Abstract
Previously, we proposed two secure watermarking algorithms (IM-QIM and SIM-QIM) based on the Quantization Image Modulation (QIM) technique that showed its robustness against a specific histogram attack with multiple images. Traditional QIM versions, including DM-QIM, DC-QIM, and others, are vulnerable to this attack. Our algorithms are based on a modified “correlation immune” scalar quantizer and do not introduce any correlation between the key bits and signal values. Earlier, these algorithms were implemented for grayscale images in the spatial domain. In this paper, we apply our approach in JPEG compression domain and analyze IM-QIM performance in this case. The experimental results have shown that IM-QIM maintains its security in the JPEG domain, while its robustness to typical distortions such as AGWN and JPEG compression improves, compared with spatial domain watermarking. This fact, along with the prevalence of QIM usage in the JPEG (block DCT) domain, indicates the high practical potential of the proposed algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theor. 47, 1423–1443 (2001). https://doi.org/10.1109/18.923725
Zolotavkin Y., Juhola M.: A new two-dimensional quantization method for digital image watermarking. In: 2015 17th International Conference on Advanced Communication Technology (ICACT), pp. 155–160 (2015). https://doi.org/10.1109/ICACT.2015.7224776
Budiman, G., Suksmono, A.B., Danudirdjo, D., Pawellang, S.: QIM-based audio watermarking with combined techniques of SWT-DST-QR-CPT using SS-based synchronization. In: 2018 6th International Conference on Information and Communication Technology (ICoICT), Bandung, pp. 286–292 (2018). https://doi.org/10.1109/ICoICT.2018.8528727
Kanhe, A., Gnanasekaran, A.: A QIM-based energy modulation scheme for audio watermarking robust to synchronization attack. Arab J. Sci. Eng. 44, 3415–3423 (2019). https://doi.org/10.1007/s13369-018-3540-4
Hakka, M., Kuribayashi, M., Morii, M.: DCT-OFDM based watermarking scheme robust against clipping attack. In: Proceedings of the 1st International Workshop on Information Hiding and Its Criteria for Evaluation, pp. 18–24. ACM, New York (2014). https://doi.org/10.1145/2598908.2598914.
Wang, H., Ho, A.T.S., Zhao, X.: A Novel fast self-restoration semi-fragile watermarking algorithm for image content authentication resistant to JPEG compression. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) Digital Forensics and Watermarking, pp. 72–85. Springer Berlin Heidelberg, Berlin, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32205-1_8
Evsutin, O.O., et al.: A new approach to reducing the distortion of the digital image natural model in the DCT domain when embedding information according to the QIM method. CEUR Workshop Proc. 2485, 1–5 (2019)
Evsutin, O., et al.: Algorithm of error-free information embedding into the DCT domain of digital images based on the QIM method using adaptive masking of distortions. Sig. Process. 179, 107811 (2021). https://doi.org/10.1016/j.sigpro.2020.107811
Preda, R.O.: Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain. Measurement 46(1), 367–373 (2013). https://doi.org/10.1016/j.measurement.2012.07.010
Evsutin, O.O., Melman, A.S., Filippov, A.A., Chernov, I.D.: Study of robustness of information embedding into digital images DWT domain using QIM method against destructive effects and steganalysis. J. Phys. Conf. Ser. 1661, 012032 (2020). https://doi.org/10.1088/1742-6596/1661/1/012032
Yang, C., Zhu, C., Wang, Y., et al.: A robust watermarking algorithm for vector geographic data based on Qim and matching detection. Multimed. Tools Appl. 79, 30709–30733 (2020). https://doi.org/10.1007/s11042-020-08916-4
Borah, S., Borah, B.: Quantization index modulation (QIM) based watermarking techniques for 3D meshes. In: 2017 4th International Conference on Image Information Processing (ICIIP), pp. 1–6 (2017). https://doi.org/10.1109/ICIIP.2017.8313726
Matam B.R., Lowe D.: Watermarking: how secure is the DM-QIM embedding technique? In: 2009 16th International Conference on Digital Signal Processing, pp. 1–8 (2009). https://doi.org/10.1109/ICDSP.2009.5201248
Matam, B.R., Lowe, D.: Watermark-only security attack on DM-QIM watermarking: vulnerability to guided key guessing. In: Crime Prevention Technologies and Applications for Advancing Criminal Investigation, pp. 85–106. IGI Global (2012)
Wang, Y., Moulin, P.: Steganalysis of block-structured stegotext. In: Electronic Imaging 2004, pp. 477–488. International Society for Optics and Photonics (2004). https://proceedings.spiedigitallibrary.org/proceeding.aspx?articleid=837745. Accessed 21 Mar 2017
Wu, Z., Li, R., Yin,, Li, C.: Steganalysis of quantization index modulation steganography in G.723.1 codec. Fut. Internet 12, 17 (2020). https://doi.org/10.3390/fi12010017
Mitekin, V.: A new key recovery attack against DM-QIM image watermarking algorithm. In: 9th International Conference on Machine Vision, ICMV 2016. International Society for Optics and Photonics, pp. 103411A–103411A-9 (2017). https://doi.org/10.1117/12.2268550.
Mitekin, V.A., Fedoseev, V.A.: New secure QIM-based information hiding algorithms. Comput. Opt. 42(1), 118–127 (2018). https://doi.org/10.18287/2412-6179-2018-42-1-118-127
Mitekin, V., Fedoseev, V.: A new QIM-based watermarking algorithm robust against multi-image histogram attack. Procedia Eng. 201, 453–462 (2017). https://doi.org/10.1016/j.proeng.2017.09.687
BOWS-2 Web page. https://bows2.ec-lille.fr/. Accessed 31 Oct 2020
Egiazarian, K., et al.: New full-reference quality metrics based on HVS. In: Proceedings of the 2nd International Workshop on Video Processing and Quality Metrics (2006)
Acknowledgements
This research was supported by the RFBR (project 19-29-09045 in part of Sections I, II, and V, project 20-37-70053 in part of Section III, and project 19-07-00357 in part of Section IV).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Fedoseev, V., Kozlov, D. (2021). Secure QIM-Based Image Watermarking in JPEG Compression Domain. In: Abraham, A., et al. Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020). SoCPaR 2020. Advances in Intelligent Systems and Computing, vol 1383. Springer, Cham. https://doi.org/10.1007/978-3-030-73689-7_89
Download citation
DOI: https://doi.org/10.1007/978-3-030-73689-7_89
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-73688-0
Online ISBN: 978-3-030-73689-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)