Secure Content Protection and Verification Framework for Digital Images Communication

IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS
Osama S. Faragallah, Walid El-Shafai, Osama Elshakankiry, Ashraf Afifi, Hala S. El-sayed
{"title":"Secure Content Protection and Verification Framework for Digital Images Communication","authors":"Osama S. Faragallah,&nbsp;Walid El-Shafai,&nbsp;Osama Elshakankiry,&nbsp;Ashraf Afifi,&nbsp;Hala S. El-sayed","doi":"10.1002/ett.70131","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>Data security is an urgent and important dilemma in recent times because of the fast growth of the Internet and multimedia applications. Steganography, watermarking, and encryption techniques may be utilized to achieve data robustness and confidentiality. In this paper, the content-based image verification and data integrity technique are introduced. This technique is reliable and appropriate for confirming the reliability of images communicated through unreliable channels. First, the transferred image is divided into a number of dedicated blocks with different block sizes. Then, several discrete transformations like the DFT (Discrete Fourier Transforms), DWT (Discrete Wavelet Transform), and DCT (Discrete Cosine Transform) are employed and tested individually. They are utilized to insert a block-based watermark for every image block in an alternative image block corresponding to a certain mechanism. The marked image is transmitted over a wireless channel with various corruptions and attacks. On the receiver side, the embedded watermarks for each image block are obtained to distinguish dubious falsification behaviors. Various image analyses and comparisons are employed to test and examine the reliability of the proposed technique to accomplish superior content verification and safeguard images communicated over vulnerable transmission networks. Assessment findings approve the rightness of the suggested technique for different multimedia applications with confidential information categories like military services. In addition, comparative experimental findings and results demonstrate that the suggested content-based image verification and data integrity technique applying the DFT is the best protection framework contrasted with the DWT and DCT, as it achieves in the case of the Peppers image a low MSE of 6.1787, high PSNR of 46.2765 dB, and high C<sub>r</sub> of 0.9933 at a 4 × 4 block size. These achievements ensure and confirm that the proposed method is an effective methodology for multimedia integrity and validation applications.</p>\n </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 5","pages":""},"PeriodicalIF":2.5000,"publicationDate":"2025-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Transactions on Emerging Telecommunications Technologies","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/ett.70131","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

Data security is an urgent and important dilemma in recent times because of the fast growth of the Internet and multimedia applications. Steganography, watermarking, and encryption techniques may be utilized to achieve data robustness and confidentiality. In this paper, the content-based image verification and data integrity technique are introduced. This technique is reliable and appropriate for confirming the reliability of images communicated through unreliable channels. First, the transferred image is divided into a number of dedicated blocks with different block sizes. Then, several discrete transformations like the DFT (Discrete Fourier Transforms), DWT (Discrete Wavelet Transform), and DCT (Discrete Cosine Transform) are employed and tested individually. They are utilized to insert a block-based watermark for every image block in an alternative image block corresponding to a certain mechanism. The marked image is transmitted over a wireless channel with various corruptions and attacks. On the receiver side, the embedded watermarks for each image block are obtained to distinguish dubious falsification behaviors. Various image analyses and comparisons are employed to test and examine the reliability of the proposed technique to accomplish superior content verification and safeguard images communicated over vulnerable transmission networks. Assessment findings approve the rightness of the suggested technique for different multimedia applications with confidential information categories like military services. In addition, comparative experimental findings and results demonstrate that the suggested content-based image verification and data integrity technique applying the DFT is the best protection framework contrasted with the DWT and DCT, as it achieves in the case of the Peppers image a low MSE of 6.1787, high PSNR of 46.2765 dB, and high Cr of 0.9933 at a 4 × 4 block size. These achievements ensure and confirm that the proposed method is an effective methodology for multimedia integrity and validation applications.

Abstract Image

数字图像通信的安全内容保护与验证框架
随着互联网和多媒体应用的快速发展,数据安全成为当今时代一个紧迫而重要的问题。隐写术、水印和加密技术可以用来实现数据的健壮性和保密性。本文介绍了基于内容的图像验证和数据完整性技术。该技术是可靠的,适用于通过不可靠通道传输的图像的可靠性确认。首先,将传输的图像分成若干块大小不同的专用块。然后,使用DFT(离散傅立叶变换),DWT(离散小波变换)和DCT(离散余弦变换)等几种离散变换并分别进行测试。利用它们在对应于某种机制的备选图像块中为每个图像块插入基于块的水印。标记的图像通过具有各种损坏和攻击的无线信道传输。在接收端,获取每个图像块的嵌入水印以区分可疑的伪造行为。采用各种图像分析和比较来测试和检查所提出技术的可靠性,以完成卓越的内容验证并保护在脆弱传输网络上传输的图像。评估结果证实了所建议的技术对于具有机密信息类别(如军事服务)的不同多媒体应用程序的正确性。此外,对比实验结果和结果表明,与DWT和DCT相比,采用DFT的基于内容的图像验证和数据完整性技术是最好的保护框架,在4 × 4块大小下,pepper图像的MSE为6.1787,PSNR为46.2765 dB, Cr为0.9933。这些成果确保并证实了所提出的方法是多媒体完整性和验证应用的有效方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
8.90
自引率
13.90%
发文量
249
期刊介绍: ransactions on Emerging Telecommunications Technologies (ETT), formerly known as European Transactions on Telecommunications (ETT), has the following aims: - to attract cutting-edge publications from leading researchers and research groups around the world - to become a highly cited source of timely research findings in emerging fields of telecommunications - to limit revision and publication cycles to a few months and thus significantly increase attractiveness to publish - to become the leading journal for publishing the latest developments in telecommunications
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信