Image Authentication Using Cryptography and Watermarking
Keywords:
Advanced Encryption Standard (AES), Cryptography, Discrete wavelet transform (DWT), Image authentication, WatermarkingAbstract
With the exponential growth in digital image transmission over public and private networks, ensuring the authenticity and integrity of images has become a critical concern. Unauthorized alterations, duplications, and forgeries pose significant threats to sensitive domains such as medical diagnostics, military surveillance, and legal documentation. This research proposes a dual-layered image authentication system that integrates cryptographic techniques with digital watermarking to provide robust security and tamper detection capabilities.
The proposed method uses cryptographic algorithms, specifically the Advanced Encryption Standard (AES), to encrypt watermark data and applies Discrete Wavelet Transform (DWT)-based watermarking to imperceptibly embed the encrypted watermark into the image. The cryptographic layer protects the watermark during embedding and transmission, while the watermarking layer maintains integrity and enables traceability. A secure hash function (SHA-256) creates a unique hash code for image verification, further strengthening authentication capabilities.
Experiments were conducted on standard image datasets under various attack conditions, including JPEG compression, cropping, noise addition, and rotation. The performance was evaluated using metrics such as Peak Signal-to-Noise Ratio (PSNR), Structural Similarity Index Measure (SSIM), and Bit Error Rate (BER). The proposed scheme demonstrated high imperceptibility, robustness against attacks, and accurate tamper localization.
The dual integration of cryptography and watermarking addresses the limitations of standalone methods by combining confidentiality with traceable authenticity. This method offers a scalable and secure framework suitable for real-time applications in healthcare, e-governance, digital forensics, and remote sensing. Future work includes incorporating machine learning for adaptive watermark positioning and blockchain for decentralized verification.
References
R. Abirami and C. Malathy, “Medical image security by crypto watermarking using enhanced chaos and fruit fly optimization algorithm with SWT and SVD,” Multimedia Tools and Applications, vol. 83, no. 27, pp. 70451-70476, Apr. 2024, doi: https://doi.org/10.1007/s11042-024-19019-9
S. Krishnagopal, S. Pratap, and B. Prakash, “Image Encryption and Steganography Using Chaotic Maps with a Double Key Protection,” Advances in Intelligent Systems and Computing, pp. 67–78, Dec. 2014, doi: https://doi.org/10.1007/978-81-322-2220-0_6
G. S. Charan, Nithin Kumar S S V, Karthikeyan B, Vaithiyanathan V, and Divya Lakshmi K, "A novel LSB based image steganography with multi-level encryption," 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, India, 2015, pp. 1-5, doi: https://doi.org/10.1109/ICIIECS.2015.7192867
M. Dahiya and R. Kumar, "A Literature Survey on various Image Encryption & Steganography Techniques," 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC), 2018, pp. 310-314, doi: https://doi.org/10.1109/ICSCCC.2018.8703368
M. Boussif, N. Aloui, and A. Cherif, “DICOM imaging watermarking for hiding medical reports,” Medical & Biological Engineering & Computing, vol. 58, no. 11, pp. 2905–2918, Sep. 2020, doi: https://doi.org/10.1007/s11517-020-02269-8.
A. Mulani and P. B. Mane, DWT Based Robust Invisible Watermarking, Scholar Press, 2016.
S. S. Swami and A. O. Mulani, "An efficient FPGA implementation of discrete wavelet transform for image compression," 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), Chennai, India, 2017, pp. 3385-3389, doi: https://doi.org/10.1109/ICECDS.2017.8390088
P. B. Mane and A. O. Mulani, “High Speed Area Efficient FPGA Implementation of AES Algorithm,” International Journal of Reconfigurable and Embedded Systems (IJRES), vol. 7, no. 3, p. 157, Nov. 2018, doi: https://doi.org/10.11591/ijres.v7.i3.pp157-165
A. O. Mulani and P. B. Mane, “Area efficient high speed fpga based invisible watermarking for image authentication,” Indian Journal of Science and Technology, vol. 9, no. 39, Oct. 2016, doi: https://doi.org/10.17485/ijst/2016/v9i39/101888
P. R. Kulkarni, A. O. Mulani, and P. B. Mane, “Robust invisible watermarking for image authentication,” Lecture Notes in Electrical Engineering, pp. 193–200, Nov. 2016, doi: https://doi.org/10.1007/978-981-10-1540-3_20
G. Shinde and A. Mulani, "A robust digital image watermarking using dwt –Pca," International Journal of Innovations in Engineering Research and Technology, vol. 6, no. 4, pp. 1-7, 2019, Available: https://www.neliti.com/publications/428454/a-robust-digital-image-watermarking-using-dwt-pca#cite
P. R. Kulkarni and A. O. Mulani, “Robust invisible digital image watermarking using discrete wavelet transform,” International Journal of Engineering Research & Technology (IJERT), vol. 4, no. 1, pp.139-141, 2015 https://www.ijert.org/robust-invisible-digital-image-watermarking-using-discrete-wavelet-transform
P. B. Mane, A. O. Mulani, “High throughput and area efficient FPGA implementation of AES algorithm,” International Journal of Engineering and Advanced Technology, vol. 8, no. 4, pp. 519-523, Apr. 2019, Available: https://www.ijeat.org/wp-content/uploads/papers/v8i4/B5573128218.pdf
A. O. Mulani and P. B. Mane, “An Efficient implementation of DWT for image compression on reconfigurable platform,” International Journal of Control Theory and Applications, vol. 10, no. 15, pp. 1-7, 2016, Available: https://serialsjournals.com/abstract/93680_111-47.142.pdf
S. Takale and Dr. A. Mulani, “DWT-PCA based Video Watermarking,” Journal of Electronics, Computer Networking and Applied Mathematics, vol. 2, no. 6, pp. 1–7, Nov. 2022, doi: https://doi.org/10.55529/jecnam.26.1.7
H. S. Deshpande, K. J. Karande, and A. O. Mulani, "Area optimized implementation of AES algorithm on FPGA," 2015 International Conference on Communications and Signal Processing (ICCSP), Melmaruvathur, India, 2015, pp. 0010-0014, doi: https://doi.org/10.1109/ICCSP.2015.7322746
A. O. Mulani and P. B. Mane, "Area optimization of cryptographic algorithm on less dense reconfigurable platform," 2014 International Conference on Smart Structures and Systems (ICSSS), Chennai, India, 2014, pp. 86-89, https://doi.org/10.1109/ICSSS.2014.7006201
A. O. Mulani and P. B. Mane, “Secure and area efficient implementation of digital image watermarking on reconfigurable platform,” International Journal of Innovative Technology and Exploring Engineering, vol. 8, no. 2, pp. 56-61, Dec. 2018, Available: https://www.researchgate.net/profile/Altaf-Mulani-2/publication/329969794_B2545128218/
R. S. Shinde and A. O. Mulani, "Analysis of Biomedical Image Using Wavelet Transform." International Journal of Innovations in Engineering Research and Technology, vol. 2, no. 7, pp. 1-7, 2015, Available: https://www.neliti.com/publications/416834/analysisof-biomedical-image-using-wavelet-transform#cite
A. O. Mulani and P. B. Mane, “Fast and Efficient VLSI Implementation of DWT for Image Compression,” International Journal for Research in Applied Science & Engineering Technology, vol. 5, no. 9, pp. 1397-1402, Sep. 2017, Available: https://www.ijraset.com/fileserve.php?FID=10106
R. Agrawal, K. N. Tripathi, R. K. Singh, N. A. Shelke, and U. Gupta, “A secure image authentication technique based on sparse approximation and quantum mechanism,” Digital Signal Processing, vol. 147, p. 104419, Feb. 2024, doi: https://doi.org/10.1016/j.dsp.2024.104419
L. Zhu, H. Song, X. Zhang, M. Yan, “A robust meaningful image encryption scheme based on block compressive sensing and SVD embedding,” Signal Processing, vol. 175, pp. 107629–107629, Oct. 2020, doi: https://doi.org/10.1016/j.sigpro.2020.107629.
N. Zhou, L.-J. Tong, and W.-P. Zou, “Multi-image encryption scheme with quaternion discrete fractional Tchebyshev moment transform and cross-coupling operation,” Signal Processing, vol. 211, pp. 109107–109107, Oct. 2023, doi: https://doi.org/10.1016/j.sigpro.2023.109107
L.-H. Gong and H.-X. Luo, “Dual color images watermarking scheme with geometric correction based on quaternion FrOOFMMs and LS-SVR,” Optics and Laser Technology, vol. 167, pp. 109665–109665, Dec. 2023, doi: https://doi.org/10.1016/j.optlastec.2023.109665
G. Hu, D. Xiao, Y. Wang, and T. Xiang, “An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications,” Journal of Visual Communication and Image Representation, vol. 44, pp. 116–127, Apr. 2017, doi: https://doi.org/10.1016/j.jvcir.2017.01.022
N. Zhou and G. Xue, “The ratio apparent resistivity definition of rectangular-loop TEM,” Journal of Applied Geophysics, vol. 103, pp. 152–160, Feb. 2014, doi: https://doi.org/10.1016/j.jappgeo.2014.01.015
C. Vyas and M. Lunagaria, "A review on methods for image authentication and visual cryptography in digital image watermarking," 2014 IEEE International Conference on Computational Intelligence and Computing Research, Coimbatore, India, 2014, pp. 1-6, doi: https://doi.org/10.1109/ICCIC.2014.7238504
A. Abrar, W. Abdul, and S. Ghouzali, “Secure Image Authentication Using Watermarking and Blockchain,” Intelligent Automation & Soft Computing, vol. 28, no. 2, pp. 577–591, 2021, doi: https://doi.org/10.32604/iasc.2021.016382
S. Radharani and M.L. Valarmathi, “Multiple Watermarking Scheme for Image Authentication and Copyright Protection using Wavelet based Texture Properties and Visual Cryptography,” International Journal of Computer Applications, vol. 23, no. 3, pp. 29–36, Jun. 2011, doi: https://doi.org/10.5120/2868-3716
A. O. Mulani and G. N. Shinde, “An approach for robust digital image watermarking using DWTPCA,” Journal of Science & Technology, vol. 6, no. Special Issue 1, pp. 59 62, Jul. 2025, doi: https://doi.org/10.46243/jst.2021.v6.i04.pp59-62
A. O. Mulani, M. M. Jadhav, M. Seth, “Painless Non‐invasive blood glucose concentration level estimation using PCA and machine learning,” Artificial Intelligence, Internet of Things (IoT) and Smart Materials for Energy Applications, CRC Press, pp. 18, 2022, Available: https://www.taylorfrancis.com/chapters/edit/10.1201/9781003220176-6/