Auto-authentication watermarking scheme based on CNN and perceptual hash function in the wavelet domain

Hanen Rhayma,Ridha Ejbali,Habib Hamam
DOI: https://doi.org/10.1007/s11042-023-17924-z
IF: 2.577
2024-01-04
Multimedia Tools and Applications
Abstract:This paper presents a novel method for image watermarking authentication using Convolutional Neural Networks (CNN). The proposed method addresses the challenge of embedding the watermark effectively while minimizing visual quality degradation. The approach leverages a perceptual hash function (PHF) to compute a perceptual hash value (PHV) based on CNN-extracted features applied on the approximation sub-band (Level 5) of the original image. During embedding, a pseudo-random map is generated in order to improve the security of the proposed scheme against local attack. Then, the hash value is embedded into the approximation sub-band (Level 2) of the host image using Quantization Index Modulation (QIM) in conjunction with the generated map. In the watermark extraction stage, the received watermarked image undergoes inverse QIM processing to extract the embedded watermark. The CNN is used once again to compute a new hash value based on extracted features from the received watermarked image following the same methodology. The extracted watermark is then compared with the new hash value for authentication. Experimental results demonstrate the effectiveness of the proposed CNN-based watermarking method. Performance evaluation includes objective metrics such as Structural Similarity Index (SSIM) and Peak Signal-to-Noise Ratio (PSNR), along with subjective evaluations. The findings indicate that the method achieves high watermark invisibility and sensitivity against intentional attacks while maintaining satisfactory visual quality. The quality of the watermarked image is extremely high exceeding 57dB as PSNR and 0.999 as SSIM. The embedded watermark is also robust to JPEG compression under a moderate level (QF=70).
computer science, information systems, theory & methods,engineering, electrical & electronic, software engineering
What problem does this paper attempt to address?