Using zero watermarks for image authorship and multi-factor authentication
DOI:
https://doi.org/10.30837/rt.2024.3.218.02Keywords:
watermark, zero watermark, authentication, authorship, DWT, SVD, CA, NCC, PSTRAbstract
The relevance of this work lies in the revealed possibilities of using zero watermarks to confirm the authorship of digital images and the use of zero watermarks for images as a method of multifactor authentication.
The paper proposes a modernized zero watermark algorithm for testing the capabilities of zero watermarks. The proposed multifactor authentication algorithm using zero watermarks.
Tests have shown that null watermarks are not suitable for confirming authorship, as they cannot guarantee the distinction between similar images or between images of the same author. However, there is a prospect of using this technology in multi-factor authentication schemes, in combination with other authentication methods (such as password, biometrics, tokens).
References
Марія Огнівчук. Прогноз кіберзагроз 2024 // H-X Technologies [Електронний ресурс] https://www.h-x.technology/ua/blog-ua/cyber-threats-forecast-2024-ua
X. Qi and Y. Liu. Cloud Model Based Zero-Watermarking Algorithm for Authentication of Text Document // 2013 Ninth International Conference on Computational Intelligence and Security, Emeishan, China. 2013. P. 712–715. doi: 10.1109/CIS.2013.155.
Iwendi Celestine, Srivastava Gautam, Jo Ohyun, Javed, Abdul Rehman. KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks // 2020/04/15, IEEE Access, 10.1109/ACCESS.2020.2988160
Cox I., Miller M., Bloom J., Fridrich J., Kalker T. Digital Watermarking and Steganography. 2nd Edition, 2007.
A. Zulfiqar and M. H. Fazal-e-Amin. A Novel Fragile Zero Watermarking Algorithm for Digital Medical Images // Electronics. 2022. Vol. 11. Р.710. doi: https://doi.org/10.3390/electronics1105 0710
Wu D., Wang M. and Zhao J. Color Zero-Watermarking Algorithm for Medical Images Basedon BEMD-Schur Decomposition and Color Visual Cryptography // Hindawi Security and Communication Networks, 2021, doi: https://doi.org/10.1155/2021/7081194
Asha Rani, Amandeep K. Bhullar, Deepak Dangwal, Sanjeev Kumar. A Zero-Watermarking Scheme using Discrete Wavelet Transform // Procedia Computer Science. 2015. Vol. 70. С. 603–609.
Nidhi Sethi, Ram KrishnaImage, Prof R.P. Arora. Image Compression Using Haar Wavelet Transform // Computer Engineering and Intelligent Systems. Vol. 2, No.3
Elizabeth A. Compton and Stacey L. Ernstberger Singular Value Decomposition: Applications to Image Processing // Citations Journal of Undergraduate Research. 2020. Vol. 17.
Roček A., Javorník M., Slavíček K. et al. Zero Watermarking: Critical Analysis of Its Role in Current Medi-cal Imaging // Digit Imaging. 2021. Vol. 34. Р. 204–211.
Peak Signal-to-Noise Ratio as an Image Quality Metric [Електронний ресурс]. Режим доступу: http://www.ni.com/white-paper/13306/en/
The USC-SIPI Image Database [Електронний ресурс]. Режим доступу: URL: https://sipi.usc.edu/database/
R. Gvozdov, V. Poddubnyi, O. Sieverinov, A. Buhantsov, A. Vlasov and V. Sukhoteplyi. Method of Biometric Authentication with Digital Watermarks // PIC S&T, IEEE. 2021. P.569–571. https://doi.org/10.1109/PICST54195.2021.9772134
Hongyan X. Digital media zero watermark copyright protection algorithm based on embedded intelligent edge computing detection // Mathematical Biosciences and Engineering. 2021. Вип. 18(5). С. 6771–6789.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).