Content uploaded by Nagesh Yagnam
Author content
All content in this area was uploaded by Nagesh Yagnam on Jan 06, 2023
Content may be subject to copyright.
A Novel Approach for High
Authentication in Digital Watermarking
Technique
Mulatu Gebeyaw Astarkie, Swapna Gangone, Bhoomeshwar Bala,
G. J. Bharat Kumar, and Yagnam Nagesh
Abstract Digital image watermarking is a fascinating area of research as they
protect multimedia information from unauthorized access. It has become very impor-
tant in our Internet community. Digital watermarking techniques are used to protect
electronic media against illegal flow in the form of bitmaps, sound and movies or
any other network, watermark into the server information with copyright protection,
access management, broadcast tracking, owner identification, etc. A watermark can
be almost any form, label, tag or electronic signal. A host can be multimedia elements
such as pictures, video or audio. Since images are the building blocks of multimedia,
developing a productive watermark will be critical method for graphics. The most
obvious way to embed data in multimedia information is through electronic water-
marking. The digital watermark is a powerful alternative and plays an important role
in copyright security.
Keywords Digital watermarking ·Copyright ·Authorized access ·Data hiding
1 Introduction
Today, many of these images on the web are not watermarked; it becomes quite
easy for anyone to download and modify these images, which could result in the
founder losing the rights to his image. The profitability of gambling applications,
high-quality digital artwork and video streaming around the world has improved
significantly with advances in technology. Digital media offers you few mixed advan-
tages over analog—the caliber of electronic sound, graphics and video signals is
M. G. Astarkie · B. Bala (B) · Y. N a g e s h
Department of Information Technology, Debre Tabor University, Debre Tabor, Ethiopia
e-mail: drbhoom08@dtu.edu.et
Y. N a g e s h
e-mail: nageshyagnam1@dtu.edu.et
S. Gangone · G. J. Bharat Kumar
Department of Computer Science, Mettu University, Mettu, Ethiopia
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2023
A. Kumar et al. (eds.), Proceedings of the International Conference on Cognitive
and Intelligent Computing, Cognitive Science and Technology,
https://doi.org/10.1007/978-981-19-2358-6_23
241
242 M. G. Astarkie et al.
greater than that of analog counterparts. Editing becomes easy as you can make
changes in specific places that need to be changed. The data is straightforward with
no lack of quality. One approach to protecting multimedia information from illegal
recording and retransmission is to embed a character known as a digital copyright
or signature tag or watermark that fully characterizes who is applying it.
The term “electronic watermark” was coined in 1993 when Tirkel introduced two
watermarking methods to embed the watermark in images. Media (e.g., text, image,
sound and video) that is watermarked can later be detected or extracted to recognize
the item. An electronic watermark system integrates data directly into a file or over a
network. The digital watermark alone cannot stop files from being copied, modified
and even redistributed. However, if security and copy protection are neglected, the
watermark allows conclusions to be drawn about the rightful owner and the purpose
of unauthorized use. Digital watermarking requires components from various fields
such as telecommunications and signal processing, cryptography, psychophysics and
regulation.
2 Related Survey
The digital watermark can be distinguished as the activity of hiding a message, arti-
cles, mark or logo in an image, audio recording, video or other type of networking.
The field of electronic watermarks is comparatively young and has only gained
popularity as a research topic since the late 1990s. Watermarks can be seen every-
where, just like images on banknotes, and the watermark is hidden in the press. The
watermark can be useful for physical things; illustrations include materials, garment
labels and merchandise packaging that can be watermarked with extraordinary and
imperceptible colors and inks or even digital signs.
Cryptography is the search for ways to send messages in other ways so that the
target audience of this medium can get rid of the disguise and carry and capture the
message. The plan of altering over plain text to cipher text is popularly called enci-
phering or encryption, and also the converse procedure is called decryption. Encryp-
tion protects information during transmission within the transmission medium. But
after the material is received and received, it is no longer protected. The newspaper’s
watermark was first displayed in Italy in 1282. It all started with the inclusion of
a small wire in the type of paper that had a simple print inside the paper (which
made the newspaper identifiable or used as a signature) as an understanding of the
forms in which the newspaper sheets were made, or simply as registered trademarks
to differentiate the paper maker. On the other hand, they could have been spoken
in cryptic signals or introduced as an advance. It started functional in Europe and
America as well in twentieth century. They were used as trademarks to document
the date the paper was made and to prove the invention [1]. Steganography, or cipher
writing, could be seen in ancient Indian literature, such as in Kautilya’s Arthsastra
and Vatsayana’s Kamasutra. They are made of thin sheets of silk and paper. From
A Novel Approach for High Authentication in Digital Watermarking Technique 243
the twentieth century onwards, Emil Hembrooke of this Muzac Corporation discov-
ered the electronic watermark of 1954. Over time, watermarking techniques gained
critical focus and became an emerging part of this study.
In comparison with cryptography, steganography works differently in that it hides
the presence of the message. In the general regulations, the covert communications
of spies and the messages exchanged between drug dealers by e-mail in an incompre-
hensible manner are all types of steganography. The steganography and watermarking
techniques use covert communication techniques, but the steganography techniques
are by no means robust. The message has been hacked or tampered with, or changed
between the wires, and then, the message may not be seen as intended on the receiving
end. We evaluate steganography using the watermark method; the watermark process
is a subset of steganography. In steganography, the hidden message and the displayed
message have no connection at all. The hidden information or the watermark is the
owner’s authentication key for his cover image or server in the watermark process.
The watermark strategy helps a person keep rightful possession of their media. In
order to evaluate cryptography with the cryptography watermarking method, the
information i s converted into an individual, non-identifiable form s o that only the
uninstalled program can change it. But after the message has been encrypted, the
message is locked for all types of attacks, as it can currently be fully read by anyone.
It makes cryptography more reliable and less vulnerable. By using the watermarking
method, all of these problems are overcome and more robustness is gained.
3 Proposed System
Hybrid domain watermark algorithms and current trends in watermarking hybrid
domain watermark algorithms are often viewed as a combination of plasma and
transform domain computations. These algorithms guarantee both robustness and
improved data compilation properties. Several studies on hybrid methods have been
completed. These studies show the present watermark trends. Reference authors [2]
have merged the location and frequency domain names, such as the image water-
mark, as an example. For example, more watermark information can be embedded
in the server image. This technique increases the capacity of the host image and
splits the watermark into two components, which i mproves security. The spatial
domain replaces the LSB bits of the server image with the parts of the server image
watermark image. On the other hand, the frequency range name inserts data into the
low-frequency elements of the server image.
In addition, a random permutation of the watermark can be used to increase robust-
ness against various signal processing attacks, including image archiving. Another
strategy [3] was launched to secure digital rights to a hybrid domain name. The
scheme protects electronic content by transmitting it to an unsecured station using
the least significant parts as well as a wavelet transform (DWT and SVD) in which
the server image is divided into sub-bands (LL, HL, HH and LH) with the frequency
range, name conversion process. To extract the watermark, the decoding algorithms
244 M. G. Astarkie et al.
Fig. 1 Hybrid watermarking approach
defined above are used; this hybrid scheme offers higher quality and robustness
against various attacks, for example Gaussian noise and JPEG compression; a hybrid
of DWT and SVD has been proposed, which enhances the robustness and impercep-
tibility. Current watermarking algorithms are slightly less powerful than geometric
attacks. In order to withstand geometric attacks, a multi-watermarking algorithm for
medical imaging was therefore proposed, which depends on the dual tree complex
wave transformation (DTCWT), DCT together with a Henon map [4–6]. This algo-
rithm can be used for medical protection, protection authentication and cloud storage
along with cloud transmission (Fig. 1).
Then the Y element is selected for the watermark. The explanation for choosing
the Y element for the watermark is that it is extremely safe and the human eye is more
sensitive to the adjustments introduced in your watermark. Then the discrete cosine
transformation is implemented in Y part of the picture. Then, three different degrees
of wavelet transforms are implemented. In the latter case, the image is decomposed
using the singular value decomposition system. The watermark that will be added to
the image is selected. The singular value decomposition is placed over the watermark.
The value of the changed image is changed according to the unique values of this
current SVD watermark image. Inverse SVD is inserted into the resulting image.
Then, a DWT inverted by three degrees is used. Finally, DCT is implemented. The
color space conversion of the watermarked image from YCbCr to RGB then takes
place. In this way, the embedding of a watermark in an image using the proposed
watermarking technique is completed (Fig. 2).
Initially, a 2D watermarked image is selected, then the color space conversion from
RGB to YCbCr is overlaid on the selected image, and then the Y element is selected
to extract the watermark. Then, the discrete cosine transformation is implemented
A Novel Approach for High Authentication in Digital Watermarking Technique 245
Fig. 2 Hybrid approach extraction process
in this AND part, after which three different degrees of wavelet transformations are
implemented. At this point, the singular value decomposition is placed on the image.
The value of the changed image will be changed to keep the restored content. Then,
the color space conversion is completed on the retrieved watermark image from
YCbCr to RGB. The watermark of an image is completed along with the extraction
process for the projected watermark.
Some calculations degrade the image quality, and others, distort it severely. Some
are difficult to reach, and some are exceptionally robust to standard image processing
operations, but not resistant to the elements. On the other hand, others are exception-
ally robust to geometric impacts, but quite sensitive to various types of noise. Some
of them guarantee much better PSNR and NCC levels, but others result in a reduced
PSNR depending on the programs you want, some are strong.
4 Conclusion and Future Work
At present, the information could be easily reproduced, thanks to the interactive
and electronic communication of multimedia information. The topic of electronic
image watermarks creates a considerable area of study. In this review, we look at
the most current and dominant watermarking methods; it is argued that DWT is
a powerful and high-quality method for image watermarking because of its multi-
resolution attributes. Robustness, imperceptibility and capacity are the key require-
ments for designing an efficient watermarking system. However, it is almost impos-
sible to meet all of these requirements at the same time. Hence, fantastic compen-
sation needs to be maintained that encompasses all three of these requirements.
But security remains a major hurdle in electronic image watermark technology,
246 M. G. Astarkie et al.
and hosting IoT and blockchain-based authentication approaches poses a hurdle
for researchers. Hence, future work will be expanded to include the three technique
names by combining different techniques in different areas Main requirements to
be met. In order to promote robustness in addition to safety, researchers must also
concentrate on developing innovative and innovative processes.
2D discrete cosine transform
2D discrete wavelet transform
Singular value decompision
References
1. H. Tao, L. Chongmin, J.M. Zain, A.N. Abdalla, Robust image watermarking theories and
techniques: a review. J. Appl. Res. Technol. 12, 122–138 (2014)
2. F.Y. Shih, S.Y. Wu, The spatial and frequency domains. J. Pattern Recognit. Soc. 36, 969–975
(2003). Combinational image watermarking
3. Sridhar, Hybrid frequency domain. Int. J. Eng. Technol. 7, 243–248 (2018). Robust digital image
watermarking
4. N.A.K. Abdulrahman, S. Ozturk, Novel hybrid DCT, and DWT based robust watermarking
algorithm for color images. Multimed. Tools Appl. 78, 17027–17049 (2019)
5. Y. Zhang, Digital watermarking technology: a review, in Proceedings of the ETP International
Conference on Future Computer and Communication, Wuhan, China, 6–7 June 2009, pp. 250–
252
6. H.M. Yang, Y. Liang, X.D. Wang, S.J. Ji, A DWT-Based evaluation method of imperceptibility
of watermark in watermarked color image, in Proceedings of the 2007 International Conference
on Wavelet Analysis and Pattern Recognition, Beijing, China, 2–4 November 2007, pp. 198–203