Abstract

The image data received through various sensors are of significant importance in Industry 4.0. Unfortunately, these data are highly vulnerable to various malicious attacks during its transit to the destination. Although the use of pervasive edge computing (PEC) with the Internet of Things (IoT) has solved various issues, such as latency, proximity, and real-time processing, but the security and authentication of data between the nodes is still a significant concern in PEC-based industrial-IoT scenarios. In this article, we present “DWFCAT,” a dual watermarking framework for content authentication and tamper localization for industrial images. The robust and fragile watermarks along with overhead bits related to the cover image for tamper localization are embedded in different planes of the cover image. We have used discrete cosine transform coefficients and exploited their energy compaction property for robust watermark embedding. We make use of a four-point neighborhood to predict the value of a predefined pixel and use it for embedding the fragile watermark bits in the spatial domain. Chaotic and deoxyribonucleic acid encryption is used to encrypt the robust watermark before embedding to enhance its security. The results indicate that DWFCAT can withstand a range of hybrid signal processing and geometric attacks, such as Gaussian noise, salt and pepper, joint photographic experts group (JPEG) compression, rotation, low-pass filtering, resizing, cropping, sharpening, and histogram equalization. The experimental results prove that the DWFCAT is highly efficient compared with the various state-of-the-art approaches for authentication and tamper localization of industrial images.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.