Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Aishwarya VK Naidu, Dr. M. Vinayaka Murthy
DOI Link: https://doi.org/10.22214/ijraset.2023.52347
Certificate: View Certificate
Digital data which is concealed in carrier signal is known as Watermarking. Digital data is embedded within another file is called Steganography, watermarking algorithms are used for keeping the watermark vigorous to attack and Steganography fortifies the information from impostors. Quality of the signal is tarnished when the impostor wants to infiltrate the signal and tries to remove the watermark and it becomes unusable. Information hiding is necessary in several area. Two type of outbreaks are there. Major one is active attack in which the attacker deviates the entire content. Second one is submissive attack in which the invader attempts to presume the secure data through eavesdropping. Dissimilar image data hiding attacks were presented in this paper.
I. INTRODUCTION
The procedure for the copyright guard of the digital pictures is called Watermarking. Numerous methods for copyright protection in digital images were existing in digital image watermarking, the novel image data is altered by embedding a watermark. This watermark comprises crucial data such as endorsement or copyright codes [1]. The process of embedding coded information called as watermark, embedding label or tag into a multimedia item such as image, video or audio. This watermark can be perceived or mined later to validate and evidence the ownership. Watermarks differ significantly in their perceptibility; while selected are vibrant on unplanned examination, others need certain training to pick out. Numerous aids have been advanced, such as watermark fluid that moistures the paper without destructing it. A watermark is much useful in the inspection of paper since it can be used for dating, recognizing sizes, mill trademarks and sites, and identifying the quality of a sheet of paper. The digital watermark is also used for digital practices that share resemblances with physical watermarks. In one case, overprint on computer printed production may be used to identify output from an unlicensed pilot form of a program. In another instance, recognizing codes can be encoded as a digital watermark for a picture, music, video or other file. [2] In modern digital steganography, records is first encrypted or obfuscated in some other way and then presented, using an unusual method, into data that is part of a specific file format such as a JPEG image, audio or video file. The secret message can be embedded into ordinary data files in many dissimilar ways. One method is to hide data in bits that signify the same color pixels frequent in a row in an image file. By applying the encrypted statistics to this redundant data in some inconspicuous way, the outcome will be an image file that looks identical to the unique image but that has "noise" patterns of steady, unencrypted data. The exercise of adding a watermark, a trademark or other recognizing data hidden in multimedia is one mutual use of steganography. Watermarking is a method often used by online publishers to classify the source of media files that have been originate being shared without consent. The following table1 shows the comparison between Watermarking and Steganography.
Table 1: Comparison between Watermarking and Steganography
Methods Used |
Watermarking |
Steganography |
Sturdiness |
Active attacks |
Passive and Active attacks |
Imperceptibility |
Not Significant |
Very |
Communication Encryption |
Not Significant |
Very Significant |
Embedding Capacity |
Less |
More |
Image Association |
Exist |
Does Not Exist |
While there are several diverse uses of steganography, containing embedding subtle data into file types, one of the utmost mutual methods is to entrench a text file into an image file. When this is done, anyone viewing the image file should not be able to see a difference between the original image file and the encrypted file; this is accomplished by storing the message with less significant bites in the data file. This process can be completed manually or with the use of a steganography tool. [3]
II. WATERMARKING APPLICATIONS
There are a variety of presentation scenarios outside that of contented protection for which digital watermarks are also identically appropriate, chiefly for circumstances where there exists no confrontational situation. Watermarking is not restricted to just absorbent information of the presenter in the work, there are numerous other resolutions for which watermarking may be unified into an object.
A. Consumer Precise Prerequisite
Digital watermarks are particularly attractive for signals constituting a continuous stream such as audio or video signals. In case, such signals are transmitted in analog from, recovery must be possible from the analog form, presumably at a minimum after the signal has been attenuated, distorted and transformed in the process of transmission and reproduction. Particularly, in the case of analog video signals with their high bandwidth requirements, the recovery must then either be possible given only a very limited high fidelity recording of the original signal, or from a significantly lower bandwidth recording at a later stage. The former requirement can be further refined into real-time recovery requirements; in this case the watermark must be recovered given a signal passage with a duration delimited by a fixed upper time bound and given a fixed upper bound for the time permitted to recover the watermark after the signal excerpt has been available. For digitally transmitted signals, it must not be possible to detect (and therefore delete) the marking without an appropriately parameterized detector from either the encoded or the base band (decoded) signal and must be robust against digital-to-analog conversions. Since most multimedia signals transmitted digitally are encoded using a compression scheme and have only a fixed bandwidth available, an additional requirement levied on digital watermarks may be that the watermark does not increase the bandwidth required for the marked signal beyond the available bandwidth for a given signal.[4]
B. Safeguarding Patent
For the fortification of intellectual property the records vender can implant a watermark invisibly in his facts. There has always been a difficulty in producing the individuality of the proprietor of an object. In case of a squabble, individuality was established by mining the watermark. [5]
C. Watermarking Annotation
Footnote watermarking is a method that authorizes to subordinate content portrayals with digital pictures in a gritty and format sovereign manner. It is usually used in medicinal claims and, hence, present schemes have been envisioned to meet critical watermark limpidity requirements. As a consequence, the effective capacity of such schemes is severely incomplete.
D. Fingerprinting
A fingerprinting is a method by which a work can be allocated a unique identification by storing some digital information in it in the form of watermark. Perceiving the watermark from any unlawful copy can lead to the identification of the person who has leaked the original content. [6]
E. Hypermedia Endorsement
Hypermedia signal can be effortlessly replicated and operated. Although we cannot perceive the alteration, what we are sighting or listening to may have been altered unkindly for whatever details. Hypermedia authentication is to authorize the realness or fact of the structure and contented multimedia. Hypermedia certification responses the following queries: a.is the multimedia signal from its unproven source b. has it been altered in any way c. Where and to what degree has it been altered if transformed There are chiefly two Approaches that can answer these questions. The first approach to multimedia authentication is cryptograph; while the second approach is the digital watermarking. In addition, cryptograph can be integrated into digital watermarking to provide more desirable authentication.
III. ASSAULTS KINDS
There are four kinds of assaults. In the first class the invader identifies nothing about the procedures and does not own a tool such as a watermark sensor. Thus they may practice diverse falsifications such as solidity, noise sifters and geometrical and temporal alterations. In the second kind, the assailant has more than solitary watermarked exertion. This authorizes the adversary to eliminate watermarks even without knowing about the procedures. The third group of assailants is presumed to know the systems. This stems from Kerckhoffs’ principle in cryptography that states that the opponent identifies everything about the procedure excluding one or more secret keys. So, the assailant can exploit the weaknesses in revealing procedure and launch attacks such as concealing assaults. The last assumption about the attacker deliberates having a finder. The finder makes it potential for the assailant to test dissimilar altered works and attain noble information about the process of the discovery process. This may outcome in several kinds of outbreaks such as oracle attacks. Furthermore, some attacks may be precise to specific applications of digital watermarking as well as having dissimilar motivations. Thus the grouping of assaults may differ regarding diverse viewpoints and details. [10]
A. Message Elimination Attack
The communication is detached incompletely or wholly from the carrier without the need of the safety key. After the outbreak, any smacking procedure will not be brainy to eliminate the watermark. There are numerous clusters of outbreaks for eliminating the message. They can be normally classified to quantization, denoising, and collusion and remodulation outbreak. In denoising outbreak, the goal is to keep the value of the message carrier while attempting to eradicate the message. In the denoising processes, the carrier image is deliberated in a signal and the watermark, or the message is deliberated a noise. The goal is to eliminate the noise. In quantization outbreak, for example the quantization step in JPEG density, the attacker goal is to reestablish the new quantization table of JPEG compressed carrier image. JPEG compression initiate with altering the color scheme of the image from any color scheme such as RGB to YUV [5].
B. Haziness Outbreak
It aims to puzzle the pointer by fabricating fake watermark from a watermarked exertion It is called IBM attack or Craver attack and. Thus, it outcomes in imprecision in the ownership of the media gratified. The susceptibility that authorizes this kind of outbreak is related to the idea of being invertible in the watermarking classification. In fact, being non invertible.
Regarded as one of the favored necessities that a watermarking scheme should own. A potential countermeasure is to make watermarks signal reliant by using cryptographic hash functions.
C. De Harmonization Outbreak
By misaligning the watermark and the locater, this attack is envisioned at accomplishing the discovery of watermark numerous defense tactics have been projected in the literature: de synchronization, resistant schemes, Audio watermarking. A robust audio watermarking scheme in contradiction to time field alteration attacks presented in [6]. This scheme applied an adaptive earpiece providing precise assessment of the quantization step essential shielding against time scale alteration attacks. Hong Peng et al. [7] Presented an adaptive audio watermarking scheme grounded on kernel fuzzy c means clustering algorithm. The innovative audio edge is segmented into audio frames, which in advance detached into sub frames. Afterward, a synchronization code is embedded into first sub frame of each audio mount.as well as hiding the watermark signal into DWT coefficients of second sub structure of each audio structure engaging an energy quantization technique. Another innovative algorithm assimilated wavelet moment and synchronization code to attain appropriate auditory quality and confrontation against de synchronization outbreaks [11].
D. System Outbreak
Conflicting to unlawful action precise attacks, which exploit the susceptibilities of watermarks, system outbreaks take benefit of the flaws in the ways that watermarks are engaged. These attacks should be taken into account when evolving a system that exploits watermarks. Scrambling outbreaks fall into this cluster of attacks. As the name suggests, this attack comprises scrambling of the samples of a watermarked digital media in progress of presentation to a watermark detector. Then, subsequently the pieces will be descrambled. It should be noted that the scrambling must be invertible. A kind of scrambling outbreaks called mosaic attack segments an image to sub images to circumvent a web crawling indicator.
The adversary can take benefit of the fact that most web browsers are capable to suitably descramble the image. There are various kinds for mosaic attacks which have been categorized grounded on the granularity level of the contented segments. For instance, coarse mosaic attack [9] typically utilizes huge slices of content such as movie or audio records. Through separating multimedia files into the segments with precise length, this kind of attack is able to counteract trustworthy source enforcement on distinct segments. It is vital for multimedia equipment to save the antiquity of contented usage and discuss to it for each new contented service. The contented usage some state of the art techniques to counteract these attacks were studied regarding the existing works. Providentially, for several identified attacks, there are appropriate countermeasures; however, typical of the antiquity keeps the track of any watermark removal and its relevant information. By means of this technique, the estimation of enforcement condition can be accomplished with regard to the history and the extracted information for each item.
A general view of attacks against the security of the digital watermarking schemes discussed in the paper. Apart from this, tackers’ behavior, new attacks are predictable to emerge. Moreover, the speedy development of digital multimedia practice has occasioned in thoughtful apprehensions about the duplicate control and intellectual property fortification. Thus, the objective is to make watermarking classifications as protected as possible as well as preserving the sturdiness of the watermarking systems. Scheming precise procedures and algorithms may assist to achieve this objective.
[1] Mr. Manjunatha Prasad. R, Dr.Shivaprakash Koliwad “A Comprehensive Survey of Contemporary Researches in Watermarking for Copyright Protection of Digital Images”, International Journal of Computer Science and Network Security (IJCSNS), Vol.9 No.4, April 2009, pp.91-102. [2] https://en.wikipedia.org/wiki/Online [3] https://searchsecurity.techtarget.com/definition/Online [4] M.S.Kankanhalli and K.F.Hau, “Watermarking of electronic text documents”, Electronic Commerce Research, Vol.2, No.12, pp.169-187, 2002. [5] Me Liehua and G.R.Arce, \"A class of authentication digital watermarks for secure multimedia communication\", Image Processing, IEEE Transactions, Vol.10, No.11, pp.1754-1764, 2001. [6] I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, Second Edi., Burlington: Morgan Kaufmann, 2008, pp. 425-467. [7] Hosam, O. (2013). Side-informed image watermarking scheme based on dither modulation in the frequency domain. The Open Signal Processing Journal, 5(1), 1-6. [8] N. Cvejic and T. Seppanen, “Improved resistance against time desynchronization attacks in multibit audiowatermarking,” Signal Processing and Its Applications, 2007. ISSPA 2007. 9th International Symposium on. pp. 1-4, 2007. [9] W. J. Z. Z. Peng H., “Audio watermarking scheme robust against desynchronization attacks based on kernel clustering,” Multimedia Tools and Applications, pp. 1-19, 2011. [10] W. X.-Y. L. M.-Y. Niu P.-P., “A new digital audio watermaking scheme robust to desynchroniaztion attacks,” in Proceedings - 5th International Conference on Frontier of Computer Science and Technology, FCST 2010, 2010, pp. 233-238. [11] W. J. Z. J. Petrovic R., “Watermark screening in networked environment,” in 2011 10th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services, TELSIKS 2011 - Proceedings of Papers, 2011, pp. 53-60.
Copyright © 2023 Aishwarya VK Naidur, Dr. Vinayaka Murthy. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET52347
Publish Date : 2023-05-16
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here