Robust Image Watermarking for Tamper Detection and Self-Recovery Using SVD and RSA Methods

  • Taha Y. Abdulqader 1. Department of Electronic Technologies, Mosul Technical Institute, Northern Technical University, Mosul, Iraq
  • Neam Salim Mohammed 2. Department of Electronic Technologies, Mosul Technical Institute, Northern Technical University, Mosul, Iraq
  • Lujain Younis Abdulkadir 1. Department of Electronic Technologies, Mosul Technical Institute, Northern Technical University, Mosul, Iraq
Keywords: Peak Signal-To-Noise Ratio, Rivest-Shamir-Adleman, Singular Value Decomposition, Tampered Images

Abstract

To The paper proposes an Image watermarking technique for identifying and self-recovering tampered images. The system identifies tampered images by comparing the SVD values of 4X4 blocks and average pixel intensities of 2×2 blocks. In the process of SVD computation, the RGB channel images are divided into 4X4 blocks, after which a further 2X2 blocks division is executed for determination of average pixel intensity.  Within the same block, tamper-detection data is entered, whereas the self-recovery data is scattered all over the image utilising inverse and RSA techniques for neighborhood block-based recovery. This method assures easy long-term self-healing. The outputs produced from testing with 15 multiple host images in varied attacks were constantly performing better with a PSNR ratio upto an average of 45 dB.

References

Alharbi, F., & Kashyap, G. S. "Empowering Network Security through Advanced Analysis of Malware Samples: Leveraging System Metrics and Network Log Data for Informed Decision-Making." *International Journal of Networked and Distributed Computing*, 2024, pp. 1–15. https://doi.org/10.1007/s44227-024-00032-1

Awasthi, D., & Srivastava, V. K. "Hessenberg Decomposition-Based Medical Image Watermarking with Its Performance Comparison by Particle Swarm and JAYA Optimization Algorithms for Different Wavelets and Its Authentication Using AES." *Circuits, Systems, and Signal Processing*, 2023, pp. 1–32. https://doi.org/10.1007/s00034-023-02344-z

Bhavani, Y., Bejjanki, K. K., & Nagasai Anjani kumar, T. "Singular Value Decomposition and Rivest–Shamir–Adleman Algorithm-Based Image Authentication Using Watermarking Technique." 2023, pp. 387–395. https://doi.org/10.1007/978-981-19-8563-8_37

Garg, P., & Jain, A. "A robust technique for biometric image authentication using invisible watermarking." *Multimedia Tools and Applications*, vol. 82, no. 2, 2023, pp. 2237–2253. https://doi.org/10.1007/s11042-022-13314-z

Habib, H., Kashyap, G. S., Tabassum, N., & Nafis, T. "Stock Price Prediction Using Artificial Intelligence Based on LSTM–Deep Learning Model." In *Artificial Intelligence & Blockchain in Cyber Physical Systems: Technologies & Applications*, CRC Press, 2023, pp. 93–99. https://doi.org/10.1201/9781003190301-6

Haouzia, A., & Noumeir, R. "Methods for image authentication: A survey." *Multimedia Tools and Applications*, vol. 39, no. 1, 2008, pp. 1–46. https://doi.org/10.1007/s11042-007-0154-3

Kanojia, M., Kamani, P., Kashyap, G. S., Naz, S., Wazir, S., & Chauhan, A. "Alternative Agriculture Land-Use Transformation Pathways by Partial-Equilibrium Agricultural Sector Model: A Mathematical Approach." 2023. https://arxiv.org/abs/2308.11632v1

Kapre, B. S., Rajurkar, A. M., & Guru, D. S. "Self-embedding and Variable Authentication Approach for Fragile Image Watermarking Using SVD and DCT." *Communications in Computer and Information Science*, vol. 1697 CCIS, 2022, pp. 366–379. https://doi.org/10.1007/978-3-031-22405-8_29

Kashyap, G. S., Malik, K., Wazir, S., & Khan, R. "Using Machine Learning to Quantify the Multimedia Risk Due to Fuzzing." *Multimedia Tools and Applications*, vol. 81, no. 25, 2022, pp. 36685–36698. https://doi.org/10.1007/s11042-021-11558-9

Kashyap, G. S., Siddiqui, A., Siddiqui, R., Malik, K., Wazir, S., & Brownlee, A. E. I. "Prediction of Suicidal Risk Using Machine Learning Models." 2021. https://papers.ssrn.com/abstract=4709789

Kashyap, G. S., Sohlot, J., Siddiqui, A., Siddiqui, R., Malik, K., Wazir, S., & Brownlee, A. E. I. "Detection of a facemask in real-time using deep learning methods: Prevention of Covid 19." 2024. https://arxiv.org/abs/2401.15675v1

Kashyap, G. S., Wazir, S., Hamdard, J., Delhi, N., Malik, I. K., Sehgal, V. K., & Dhakar, R. "Revolutionizing Agriculture: A Comprehensive Review of Artificial Intelligence Techniques in Farming." 2024. https://doi.org/10.21203/RS.3.RS-3984385/V1

Kaur, P., Kashyap, G. S., Kumar, A., Nafis, M. T., Kumar, S., & Shokeen, V. "From Text to Transformation: A Comprehensive Review of Large Language Models’ Versatility." 2024. https://arxiv.org/abs/2402.16142v1

Liu, X., Yang, H., Liu, Z., Song, L., Li, H., & Chen, Y. "DPatch: An adversarial patch attack on object detectors." *CEUR Workshop Proceedings*, vol. 2301, 2019. https://arxiv.org/abs/1806.02299v4

Marwah, N., Singh, V. K., Kashyap, G. S., & Wazir, S. "An analysis of the robustness of UAV agriculture field coverage using multi-agent reinforcement learning." *International Journal of Information Technology (Singapore)*, vol. 15, no. 4, 2023, pp. 2317–2327. https://doi.org/10.1007/s41870-023-01264-0

Nadeem, A., & Javed, M. Y. "A performance comparison of data encryption algorithms." *Proceedings of 1st International Conference on Information and Communication Technology, ICICT 2005*, 2005, pp. 84–89. https://doi.org/10.1109/ICICT.2005.1598556

Naz, S., & Kashyap, G. S. "Enhancing the predictive capability of a mathematical model for pseudomonas aeruginosa through artificial neural networks." *International Journal of Information Technology*, 2024, pp. 1–10. https://doi.org/10.1007/S41870-023-01721-W

Pavani, K., & Sriramya, P. "Enhancing public key cryptography using RSA, RSA-CRT and N-Prime RSA with multiple keys." *Proceedings of the 3rd International Conference on Intelligent Communication Technologies and Virtual Mobile Networks, ICICV 2021*, 2021, pp. 661–667. https://doi.org/10.1109/ICICV50876.2021.9388621

Safavipour, M. H., Doostari, M. A., & Sadjedi, H. "A hybrid approach to multimodal biometric recognition based on feature-level fusion of face, two irises, and both thumbprints." *Journal of Medical Signals and Sensors*, vol. 12, no. 3, 2022, pp. 177–191. https://doi.org/10.4103/jmss.jmss_103_21

Salama, P., & King, B. "Efficient secure image transmission: compression integrated with encryption." *Security, Steganography, and Watermarking of Multimedia Contents VII*, vol. 5681, 2005, p. 47. https://doi.org/10.1117/12.587011

Singh, D., Singh, S. K., & Udmale, S. S. "An efficient self-embedding fragile watermarking scheme for image authentication with two chances for recovery capability." *Multimedia Tools and Applications*, vol. 82, no. 1, 2023, pp. 1045–1066. https://doi.org/10.1007/s11042-022-13270-8

Steinebach, M., & Dittmann, J. "Watermarking-Based Digital Audio Data Authentication." *Eurasip Journal on Applied Signal Processing*, vol. 2003, no. 10, 2003, pp. 1001–1015. https://doi.org/10.1155/S1110865703304081

Vilić, V. M. "Dark web, cyber terrorism and cyber warfare: Dark side of the cyberspace." *Balkan Social Science Review*, vol. 10, no. 10, 2017, pp. 7–24.

Wazir, S., Kashyap, G. S., Malik, K., & Brownlee, A. E. I. "Predicting the Infection Level of COVID-19 Virus Using Normal Distribution-Based Approximation Model and PSO." In Springer, Cham, 2023, pp. 75–91. https://doi.org/10.1007/978-3-031-33183-1_5

Wazir, S., Kashyap, G. S., & Saxena, P. "MLOps: A Review." 2023. https://arxiv.org/abs/2308.10908v1
Published
2024-07-23
How to Cite
Taha Y. Abdulqader, Neam Salim Mohammed, & Lujain Younis Abdulkadir. (2024). Robust Image Watermarking for Tamper Detection and Self-Recovery Using SVD and RSA Methods. CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES, 5(3), 193 - 204. Retrieved from https://cajmtcs.casjournal.org/index.php/CAJMTCS/article/view/645
Section
Articles