenarios.Quality analysis of fingerprints indicated that NFIQ scores were enhanced from 2.07 to 1.81,reflecting improved minutiae clarity and ridge structure preservation.The approach also exhibited strong resistance to compression and noise distortions,with the improvements in PSNR being 2 dB(JPEG compression Q=80)and the SSIM values rising by 3%–5%under noise attacks.Comparative assessment demonstrated that training with NIST SD4 data greatly improved the ridge continuity and quality of fingerprints,resulting in better match scores(260–295)when tested against Bozorth3.Smaller batch sizes(batch=2)also resulted in improved ridge clarity,whereas larger batch sizes(batch=8)resulted in distortions.The DCNN-based tamper detection model supported real-time classification,which greatly minimized template exposure to adversarial attacks and synthetic fingerprint forgeries.Results demonstrate that fragile watermarking with AI indeed greatly enhances fingerprint security,providing privacy-preserving biometric authentication with high robustness,accuracy,and computational efficiency.
基金supported by the researcher supporting Project number(RSPD2025R636),King Saud University,Riyadh,Saudi Arabia.
文摘Image watermarking is a powerful tool for media protection and can provide promising results when combined with other defense mechanisms.Image watermarking can be used to protect the copyright of digital media by embedding a unique identifier that identifies the owner of the content.Image watermarking can also be used to verify the authenticity of digital media,such as images or videos,by ascertaining the watermark information.In this paper,a mathematical chaos-based image watermarking technique is proposed using discrete wavelet transform(DWT),chaotic map,and Laplacian operator.The DWT can be used to decompose the image into its frequency components,chaos is used to provide extra security defense by encrypting the watermark signal,and the Laplacian operator with optimization is applied to the mid-frequency bands to find the sharp areas in the image.These mid-frequency bands are used to embed the watermarks by modifying the coefficients in these bands.The mid-sub-band maintains the invisible property of the watermark,and chaos combined with the second-order derivative Laplacian is vulnerable to attacks.Comprehensive experiments demonstrate that this approach is effective for common signal processing attacks,i.e.,compression,noise addition,and filtering.Moreover,this approach also maintains image quality through peak signal-to-noise ratio(PSNR)and structural similarity index metrics(SSIM).The highest achieved PSNR and SSIM values are 55.4 dB and 1.In the same way,normalized correlation(NC)values are almost 10%–20%higher than comparative research.These results support assistance in copyright protection in multimedia content.
文摘In the current digital context,safeguarding copyright is a major issue,particularly for architectural drawings produced by students.These works are frequently the result of innovative academic thinking combining creativity and technical precision.They are particularly vulnerable to the risk of illegal reproduction when disseminated in digital format.This research suggests,for the first time,an innovative approach to copyright protection by embedding a double digital watermark to address this challenge.The solution relies on a synergistic fusion of several sophisticated methods:Krawtchouk Optimized Octonion Moments(OKOM),Quaternion Singular Value Decomposition(QSVD),and Discrete Waveform Transform(DWT).To improve watermark embedding,the biologically inspired algorithm Chaos-White Shark Optimization(CWSO)is used,which allows dynamically adapting essential parameters such as the scaling factor of the insertion.Thus,two watermarks are inserted at the same time:an institutional logo and a student image,encoded in the main image(the architectural plan)through octonionic projections.This allows minimizing the amount of data to be integrated while increasing resistance.The suggested approach guarantees a perfect balance between the discreetness of the watermark(validated by PSNR indices>47 dB and SSIM>0.99)and its resistance to different attacks(JPEG compression,noise,rotation,resizing,filtering,etc.),as proven by the normalized correlation values(NC>0.9)obtained following the extraction.Therefore,this method represents a notable progress for securing academic works in architecture,providing an effective,discreet and reversible digital protection,which does not harm the visual appearance of the original works.
基金funded by NSFC Grants 61502154,61972136,the NSF of Hubei Province(2023AFB004,2024AFB544)Hubei Provincial Department of Education Project(No.Q20232206)Project of Hubei University of Economics(No.T201410).
文摘With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore popular.Social image sharing can also raise privacy concerns.Image encryption can protect social images.However,most existing image protection methods cannot be applied to multimedia social platforms because of encryption in the spatial domain.In this work,the authors propose a secure social image-sharing method with watermarking/fingerprinting and encryption.First,the fingerprint code with a hierarchical community structure is designed based on social network analysis.Then,discrete wavelet transform(DWT)from block discrete cosine transform(DCT)directly is employed.After that,all codeword segments are embedded into the LL,LH,and HL subbands,respectively.The selected subbands are confused based on Game of Life(GoL),and then all subbands are diffused with singular value decomposition(SVD).Experimental results and security analysis demonstrate the security,invisibility,and robustness of our method.Further,the superiority of the technique is elaborated through comparison with some related image security algorithms.The solution not only performs the fast transformation from block DCT to one-level DWT but also protects users’privacy in multimedia social platforms.With the proposed method,JPEG image secure sharing in multimedia social platforms can be ensured.
基金supported by the Deanship of Scientific Research at King Khalid University for funding this work through the large group research project under grant number RGP2/461/45the Deanship of Scientific Researchat Northern Border University,Arar,Saudi Arabia for funding this research work through the project number NBU-FFR-2025-3030-05.
文摘Satellite images are widely used for remote sensing and defence applications,however,they are subject to a variety of threats.To ensure the security and privacy of these images,theymust be watermarked and encrypted before communication.Therefore,this paper proposes a novel watermarked satellite image encryption scheme based on chaos,Deoxyribonucleic Acid(DNA)sequence,and hash algorithm.The watermark image,DNA sequence,and plaintext image are passed through the Secure Hash Algorithm(SHA-512)to compute the initial condition(keys)for the Tangent-Delay Ellipse Reflecting Cavity Map(TD-ERCS),Henon,and Duffing chaotic maps,respectively.Through bitwise XOR and substitution,the TD-ERCS map encrypts the watermark image.The ciphered watermark image is embedded in the plaintext image.The embedded plaintext image is permuted row-wise and column-wise using the Henon chaotic map.The permuted image is then bitwise XORed with the values obtained from the Duffing map.For additional security,the XORed image is substituted through a dynamic S-Box.To evaluate the efficiency and performance of the proposed algorithm,several tests are performed which prove its resistance to various types of attacks such as brute-force and statistical attacks.
文摘Evolutionary algorithms have been extensively utilized in practical applications.However,manually designed population updating formulas are inherently prone to the subjective influence of the designer.Genetic programming(GP),characterized by its tree-based solution structure,is a widely adopted technique for optimizing the structure of mathematical models tailored to real-world problems.This paper introduces a GP-based framework(GPEAs)for the autonomous generation of update formulas,aiming to reduce human intervention.Partial modifications to tree-based GP have been instigated,encompassing adjustments to its initialization process and fundamental update operations such as crossover and mutation within the algorithm.By designing suitable function sets and terminal sets tailored to the selected evolutionary algorithm,and ultimately derive an improved update formula.The Cat Swarm Optimization Algorithm(CSO)is chosen as a case study,and the GP-EAs is employed to regenerate the speed update formulas of the CSO.To validate the feasibility of the GP-EAs,the comprehensive performance of the enhanced algorithm(GP-CSO)was evaluated on the CEC2017 benchmark suite.Furthermore,GP-CSO is applied to deduce suitable embedding factors,thereby improving the robustness of the digital watermarking process.The experimental results indicate that the update formulas generated through training with GP-EAs possess excellent performance scalability and practical application proficiency.
文摘Ensuring digital media security through robust image watermarking is essential to prevent unauthorized distribution,tampering,and copyright infringement.This study introduces a novel hybrid watermarking framework that integrates Discrete Wavelet Transform(DWT),Redundant Discrete Wavelet Transform(RDWT),and Möbius Transformations(MT),with optimization of transformation parameters achieved via a Genetic Algorithm(GA).By combining frequency and spatial domain techniques,the proposed method significantly enhances both the imper-ceptibility and robustness of watermark embedding.The approach leverages DWT and RDWT for multi-resolution decomposition,enabling watermark insertion in frequency subbands that balance visibility and resistance to attacks.RDWT,in particular,offers shift-invariance,which improves performance under geometric transformations.Möbius transformations are employed for spatial manipulation,providing conformal mapping and spatial dispersion that fortify watermark resilience against rotation,scaling,and translation.The GA dynamically optimizes the Möbius parameters,selecting configurations that maximize robustness metrics such as Peak Signal-to-Noise Ratio(PSNR),Structural Similarity Index Measure(SSIM),Bit Error Rate(BER),and Normalized Cross-Correlation(NCC).Extensive experiments conducted on medical and standard benchmark images demonstrate the efficacy of the proposed RDWT-MT scheme.Results show that PSNR exceeds 68 dB,SSIM approaches 1.0,and BER remains at 0.0000,indicating excellent imperceptibility and perfect watermark recovery.Moreover,the method exhibits exceptional resilience to a wide range of image processing attacks,including Gaussian noise,JPEG compression,histogram equalization,and cropping,achieving NCC values close to or equal to 1.0.Comparative evaluations with state-of-the-art watermarking techniques highlight the superiority of the proposed method in terms of robustness,fidelity,and computational efficiency.The hybrid framework ensures secure,adaptive watermark embedding,making it highly suitable for applications in digital rights management,content authentication,and medical image protection.The integration of spatial and frequency domain features with evolutionary optimization presents a promising direction for future watermarking technologies.
基金The National Natural Science Foundation of China( No. 69092008)
文摘A new digital watermarking algorithm based on the contourlet transform is proposed to improve the robustness and anti-attack performances of digital watermarking. The algorithm uses the Arnold scrambling technique and the singular value decomposition (SVD) scheme. The Arnold scrambling technique is used to preprocess the watermark, and the SVD scheme is used to find the best suitable hiding points. After the contourlet transform of the carrier image, intermediate frequency sub-bands are decomposed to obtain the singularity values. Then the watermark bits scrambled in the Arnold rules are dispersedly embedded into the selected SVD points. Finally, the inverse contourlet transform is applied to obtain the carrier image with the watermark. In the extraction part, the watermark can be extracted by the semi-blind watermark extracting algorithm. Simulation results show that the proposed algorithm has better hiding and robustness performances than the traditional contourlet watermarking algorithm and the contourlet watermarking algorithm with SVD. Meanwhile, it has good robustness performances when the embedded watermark is attacked by Gaussian noise, salt- and-pepper noise, multiplicative noise, image scaling and image cutting attacks, etc. while security is ensured.
基金The National Natural Science Foundation of China(No60473015)
文摘A novel blind digital watermarking algorithm based on neural networks and multiwavelet transform is presented. The host image is decomposed through multiwavelet transform. There are four subblocks in the LL- level of the multiwavelet domain and these subblocks have many similarities. Watermark bits are added to low- frequency coefficients. Because of the learning and adaptive capabilities of neural networks, the trained neural networks almost exactly recover the watermark from the watermarked image. Experimental results demonstrate that the new algorithm is robust against a variety of attacks, especially, the watermark extraction does not require the original image.
文摘To make digital watermarking accomplish several goals, a new method for simultaneously embedding multiple watermarks into the same audio signal is proposed. First, the original audio signal is segmented into frames of appointed lengths and all the element watermarks are encoded to achieve a mixed watermark. Then, the binary bits in the mixed watermark are embedded into the audio frames with the echo hiding technique. The watermark extraction can be performed without an original audio signal. Furthermore, in order to enhance the extraction accuracy and the robustness of the proposed algorithm against common signal manipulations, the autocorrelafion of the power cepstrum is utilized to estimate the echo delays in the watermarked audio frames to extract the mixed watermark and the corresponding decoding method is applied to achieve the element watermarks. Computer simulation results indicate that the proposed scheme has great robustness against common signal manipulations of Mp3 compressing, re-sampling, re-quantizing, low-pass filtering and white noise addition.
基金This work was supported,in part,by the Natural Science Foundation of Jiangsu Province under Grant Numbers BK20201136,BK20191401in part,by the National Nature Science Foundation of China under Grant Numbers 61502240,61502096,61304205,61773219in part,by the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)fund.Conflicts of Interest:The aut。
文摘The leakage of medical audio data in telemedicine seriously violates the privacy of patients.In order to avoid the leakage of patient information in telemedicine,a two-stage reversible robust audio watermarking algorithm is proposed to protect medical audio data.The scheme decomposes the medical audio into two independent embedding domains,embeds the robust watermark and the reversible watermark into the two domains respectively.In order to ensure the audio quality,the Hurst exponent is used to find a suitable position for watermark embedding.Due to the independence of the two embedding domains,the embedding of the second-stage reversible watermark will not affect the first-stage watermark,so the robustness of the first-stage watermark can be well maintained.In the second stage,the correlation between the sampling points in the medical audio is used to modify the hidden bits of the histogram to reduce the modification of the medical audio and reduce the distortion caused by reversible embedding.Simulation experiments show that this scheme has strong robustness against signal processing operations such as MP3 compression of 48 db,additive white Gaussian noise(AWGN)of 20 db,low-pass filtering,resampling,re-quantization and other attacks,and has good imperceptibility.