Page 84 - IJEEE-2023-Vol19-ISSUE-1
P. 84
80 | Hussein, Muhajjar, & Mahdi
shares. The watermark must be embedded before it can be approach to accomplish its goal at each stage. Figure 1 shows
extracted for matching. Thus, extraction is performed by the the general framework of the suggested approach:
receiver, and OR, or XOR is employed during stacking.
According to the results, XOR rather than OR increases Fig. 1: Architecture of proposed system.
PSNR in this study[8]. A. Stage one (Watermark Generator)
Ayu et al., 2019, the suggested method offered dual-layer A unique generator using visual cryptography and hashing is
fragile digital watermarking, which involves two watermarks employed to secure our images from this vulnerability. By
being incorporated into medical images. They used a method ignoring redundant bits, watermark generators minimize the
known as the Advanced Encryption Standard. (AES) to number of bits concealed in the cover image document.
protect the secrecy and validity of the Electronic Patient
Record (EPR). Digital Imaging and Communication in 1) Visual Cryptography (VC)
Medicine (DICOM) tags were embedded in 2LSB as the first The proposed technique employs Visual Cryptography (VC)
fragile watermark, and their integrity was then verified using to generate two random images from a secret image, one for
the Secure Hash Algorithm (SHA256). Finally, they divided private sharing and one for public sharing, in order to
the picture into non-overlapping chunks, gave each one an guarantee the best level of security and authenticity for the
id, computed the SHA256 for integrity, and used it as a owner's watermark. A private sharing image is used in the
tamper detector [9]. creation of the watermark. In addition, a secret one is kept to
Gul & Ozturk., 2019, LSB was proposed as a method for be utilized in the watermark extraction process and to ensure
spatial watermarking. They made a watermark by breaking that an attacker cannot uncover any hints about a concealed
an image into four sub-blocks and then processing the three picture in the original images. The proposed visual
sub-blocks through the SHA-256 hash method. Checking the cryptography method entails creating the following step:
watermark's authenticity and integrity is possible by
extracting and comparing it to a hash value. Due to this, the • Distribution phase secret encode table
authentication procedure will be less secure, particularly • Reconstruction phase [14]
against pixel-based attacks such as salt and paper noise [10]. This approach assumes that an image or message is
Sinhal et al., 2020 the color picture was separated into 2*4 composed of black pixels represented as (0) and white pixels
non-overlapping blocks using pseudo-random, created a represented as (1). A combination of share stacking and an
random integer between 0 and 1 and then converted to OR operation revealed the secret. In other words, the
binary. The output of this procedure is a 6-bit sequence. It probability of obtaining a white (or black) pixel is 50 percent
would then be a fragile watermark embedded. Block-wise [15].
classification as forgery or originally based on neighbor 2) Hash Function
blocks is performed in the extraction watermark by Hashing is Converting random data into a fixed-length
performing a series of operations such as LSB and others to representation (a hash code or message digest) that is often
each RGB (red, green, blue) channel. Utilize the six most represented as a hexadecimal number. The hash function
critical bits in recovery [11]. uses an index to get the information that corresponds to the
Reyes-Reyes et al., 2021, the author suggests a system for original value or key. One-way hash functions are the only
dealing with RGB color pictures by dividing them into non- function used to determine the hash value from a given input
overlapping blocks. After that, use Pseudocode on each without the ability to recover the initial information. The
channel to create the recovery and authentication watermarks SHA-2 hash method is implemented. While it is an excellent
for each block. In the second phase, one bit of authentication method for keeping your data safe, it does take a while to
data for blocks is generated by performing the XOR process. A 256-bit digest is generated using SHA-2[16].
operation on each of the three recovery watermarks [12].
Su et al., 2021. Proposed hidden information using the
concept of the Sudoku game. After producing it using a
pseudo-random number generator, they embedded fragile
watermarking. During extraction, compare it to the original.
They employed a two-layer hidden information basis from
the first layer to extract nine candidate pairings. After that,
extract the block index and values index from each pair. They
chose the final pair with the watermark based on Euclidian
distance [13].
III. ARCHITECTURE OF PROPOSED SYSTEM
The suggested type is built on a three-stage design, the first
stage defining the generated watermark. Step two involves
adding a watermark, which is done in a certain technique.
The last step involves the receiver extracting the watermark
from the image and then verifying the integrity of the
embedded watermark. This method relies on a multi-layer