Skip to main content

Secure and Robust Watermarking Scheme in Frequency Domain Using Chaotic Logistic Map Encoding

  • Conference paper
  • First Online:
Advanced Computational Methods for Knowledge Engineering (ICCSAMA 2019)

Abstract

The paper proposes a secure and robust stereo image watermarking scheme based on chaotic logistic map encoding and frequency transformations. The chaotic logistic map encoding is employed to confuse both original stereo images and watermarked images. Since the high sensitivity to initial conditions introduced in the chaotic logistic map, a huge key space is provided for encoding images. Thus, the proposed system has a strong secure capability to resist brute-force and statistical attacks, in which the evaluation goes through various analysis methods such as sensitive key analysis, correlative adjacent pixels analysis. Moreover, to enhance the robustness of the watermarked image, the discrete cosine transform (DCT) and the singular value decomposition (SVD) are exploited for this purpose. Based upon the properties of the SVD and utilizing the advantages of the DCT, a watermarked image is embedded in the singular value. Performance evaluations show that the proposed watermarking scheme for stereo images is highly secure as well as strongly robust against different kinds of attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kadhim, I.J., Premaratne, P., Vial, P.J., Halloran, B.: Comprehensive survey of image steganography: techniques, Evaluations, and trends in future research. Neurocomputing 335, 299–326 (2019). https://doi.org/10.1016/j.neucom.2018.06.075

    Article  Google Scholar 

  2. Ali, M., Ahn, C.W., Pant, M.: A robust image watermarking technique using SVD and differential evolution in DCT domain. Optik 125, 428–434 (2014). https://doi.org/10.1016/j.ijleo.2013.06.082

    Article  Google Scholar 

  3. Yadav, G.S., Ojha, A.: Chaotic system-based secure data hiding scheme with high embedding capacity. Comput. Electr. Eng. 69, 447–460 (2018). https://doi.org/10.1016/j.compeleceng.2018.02.022

    Article  Google Scholar 

  4. Safi, H.W., Maghari, A.Y.: Image encryption using double chaotic logistic map. In: 2017 International Conference on Promising Electronic Technologies (ICPET), pp. 66–70 (2017). https://doi.org/10.1109/ICPET.2017.18

  5. Abraham, J., Paul, V.: An imperceptible spatial domain color image watermarking scheme. J. King Saud Univ. Comput. Inf. Sci. 31, 125–133 (2019). https://doi.org/10.1016/j.jksuci.2016.12.004

    Article  Google Scholar 

  6. Mathur, S., Dhingra, A., Prabukumar, M., Agilandeeswari, L., Muralibabu, K.: An efficient spatial domain based image watermarking using shell based pixel selection. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2696–2702 (2016). https://doi.org/10.1109/ICACCI.2016.7732468

  7. Parekh, M., Bidani, S., Santhi, V.: Spatial Domain Blind Watermarking for Digital Images. In: Pattnaik, P.K., Rautaray, S.S., Das, H., and Nayak, J. (eds.) Progress in Computing, Analytics and Networking. pp. 519–527. Springer Singapore (2018)

    Google Scholar 

  8. Lu, W., Lu, H., Chung, F.-L.: Feature based robust watermarking using image normalization. Comput. Electr. Eng. 36, 2–18 (2010). https://doi.org/10.1016/j.compeleceng.2009.04.002

    Article  MATH  Google Scholar 

  9. Selvam, P., Balachandran, S., Pitchai Iyer, S., Jayabal, R.: Hybrid transform based reversible watermarking technique for medical images in telemedicine applications. Optik 145, 655–671 (2017). https://doi.org/10.1016/j.ijleo.2017.07.060

    Article  Google Scholar 

  10. AL-Nabhani, Y., Jalab, H.A., Wahid, A., Noor, R.M.: Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network. J. King Saud Univ. Comput. Inf. Sci. 27, 393–401 (2015). https://doi.org/10.1016/j.jksuci.2015.02.002

    Article  Google Scholar 

  11. Kang, X., Zhao, F., Lin, G., Chen, Y.: A novel hybrid of DCT and SVD in DWT domain for robust and invisible blind image watermarking with optimal embedding strength. Multimed Tools Appl. 77, 13197–13224 (2018). https://doi.org/10.1007/s11042-017-4941-1

    Article  Google Scholar 

  12. Shehab, A., Elhoseny, M., Muhammad, K., Sangaiah, A.K., Yang, P., Huang, H., Hou, G.: Secure and robust fragile watermarking scheme for medical images. IEEE Access. 6, 10269–10278 (2018). https://doi.org/10.1109/ACCESS.2018.2799240

    Article  Google Scholar 

  13. Vo, P.-H., Nguyen, T.-S., Huynh, V.-T., Do, T.-N.: A novel reversible data hiding scheme with two-dimensional histogram shifting mechanism. Multimedia Tools Appl. 77, 28777–28797 (2018). https://doi.org/10.1007/s11042-018-5991-8

    Article  Google Scholar 

  14. Troccoli, A., Kang, S.B., Seitz, S.: Multi-view multi-exposure stereo. In: Third International Symposium on 3D Data Processing, Visualization, and Transmission (3DPVT 2006), pp. 861–868 (2006). https://doi.org/10.1109/3DPVT.2006.98

  15. Orozco, R.R., Loscos, C., Martin, I., Artusi, A.: Chapter 4 - multiview HDR video sequence generation. In: Dufaux, F., Le Callet, P., Mantiuk, R.K., Mrak, M. (eds.) High Dynamic Range Video, pp. 121–138. Academic Press (2016). https://doi.org/10.1016/B978-0-08-100412-8.00004-8

    Google Scholar 

  16. Zhou, W., Jiang, G., Luo, T., Yu, M., Shao, F., Peng, Z.: Stereoscopic image tamper detection and self-recovery using hierarchical detection and stereoscopic matching. JEI 23, 023022 (2014). https://doi.org/10.1117/1.JEI.23.2.023022

    Article  Google Scholar 

  17. Scharstein, D.: View Synthesis Using Stereo Vision (1997)

    Google Scholar 

  18. Zhou, W., Yu, L., Wang, Z., Wu, M., Luo, T., Sun, L.: Binocular visual characteristics based fragile watermarking scheme for tamper detection in stereoscopic images. AEU – Int. J. Electron. Commun. 70, 77–84 (2016). https://doi.org/10.1016/j.aeue.2015.10.006

    Article  Google Scholar 

  19. Rawat, S., Gupta, G., Balasubramanian, R., Rawat, M.S.: Digital watermarking based stereo image coding. In: Ranka, S., Banerjee, A., Biswas, K.K., Dua, S., Mishra, P., Moona, R., Poon, S.-H., Wang, C.-L. (eds.) Contemporary Computing, pp. 435–445. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  20. Vo, P., Nguyen, T., Huynh, V., Do, T.: A robust hybrid watermarking scheme based on DCT and SVD for copyright protection of stereo images. In: 2017 4th NAFOSTED Conference on Information and Computer Science, pp. 331–335 (2017). https://doi.org/10.1109/NAFOSTED.2017.8108087

  21. Younus, Z.S., Hussain, M.K.: Image steganography using exploiting modification direction for compressed encrypted data. J. King Saud Univ. Comput. Inf. Sci. (2019). https://doi.org/10.1016/j.jksuci.2019.04.008

  22. Ghanbari, M.: Standard Codecs: Image Compression to Advanced Video Coding. Institution Electrical Engineers (2003)

    Google Scholar 

  23. Yang, W.-C., Chen, L.-H.: Reversible DCT-based data hiding in stereo images. Multimed Tools Appl. 74, 7181–7193 (2015). https://doi.org/10.1007/s11042-014-1958-6

    Article  Google Scholar 

  24. Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcation Chaos. 16, 2129–2151 (2006). https://doi.org/10.1142/S0218127406015970

    Article  MathSciNet  MATH  Google Scholar 

  25. Song, C.-Y., Qiao, Y.-L., Zhang, X.-Z.: An image encryption scheme based on new spatiotemporal chaos. Optik – Int. J. Light Electron Optics. 124, 3329–3334 (2013). https://doi.org/10.1016/j.ijleo.2012.11.002

    Article  Google Scholar 

  26. http://vision.middlebury.edu/stereo/data/. Accessed 30 Aug 2019

  27. Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13, 600–612 (2004). https://doi.org/10.1109/TIP.2003.819861

    Article  Google Scholar 

Download references

Acknowledgements

The research is funded by Tra Vinh University, Viet Nam.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Phuoc-Hung Vo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Vo, PH., Nguyen, TS., Huynh, VT., Vo, TC., Do, TN. (2020). Secure and Robust Watermarking Scheme in Frequency Domain Using Chaotic Logistic Map Encoding. In: Le Thi, H., Le, H., Pham Dinh, T., Nguyen, N. (eds) Advanced Computational Methods for Knowledge Engineering. ICCSAMA 2019. Advances in Intelligent Systems and Computing, vol 1121. Springer, Cham. https://doi.org/10.1007/978-3-030-38364-0_31

Download citation

Publish with us

Policies and ethics