Abstract

The propagation of digital media over the Internet has helped improve digitization, which has given an excessive lead to copyright issues. Digital watermarking techniques have been applied to address copyright issues. In research, a system is being developed to handle veracious types of watermarked attacks, for obtaining extreme security and an adequate level of visibility and robustness. The discrete wave transform (DWT) and singular value decomposition (SVD) approaches were applied to analyze veracious types of attacks. The DWT method was used to embed the host image in four levels; this level was processed using the SVD method. The peak signal-to-noise ratio (PSNR) and structural similarity index measure (SSIM) were applied to measure the invisibility, and the normalization correlation (NC) was used to examine the robustness of watermarked images. The empirical results showed that the proposed DWT-SVD achieved superior accuracy in identifying the various attacks. The proposed DWT-SVD performance was confirmed during the training process, and the proposed system was shown to have high invisibility and robustness against various types of attacks on watermarked images. Finally, the results of the proposed system were compared to existing systems, and it was shown that DWT-SVD achieved better performance in terms of pixel-value modification attacks.

Highlights

  • Electronic document safeguarding was and remains one of the most critical problems in scientific investigation

  • When the proposed system of discrete wave transform (DWT)-singular value decomposition (SVD) was compared to other systems, it was observed that the results from the proposed system achieved high accuracy in detecting various watermarked attacks

  • The research article (Makram et al, 2021) applied a deep learning model to measure the level of robustness of watermarked images after applying attacks, with the authors using six attacks, namely, salt-and-pepper, Gaussian filtering, median filtering, average filtering, and FCNNDA

Read more

Summary

Introduction

Electronic document safeguarding was and remains one of the most critical problems in scientific investigation. Digital watermarking [2] is considered a current and useful technology for protection of such images. Watermarking technique (WM) can be employed to encode the owner’s data, which is preserved or circulated on the Internet. This technique is used to assert proprietorship through retrieving the encoded watermark data when needed, as per the current technologies, applications fields, and other online platform-based systems. Different approaches have been be implemented to perform watermark embedding, and extracting the WM from the digital image algorithmically or changing it has been introduced [3–9]. Watermarking may be subjected to a harmful attack aimed at destroying or removing the encoded WM data, as well as a nonmalicious attack through procedures that must be used to preserve or circulate the content. As a result, extracting the WM programmatically or sequentially may well not be effective, and a statistical technique may provide better performance

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call