【正文】
erence in timingsbetween Schemes 1 and 2 is due to the calculation of ranks of the individual blocks and selection of blocks to embed thewatermark bits. Furthermore, it can also be seen that the time taken to select blocks based on rank is imagedependentthat gives rise to significant differences in timing. However, in our proposed scheme, the embedding time is found to beindependent of the host image. The extraction time in the proposed scheme (as shown in Fig. 4(b)) is also reduced to alarge extent, because only CRT calculations are needed during extraction phase. The average extraction time for Scheme 1,Scheme 2 and proposed scheme was observed to be 190, 90 and 20 ms, respectively. It is also noticed that unlike the twoSVDbased schemes, the extraction time in our proposed scheme does not depend on the host image. Scheme 2 is fasterthan Scheme 1 because of absence of rank calculation and selection of blocks based on rank.The putational advantage of the proposed scheme is derived from the fact that CRT involves only modular operationswhich are putationally e?cient pared to SVD. In the SVDbased Schemes 1 and 2, the basic operations involved inthe embedding phase are given by: (i) given a matrix A, generate the three matrices, U, V and D, (ii) manipulate someelements of U or V matrix, and (iii) obtain the matrix?A through SVD using modified U, V and D. In our proposed scheme,the basic operations in the embedding stage are given by: (i) given an integer Z, using CRT determine the residues R1. Patra et al. / Digital Signal Processing 20 (2020) 442–453 449Fig. 5. Quality of watermarked image in PSNR for different host images.and R2, (ii) check the embedding conditions, and (iii) modify Z until embedding conditions are satisfied. We simulatedthese operations in an Intel Duo P8600based CPU with GHz clock and 4 GB RAM using JAVA programming language.The average putation time for one run of the SVD and CRT based basic operations were found to be 37 ms and 92 ns,respectively. This shows that the CRTbased putations are much faster than SVD putations. The relative timingsshown in Fig. 4 are much higher because they were based on a different PC specification and are meant for pleteembedding and extraction phases.. Quality of watermarked imagesThe quality of the watermarked images used to embed the watermark with respect to the different schemes is investigated here. Fig. 5 shows the quality of the watermarked images based on PSNR for the different host images. In Schemes1 and 2, a strength factor, α = was used for embedding. The performance difference between Schemes 1 and 2 is notsignificant. Note that Scheme 1 utilizes the rank property of the block matrices by giving preference to higher ranked blocksduring the embedding procedure. However, it does not seem to have a clear advantage in quality of the watermarked imagewhen pared to Scheme 2. It can be seen that our proposed scheme is superior in terms of PSNR than the other twoschemes for different host images. The PSNR of the watermarked image in the CRTbased scheme is about 60 dB, whereasin Schemes 1 and 2 it remains between 30 to 40 dB.In order to have a visual inspection, we magnified the Lenna image that was watermarked using the three schemes. Themagnified images along with the original image are shown in Fig. 6. One can notice by close visual inspection that theresemblance of images between the original (top left) and the watermarked with the proposed scheme (bottom right) ishigher than that with the other two schemes. This provides the evidence that least distortion occurs to the host image thatis watermarked with the CRTbased scheme.. Robustness against attacksIn this section, we pare the proposed scheme against Schemes 1 and 2 in their ability to withstand different typesof attacks. The watermarked image was subjected to different attacks, such as, addition of noise and tampering, beforeextracting the watermark. The quality of the extracted watermark is determined by their TAF value (10). A lower TAF valuewould indicate that the extracted watermark is more similar to the original watermark.Several image manipulation techniques were used to distort the watermarked images. These techniques are: (i) Croppingof a block size of 3232 at the upper left corner of the image, (ii) tampering 25% of the pixels with a strength factor of 25,(iii) adding noise to the entire watermarked image with a 20% distortion rate, (iv) JPEG pression with a value of ,and (v) brightening the watermarked image to 140%.Fig. 7 shows the TAF of the extracted wate。6611 be a set of r integers given by 181。Digital Signal Processing 20 (2020) 442–453Contents lists available at ScienceDirectDigital Signal ProcessingA novel CRTbased watermarking technique for authenticationof multimedia contentsJagdish C. Patraa,?,a, Cedric BornandbaSchool of Computer Engineering, Nanyang Technological University, Nanyang Avenue, SingaporebHEIGVD, University of Applied Sciences, YverdonlesBains, Switzerlandarticle info abstractArticle history:Available online 28 July 2020Keywords:Digital watermarkingChinese remainder theoremSingular value depositionDigital watermarking techniques have been proposed as a solution to the problem ofcopyright protection of multimedia data. In this paper, we propose a novel Chineseremainder theorem (CRT)based technique for digital watermarking. The use of CRTfor this purpose provides additional security along with resistance to some familiarattacks. We have shown that this technique is quite resilient to addition of the noise.We have pared performance of the proposed technique with recently reported twosingular value deposition (SVD)based watermarking techniques and shown its superiorperformance in terms of tampering assessment function (TAF), putational e?ciencyand peak signal t