Abstract
In this paper, a simple and efficient watermarking method is proposed by using visual cryptography, singular value decomposition and chaotic maps. The proposed scheme uses a gray-level image as watermark instead of binary logo or bit sequence. The proposed scheme is a zero-watermarking scheme, where the watermark is not embedded directly in the host image. The host image is encrypted with secret watermark image by constructing two shares- master share and ownership share. The two shares separately do not give any information about the watermark but when stacked together, the watermark is revealed. Singular value decomposition has been used to select the robust features of the host image and chaotic maps have been used to improve the security. Experimental study is conducted to evaluate the robustness of the algorithm against various signal processing and geometrical attacks.
Similar content being viewed by others
References
Arnold VI, Avez A (1968) Ergodic problems in classical mechanics. Benjamin, New York
Bao J, Yang Q (2012) Period of the discrete arnold cat map and general cat map. Nonlinear Dynamics, Springer Science+Business Media 70(2):1365–1375. doi:10.1007/s11071-012-0539-3
Bao P, Ma X (2005) Image adaptive watermarking using wavelet domain singular value decomposition. IEEE Trans Circuits Syst Video Technol 15(1):96–102
Chang C, Chung J (2002) An image intellectual property protection scheme for gray level images using visual secrets sharing strategy. Pattern Recogn Lett 23:931–941
Chen T-H, Chang C-C, Wu C-S, Lou D-C (2009) On the security of a copyright protection scheme based on visual cryptography. Computer Standards & Interfaces 31:1–5
Dyson FJ, Falk H (1992) Period of a discrete cat mapping, The American Mathematical Monthly. Mathematical Association of America 99(7):605–614. http://www.jstor.org/stable/232498
Guitart O, Kim HC, Delp EJ (2006) Watermark evaluation testbed. J Electron Imaging 14(4)
Hardy GH, Wright EM (1980) An introduction to the theory of numbers, 5th Edition. Oxford University Press, Oxford
Horn RA, Johnson CR (1985) Matrix analysis. Cambridge University Press ISBN 0-521-38632-2
Hou Y-C, Huang P-H (2011) Image protection based on visual cryptography and statistical property. In: IEEE statistical signal processing workshop (SSP), pp 481–484
Hsu C, Hou Y (2005) Copyright protection scheme for digital images using visual cryptography and sampling methods. Opt Eng 44(7):077003
Kutter M, Petitcolas FAP (1999) A fair benchmark for image watermarking systems. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents, vol 3657, pp 226–239
Lin Y-K (2014) A data hiding scheme based upon dct coefficient modification. Computer Standards & Interfaces 36:855–862
Liu J-L, Lou D-C, Chang M-C, Tso H-K (2006) A robust watermarking scheme using self-reference image. Computer Standards and Interfaces 28:356–367
Lou D, Tso H, Liu J (2007) A copyright protection scheme for digital images using visual cryptography technique. Computer Standards & Interfaces 29:125–131
Makbol NM, EeKhoo B (2014) A new robust and secure digital image watermarking scheme based on the integer wavelet transform and singular value decomposition. Digital Signal Process 33:134–147
Naor M, Shamir A (1995) Visual cryptography. In: Proceedings of the Advances in Cryptology, Lecture Notes in Computer Science, vol 950, EUROCRYPT94, LNCS, Springer-Verlag, pp 1–12
Rani A, Balasubramanian R (2014) An image copyright protection scheme by encrypting secret data with the host image. Multimed Tools Appl. doi:10.1007/s11042-014-2344-0
Rani A, Balasubramanian R, Kumar S (2011) A fragile watermarking scheme exploiting neural tree for image tamper detection. In: International conference on soft computing for problem solving (SocProS) proceedings, pp 547–554
Rani A, Balasubrmanian R, Kumar S (2013) A robust watermarking scheme exploiting balanced neural tree for rightful ownership protection. Multimed Tools Appl. doi:10.1007/s11042-013-1528-3
Rawat S, Balasubramanian R (2012) A blind watermarking algorithm based on fractional fourier transform and visual cryptography. Signal Process 92(6):1480–1491
Shieh J-M, Lou D-C, Chang M-C (2006) A semi-blind digital watermarking scheme based on singular value decomposition. Computer Standards and Interfaces 28:428–440
Su P-C, Chang Y-C, Wu C-Y (2013) Geometrically resilient digital image watermarking by using interest point extraction and extended pilot signals. IEEE Trans Inf Forensics Secur 8(12):1897–1908
Tirkel A, Rankin G, Van Schyndel R, Ho W, Mee N, Osborne C (1993) Electronic water mark. DICTA 93, Macquarie University (93), 666–673
Voloshynovski S, Pereiera S, Pun T, Eggers J, Su J (2001) Attacks on digital watermarks: classification, estimation-based attacks and benchmarks. In: IEEE Communications Magazine, vol 39, pp 118–126
Wang M, Chen W (2009) A hybrid dwt-svd copyright protection scheme based on k-means clustering and visual cryptography. Computer Standards & Interfaces 31:757–762
Wua X, Sunb W (2013) Robust copyright protection scheme for digital images using overlapping dct and svd. Appl Soft Comput 13:1170–1182
Yu L, Niu X, Sun S (2005) Print-and-scan model and the watermarking countermeasure. Image Vis Comput 23:807–814
Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inf Forensics Secur 7(2):826–832
Zhao D, Chen G, Liu W (2004) A chaos-based robust wavelet-domain watermarking algorithm. Chaos, Solitons Fractals 22:47–54
Acknowledgments
This research work is supported by Council of Scientific and Industrial Research (CSIR), New Delhi under the grant number CSR-557-MTD.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Rani, A., Raman, B. An image copyright protection system using chaotic maps. Multimed Tools Appl 76, 3121–3138 (2017). https://doi.org/10.1007/s11042-016-3287-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-3287-4