[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

A blind chaos-based watermarking technique

Published: 01 April 2014 Publication History

Abstract

This paper presents a robust blind frequency domain watermarking scheme based on chaotic maps. The proposed scheme embeds a black and white watermark logo in the midband components of a host image according to a discrete wavelet transform. Each watermark bit is embedded into a small submatrix of selected second level subbands of an image resulting from iterated applications of a two-dimensional discrete wavelet transform. This scheme embeds two copies of the watermark using two different methods, in two different subbands of the image. At the cost of embedding capacity, this results in improving the security and robustness of the watermarking scheme. Experimental results demonstrate that the suggested scheme provides imperceptibility and robustness against image processing attacks such as JPEG compression, low-pass filtering, median filtering, Gaussian noise, scaling, rotating, cropping, histogram equalization, and gamma correction. Experimental results also show superior robustness of the suggested scheme over existing algorithms with a similar approach. Copyright © 2013 John Wiley & Sons, Ltd.

References

[1]
Chen T, Horng G, Lee W. A publicly verifiable copyright-proving scheme resistant to malicious attacks. IEEE Transactions on Industrial Electronics 2005; Volume 52 Issue 1: pp.327-334.
[2]
Lin W, Wang Y, Horng S, Kao T, Pan Y. A blind watermarking method using maximum wavelet coefficient quantization. Expert Systems with Applications 2009; Volume 36: pp.11509-11516.
[3]
Behnia S, Teshnehlab M, Ayubi P. Multiple-watermarking scheme based on improved chaotic maps. Communications in Nonlinear Science and Numerical Simulation 2010; Volume 15 Issue 9: pp.2469-2478.
[4]
Maity S, Kundu M. Robust and blind spatial watermarking in digital image, Proceedings of the 3rd Indian Conference on Computer Vision, Graphics and Image Processing ICVGIP 2002, Ahmedabad, India, 16-18th December, 2002; pp. pp.388-393.
[5]
Nikolaidis N, Pitas I. Robust image watermarking in spatial domain. Signal Processing 1998; Volume 66 Issue 3: pp.385-403.
[6]
Martin V, Chabert M, Lacaze B. An interpolation-based watermarking scheme. Signal Processing 2008; Volume 88 Issue 3: pp.539-557.
[7]
Bhatnagar G, Raman B. A new robust reference watermarking scheme based on DWT-SVD. Computer Standards & Interfaces 2009; Volume 31 Issue 5: pp.1002-1013.
[8]
Chang C, Lin C, Tseng C, Tai W. Reversible hiding in DCT-based compressed images. Information Sciences 2007; Volume 177: pp.2768-2786.
[9]
Barni M, Bartolini F, Piva A. Improved wavelet based watermarking through pixel-wise masking. IEEE Transactions on Image Processing 2001; Volume 10: pp.783-791.
[10]
Dawei Z, Guanrong C, Wenbo L. A chaos based robust wavelet domain watermarking algorithm. Chaos, Solitons, and Fractals 2004; Volume 22: pp.47-54.
[11]
Poljicak A, Mandic L, Agic D. Discrete Fourier transform-based watermarking method with an optimal implementation radius. Journal of Electronic Imaging 2011; Volume 20 Issue 3: pp.0330081-8. 10.1117/1.3609010.
[12]
Rahmani H, Mortezaei R, Moghaddam M. A new robust watermarking scheme to increase image security. EURASIP Journal on Advances in Signal Processing 2010; Volume 2010 Issue 2010 Article ID 428183, 10.1155/2010/428183.
[13]
Al-Haj A. Combined DWT-DCT digital image watermarking. Journal of Computer Science 2007 Volume 3 Issue 9: pp.740-746.
[14]
Amirgholipour S, Naghsh-Nilchi A. Robust digital image watermarking based on joint DWT-DCT. International Journal of Digital Content Technology and its Applications 2009; Volume 3 Issue 2: pp.42-54.
[15]
Gupta S, Jain S. A robust algorithm of digital image watermarking based on discrete wavelet transform. Special Issue of IJCCT 1, International Conference on Advances in Computer, Communication Technology & Applications ACCTA 2010, 2010; pp. pp.222-227.
[16]
Prasad V, Kurupati R. Secure image watermarking in frequency domain using Arnold scrambling and filtering. Advances in Computational Sciences and Technology 2010; Volume 3 Issue 2: pp.236-244.
[17]
Baptista M. Cryptography with chaos. Physics Letters A 1998; Volume 240: pp.50-54.
[18]
Cheddad A. Steganoflage: a new image steganography algorithm. Ph.D. Thesis, 2009.
[19]
Chen G, Mao Y, Chui C. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals 2004; Volume 21: pp.749-761.
[20]
Guan Z, Huang F, Guan W. Chaos-based image encryption algorithm. Physics Letters A 2005; Volume 346: pp.153-157.
[21]
Habutsu T, Nishio Y, Sasase I, Mori S. A secret key cryptosystem by iterating a chaotic map. In Advances in Cryptology: Proceedings of EUROCRYPT 91, LNCS 547. Springer-Verlag: Berlin, 1991; pp.127-140.
[22]
Jakimoski G, Kocarev L. Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Transactions on Circuits and Systems-I: Fundamental Theory and Applications 2001; Volume 48 Issue 2: pp.163-169.
[23]
Kanso A, Smaoui N. Irregularly decimated chaotic maps for binary digits generations. International Journal of Bifurcations and Chaos s2009; Volume 19 Issue 4: pp.1169-1183.
[24]
Kanso A, Smaoui N. Logistic chaotic maps for binary numbers generations. Chaos, Solitons & Fractals 2009; Volume 40 Issue 5: pp.2557-2568.
[25]
Kanso A, Yahyaoui H, Almulla M. Keyed hash function based on a chaotic map. Information Sciences 2012; Volume 186 Issue 1: pp.249-264.
[26]
Kotulski Z, Szczepanski J. Discrete chaotic cryptography. Annalen der Physik 1997; Volume 509 Issue 5: pp.381-394.
[27]
Mao Y, Chen G, Lian S. A novel fast image encryption scheme based on 3D chaotic Baker maps. International Journal of Bifurcation and Chaos 2004; Volume 14 Issue 10: pp.3613-3624.
[28]
Satish K, Jayakar T, Tobin C, Madhavi K, Murali K. Chaos based spread spectrum image steganography. IEEE Transactions on Consumer Electronics 2004; Volume 50: pp.587-590.
[29]
Smaoui N, Kanso A. Cryptography with chaos and shadowing. Chaos, Solitons & Fractals 2009; Volume 42 Issue 4: pp.2312-2321.
[30]
Zhao D, Chen G, Liu W. A chaos-based robust wavelet-domain watermarking algorithm. Chaos, Solitons & Fractals 2004; Volume 22 Issue 10: pp.47-54.
[31]
Zhu Z, Zhang W, Wong K, Yu H. A chaos-based symmetric image encryption scheme using a bit-level permutation. Information Sciences 2011; Volume 181 Issue 6: pp.1171-1186.
[32]
May R. Simple mathematical models with very complicated dynamics. Nature 1976; Volume 261 Issue 5560: pp.459-467.
[33]
Arnold V, Avez A. Ergodic Problems in Classical Mechanics. Benjamin: New York, 1968.
[34]
Chen G, Dong X. From Chaos to Order: Methodologies, Perspectives and Applications. World Scientific: Singapore, 1998.
[35]
Wang Z, Bovik A, Sheikh H, Simoncelli E. Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing 2004; Volume 13 Issue 4: pp.600-612.
[36]
Available from: "http://en.wikipedia.org/wiki/File:Lenna.png", January 2012.
[37]
Available from: "http://en.wikipedia.org/wiki/File:Male_Lion_on_Rock.jpg", January 2012.
[38]
Available from: "http://en.wikipedia.org/wiki/File:Culinary_fruits_front_view.jpg", January 2012.
[39]
Available from: "http://cvml.unige.ch/Research"Projects/Watermarking/Checkmark, January 2012.

Cited By

View all
  • (2022)Dynamic S-Box and PWLCM-Based Robust Watermarking SchemeWireless Personal Communications: An International Journal10.1007/s11277-022-09562-9125:1(513-530)Online publication date: 1-Jul-2022
  • (2021)Visual attention model based dual watermarking for simultaneous image copyright protection and authenticationMultimedia Tools and Applications10.1007/s11042-020-09918-y80:5(6755-6783)Online publication date: 1-Feb-2021
  • (2020)Efficient Image Encryption Scheme Based on 4-Dimensional Chaotic MapsInformatica10.15388/20-INFOR42631:4(793-820)Online publication date: 1-Jan-2020
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Security and Communication Networks
Security and Communication Networks  Volume 7, Issue 4
April 2014
127 pages
ISSN:1939-0114
EISSN:1939-0122
Issue’s Table of Contents

Publisher

John Wiley & Sons, Inc.

United States

Publication History

Published: 01 April 2014

Author Tags

  1. blind watermarking
  2. chaotic map
  3. discrete cosine transform
  4. discrete wavelet transform
  5. watermarking

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 18 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Dynamic S-Box and PWLCM-Based Robust Watermarking SchemeWireless Personal Communications: An International Journal10.1007/s11277-022-09562-9125:1(513-530)Online publication date: 1-Jul-2022
  • (2021)Visual attention model based dual watermarking for simultaneous image copyright protection and authenticationMultimedia Tools and Applications10.1007/s11042-020-09918-y80:5(6755-6783)Online publication date: 1-Feb-2021
  • (2020)Efficient Image Encryption Scheme Based on 4-Dimensional Chaotic MapsInformatica10.15388/20-INFOR42631:4(793-820)Online publication date: 1-Jan-2020
  • (2018)A recent survey on image watermarking techniques and its application in e-governanceMultimedia Tools and Applications10.1007/s11042-017-5222-877:3(3597-3622)Online publication date: 1-Feb-2018
  • (2018)Attack resistant watermarking technique based on fast curvelet transform and Robust Principal Component AnalysisMultimedia Tools and Applications10.1007/s11042-017-5128-577:8(9443-9453)Online publication date: 1-Apr-2018
  • (2016)Host cancelation-based spread spectrum watermarking for audio anti-piracy over InternetSecurity and Communication Networks10.1002/sec.16739:17(4691-4702)Online publication date: 25-Nov-2016
  • (2015)An authentication strategy based on spatiotemporal chaos for software copyright protectionSecurity and Communication Networks10.1002/sec.13248:18(4073-4086)Online publication date: 1-Dec-2015

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media