Performance Evaluation of a Document Image Watermarking Approach With Enhanced Tamper Localization and Recovery
Digital transmission of sensitive images and documents over unsecure networks, such as the Internet, has become a general practice. As a result, the digital content has become vulnerable to intentional and unintentional modifications during transmission. Prior to considering the reliability of such...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8352640/ |
id |
doaj-b316db21363947bab4b1867be40613b9 |
---|---|
record_format |
Article |
spelling |
doaj-b316db21363947bab4b1867be40613b92021-03-29T21:09:10ZengIEEEIEEE Access2169-35362018-01-016261442616610.1109/ACCESS.2018.28315998352640Performance Evaluation of a Document Image Watermarking Approach With Enhanced Tamper Localization and RecoveryLamri Laouamer0Omar Tayan1https://orcid.org/0000-0002-1481-8976Department of Management Information Systems, College of Business and Economics, Qassim University, Buraydah, Saudi ArabiaDepartment of Computer Engineering, NOOR Research Center, College of Computer Science and Engineering, Taibah University, Medina, Saudi ArabiaDigital transmission of sensitive images and documents over unsecure networks, such as the Internet, has become a general practice. As a result, the digital content has become vulnerable to intentional and unintentional modifications during transmission. Prior to considering the reliability of such digital content, it is important that the authentication and the integrity of the content can be confirmed. Such issues were largely considered in the literature for natural and texture-based images, with only minimal work found to address the challenge of sensitive document images with known constraints. In this paper, we present an evaluation of a non-blind robust-watermarking approach with linear interpolation for tamper-detection, localization and recovery. Performance of the proposed approach and its resistance to random paint-based and Stirmark-based attacks for sensitive documents are investigated. Throughout this paper, a sensitive Arabic scripture was used as a case study of a sensitive document image, in which such operations were performed. The proposed model presents a superior tamper detection and recovery capability in comparison to other models in the related literature. Simulation results had demonstrated that the proposed method was robust to malicious attacks and was capable of localizing and correcting tampered regions with a high degree of accuracy. Significantly, it was noted that an average of 43 dB was obtained for the peak signal-to-noise ratio results, while generally low-BER results were achieved, with a rate of 0% in some cases. Finally, the proposed approach possessed a further advantage in its broad applicability to other sensitive digital image content.https://ieeexplore.ieee.org/document/8352640/Document-imagesmalicious attacksperformance-evaluationtamper-localizationtamper-recoverywatermarking-approach |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Lamri Laouamer Omar Tayan |
spellingShingle |
Lamri Laouamer Omar Tayan Performance Evaluation of a Document Image Watermarking Approach With Enhanced Tamper Localization and Recovery IEEE Access Document-images malicious attacks performance-evaluation tamper-localization tamper-recovery watermarking-approach |
author_facet |
Lamri Laouamer Omar Tayan |
author_sort |
Lamri Laouamer |
title |
Performance Evaluation of a Document Image Watermarking Approach With Enhanced Tamper Localization and Recovery |
title_short |
Performance Evaluation of a Document Image Watermarking Approach With Enhanced Tamper Localization and Recovery |
title_full |
Performance Evaluation of a Document Image Watermarking Approach With Enhanced Tamper Localization and Recovery |
title_fullStr |
Performance Evaluation of a Document Image Watermarking Approach With Enhanced Tamper Localization and Recovery |
title_full_unstemmed |
Performance Evaluation of a Document Image Watermarking Approach With Enhanced Tamper Localization and Recovery |
title_sort |
performance evaluation of a document image watermarking approach with enhanced tamper localization and recovery |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2018-01-01 |
description |
Digital transmission of sensitive images and documents over unsecure networks, such as the Internet, has become a general practice. As a result, the digital content has become vulnerable to intentional and unintentional modifications during transmission. Prior to considering the reliability of such digital content, it is important that the authentication and the integrity of the content can be confirmed. Such issues were largely considered in the literature for natural and texture-based images, with only minimal work found to address the challenge of sensitive document images with known constraints. In this paper, we present an evaluation of a non-blind robust-watermarking approach with linear interpolation for tamper-detection, localization and recovery. Performance of the proposed approach and its resistance to random paint-based and Stirmark-based attacks for sensitive documents are investigated. Throughout this paper, a sensitive Arabic scripture was used as a case study of a sensitive document image, in which such operations were performed. The proposed model presents a superior tamper detection and recovery capability in comparison to other models in the related literature. Simulation results had demonstrated that the proposed method was robust to malicious attacks and was capable of localizing and correcting tampered regions with a high degree of accuracy. Significantly, it was noted that an average of 43 dB was obtained for the peak signal-to-noise ratio results, while generally low-BER results were achieved, with a rate of 0% in some cases. Finally, the proposed approach possessed a further advantage in its broad applicability to other sensitive digital image content. |
topic |
Document-images malicious attacks performance-evaluation tamper-localization tamper-recovery watermarking-approach |
url |
https://ieeexplore.ieee.org/document/8352640/ |
work_keys_str_mv |
AT lamrilaouamer performanceevaluationofadocumentimagewatermarkingapproachwithenhancedtamperlocalizationandrecovery AT omartayan performanceevaluationofadocumentimagewatermarkingapproachwithenhancedtamperlocalizationandrecovery |
_version_ |
1724193444878876672 |