Optimal Semi-Fragile Watermarking Based on Maximum Entropy Random Walk and Swin Transformer for Tamper Localization

被引:8
|
作者
Aberna, P. [1 ]
Agilandeeswari, L. [1 ]
机构
[1] VIT, Sch Comp Sci Engn & Informat Syst, Vellore 632014, Tamil Nadu, India
关键词
Watermarking; Transforms; Transformers; Image color analysis; Quaternions; Feature extraction; Discrete wavelet transforms; Wavelet transforms; Multimedia communication; Authentication; PSNR; High dynamic image; maximum entropy random walk algorithm; quaternion dual-tree complex wavelet transform; Swin transformer; IMAGE WATERMARKING; SCHEME; ALGORITHM;
D O I
10.1109/ACCESS.2024.3370411
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the multimedia arena, image tampering is an uncontrollable process that necessitates content authentication and tamper detection in a variety of applications. One method that is recommended for meeting all of those needs in the multimedia arena is watermarking. Mobile cameras may now be used to effortlessly take high dynamic range (HDR) photographs, which increase the image's visual quality and realism. Watermark visibility and recognition algorithms built for standard images may be affected by this introduction of perceptual variations in the image relative to the source. In order to overcome those shortcomings, we introduced a novel, an optimal semi-blind watermarking technique that works for both colour and HDR compressed JPEG images. A unique quaternion dual-tree complex wavelet transform technique is used to extract the highly informative features from the original image. The optimal embedding region in the low frequency sub-band is determined using the maximal entropy random walk (MERW) algorithm. In order to detect tampering and to localize the tampered region a watermark is generated using the swin transformer model and watermark embedding is carried out in the selected optimal blocks. A dual scrambled image is encoded in the effective principal component coefficient values of the singular value decomposition (SVD) Transform in order to authenticate the watermarked image prior to watermark extraction. The semi-blind extraction process is intended to confirm the content's authenticity by comparing the recovered scrambled watermark with the regenerated original watermark. The process of extraction is merely the opposite of the process of embedding. When compared to previous research, the experimental results demonstrated good imperceptibility with an average PSNR of 65 dB and SSIM of 0.999 and strong robustness against attacks.
引用
收藏
页码:37757 / 37781
页数:25
相关论文
共 50 条
  • [31] Chaos based semi-fragile image watermarking algorithm
    Li, Zhao-Hong
    Hou, Jian-Jun
    Song, Wei
    Beijing Jiaotong Daxue Xuebao/Journal of Beijing Jiaotong University, 2007, 31 (02): : 52 - 56
  • [32] Tamper Localization of the Medical Images Based on Fragile Watermarking
    Ustubioglu, Arda
    Ulutas, Guzin
    Ustubioglu, Beste
    2017 25TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2017,
  • [33] Semi-fragile watermarking algorithm based on slant transform
    Wang, Y.-W. (wyw4966198@126.com), 1600, Beijing University of Technology (39):
  • [34] Semi-fragile watermarking based on SVM for image authentication
    Li Chun-hua
    Ling He-fei
    Lu Zheng-ding
    2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, 2007, : 1255 - 1258
  • [35] A semi-fragile watermarking scheme based on neural network
    Hong, F
    Shi, L
    Luo, T
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 3536 - 3541
  • [36] Semi-fragile neural network watermarking for content authentication and tampering localization
    Yuan, Zihan
    Zhang, Xinpeng
    Wang, Zichi
    Yin, Zhaoxia
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 236
  • [37] Semi-fragile watermarking for image authentication with high tampering localization capability
    Liu, Huajian
    Steinebach, Martin
    AXMEDIS 2006: SECOND INTERNATIONAL CONFERENCE ON AUTOMATED PRODUCTION OF CROSS MEDIA CONTENT FOR MULTI-CHANNEL DISTRIBUTION, PROCEEDINGS, 2006, : 143 - +
  • [38] Image Content Authentication and Tamper Localization Based on Semi Fragile Watermarking by Using the Curvelet Transform
    Akbarzadeh, M. R.
    Ghofrani, S.
    TENCON 2012 - 2012 IEEE REGION 10 CONFERENCE: SUSTAINABLE DEVELOPMENT THROUGH HUMANITARIAN TECHNOLOGY, 2012,
  • [39] Semi-fragile watermarking based content image authentication scheme
    Cruz, Clara
    Reyes, Rogelio
    Nakano, Mariko
    Perez, Hector
    REVISTA FACULTAD DE INGENIERIA-UNIVERSIDAD DE ANTIOQUIA, 2010, (56): : 160 - 169
  • [40] Image Content Authentication System Based on Semi-Fragile Watermarking
    Cruz, Clara
    Reyes, Rogelio
    Nakano, Mariko
    Perez, Hector
    2008 51ST MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1 AND 2, 2008, : 306 - 309