Abstract

Due to the rise in many industrial environment applications involving distributed networked collaborative intelligent measurement systems, intelligent monitoring and multi-sensor information exchange of private information, digital image information security and hidden image authentication, tampering detection, correction, and automatic intelligent self-recovery have become critical concerns. Towards that end, there is a need for more secure, efficient, and robust-to-unauthorized-tampering digital image watermarking, information hiding and authentication schemes. In our prior work, we introduced non-blind watermarking schemes where the carrier and watermark images are available at the receiver's end. We also proposed a double-blind scheme where both the carrier and the watermark images are not available at the receiver's end, but at the expense of possible lower pixel tampering, authentication and automatic intelligent self-correction ability. This paper proposes a blind wavelet-based, high capacity, secure digital watermarking and information hiding scheme with higher tampering localization and authentication that nullifies the need to have the carrier image available at the receiving end. The proposed scheme also increases robustness to image authentication and automatic self-recovery and correction compared to our prior double-blind scheme. The scheme is high capacity and sustains hiding secret hidden and watermarking images of the same full size as an arbitrary-sized carrier image. One of the benefits of the blind watermarking scheme is that it allows usage of varying and arbitrary carrier images that are unknown and unavailable anywhere, including the receiver's end. This is to prevent hackers' recognition of a familiar carrier image and their potential unauthorized tampering. Here, in this paper, two grayscale images are inserted in a colored carrier image. Here the watermark image is used for authentication and tamper localization. The second image is used as ownership or encoded secret hidden message image. The Arnolds Transform is used to introduce added security to a hidden image. The proposed scheme uses an embedded correction matrices mechanism for the extracted hidden information self-recovery from various tampering and digital attacks by unauthorized hackers.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call