CFP last date
20 February 2025
Reseach Article

A Robust Privacy-Preserving Architecture for Image Copyright Authentication based on the Blind Watermarking Approach and Elliptic Curve Cryptography

by Crystal Dzebu, Bernard Adjei Buckman, Evans Boye
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 55
Year of Publication: 2024
Authors: Crystal Dzebu, Bernard Adjei Buckman, Evans Boye
10.5120/ijca2024924278

Crystal Dzebu, Bernard Adjei Buckman, Evans Boye . A Robust Privacy-Preserving Architecture for Image Copyright Authentication based on the Blind Watermarking Approach and Elliptic Curve Cryptography. International Journal of Computer Applications. 186, 55 ( Dec 2024), 53-60. DOI=10.5120/ijca2024924278

@article{ 10.5120/ijca2024924278,
author = { Crystal Dzebu, Bernard Adjei Buckman, Evans Boye },
title = { A Robust Privacy-Preserving Architecture for Image Copyright Authentication based on the Blind Watermarking Approach and Elliptic Curve Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2024 },
volume = { 186 },
number = { 55 },
month = { Dec },
year = { 2024 },
issn = { 0975-8887 },
pages = { 53-60 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number55/a-robust-privacy-preserving-architecture-for-image-copyright-authentication-based-on-the-blind-watermarking-approach-and-elliptic-curve-cryptography/ },
doi = { 10.5120/ijca2024924278 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-12-27T02:45:45+05:30
%A Crystal Dzebu
%A Bernard Adjei Buckman
%A Evans Boye
%T A Robust Privacy-Preserving Architecture for Image Copyright Authentication based on the Blind Watermarking Approach and Elliptic Curve Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 55
%P 53-60
%D 2024
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents an Image Copyright Protection and Authentication System (ICPAS) that performs secure digital watermarking for image identification, authentication, and copyright management. The system introduces a hybrid RGB-YUV transposition blind watermarking approach, combining discrete wavelet transform (DWT), discrete cosine transform (DCT), Arnold transform, and Elliptic Curve Diffie-Hellman (ECDH) key exchange. This method ensures robust watermark embedding and extraction, achieving high imperceptibility and resilience against attacks such as JPEG compression, blurring, cropping, and zoom. Experimental results demonstrate the system's effectiveness, with high peak signal-to-noise ratio (PSNR) and normalized correlation coefficient (NCC) values, validating its ability to protect image integrity and authenticate copyrights. The system architecture is designed for scalability and security, integrating key and license servers to ensure privacy and efficient data handling.

References
  1. Phototutorial, "Statistics, Facts, & Predictions.," 2024. [Online]. Available: https://photutorial.com/photos-statistics/. [Accessed 17 October 2024].
  2. Z. Heng , W. Chengyou and Z. Xiao , "Fragile Watermarking for Image Authentication Using the Characteristic of SVD," Algorithms, vol. 10, no. 1, p. 27, 2017.
  3. C. Ingemar, M. Miller, J. Bloom, J. Fridrich and T. Kalker, Digital watermarking and steganography, Morgan kaufmann, 2007.
  4. W. A. Fawaz , "Watermarking for Content Integrity and Ownership Control of Medical Images," Journal of Artificial Intelligence, vol. 10, pp. 32-41, 2017.
  5. R. Priyanka and S. Maheshkar , "Robust Multiple Composite Watermarking Using LSB Technique," in inProceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory andApplications, Advances in Intelligent Systems and Computing, 2017.
  6. M. Moosazadeh and G. Ekbatanifard, "Robust image watermarking algorithm using DCT coefficients rela-tion in YCoCg-R color space," in Eighth International Conference on Information and KnowledgeTechnology (IKT) , Hamedan, Iran, 2016.
  7. Y. Zhang , C. Wang and X. Zhou, "RST Resilient Watermarking Scheme Based on DWT-SVD and Scale-Invariant Feature Transform," Algorithms, vol. 10, no. 2, p. 41, 2017.
  8. R. Kefa, "Elliptic Curve Cryptography over Binary Finite Field GF(2m)," Information Technology, Vols. vol. 5,, pp. no.1, p. 204-229, 2006.
  9. P. Michal , P. K. Grzegorz and K.-J. Aleksandra, "YUV vs RGB – Choosing a Color Space for Human-Machine Interaction," in 2014 Federated Conference on Computer Science and Information Systems, 2014.
  10. B. L. Gunjal and R. R. Manthalkar, "Discrete Wavelet Transform Based Strongly Robust Watermarking Scheme for Information Hiding in Digital Images," in Third International Conference-Emerging Trends in Engineering and Technology, Goa, India, 2010.
  11. G. L. Baisa and M. Suresh, "Secured color image watermarking technique in DWT-DCT domain," International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), vol. 1, no. 3, 2011.
  12. R. Kefa, "Elliptic Curve Cryptography over Binary Finite Field GF(2m)," Information Technology Journal, Vols. 5, no.1, pp. 204-229, 2006.
  13. B. King, "An improved implementation of elliptic curves over gf(2n) when using projective point arithmetic," Lecture Notes in Computer Science (Including Subseries Lecture Notes in Arti_cial Intelligence and Lecture Notes in Bioinformatics), 2259(1), pp. 134-150, 2000.
  14. S. Mitchell D. and T. Ahmed H., Readings in Multimedia Computing and Networkng, 2002.
  15. S. H. a. E. C. Vidyasagar M. Potdar, "A Survey of Digital Image Watermarking Techniques," in Proc. of the IEEE International Conference on Industrial Informatics, pp. 709-716, 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Digital Watermarking Copyright Protection Image Authentication Elliptic Curve Diffie-Hellman (ECDH) Discrete Wavelet Transform (DWT) Hybrid Watermarking Scheme