Skip to main content

A Robust Watermarking Scheme with High Security and Low Computational Complexity

  • Conference paper
  • First Online:
Security and Privacy in Communication Networks (SecureComm 2020)

Abstract

Implementing a watermarking algorithm with high security and low computational complexity is a challenge, especially at a limited distortion level. A novel watermarking scheme is proposed in this paper, which is based on Tent-Logistic-Cosine Map (TLCM) and Direct Current (DC) coefficient modification. Firstly, the watermark is encrypted by a matrix obtained from TLCM. Then, the cover image is divided into non-overlapping \(4 \times 4\) sub-blocks and some blocks are selected randomly. Thereafter, the DC coefficients of selected blocks are calculated directly in the spatial domain without performing two-dimensional discrete cosine transform. Finally, using the proposed watermark embedding procedure, DC coefficients of selected blocks are updated according to the encrypted watermark bits. Results show that the proposed watermarking algorithm has high security and low computational complexity at a limited distortion.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Su, Q., Niu, Y., Wang, Q., Sheng, G.: A blind color image watermarking based on DC component in thespatial domain. Optik 124(23), 6255–6260 (2013)

    Article  Google Scholar 

  2. Parah, S.A., Loan, N.A., Shah, A.A., Sheikh, J.A., Bhat, G.M.: A new secure and robust watermarking technique based on logistic map and modification of DC coefficient. Nonlinear Dyn. 93(4), 1933–1951 (2018). https://doi.org/10.1007/s11071-018-4299-6

    Article  Google Scholar 

  3. Kang, X., Zhao, F., Lin, G., Chen, Y.: A novel hybrid of DCT and SVD in DWT domain for robust and invisible blind image watermarking with optimal embedding strength. Multimedia Tools Appl. 77(11), 13197–13224 (2017). https://doi.org/10.1007/s11042-017-4941-1

    Article  Google Scholar 

  4. Ko, H.J., Huang, C.T., Horng, G., WANG, S.J.: Robust and blind image watermarking in DCT domain using inter-block coefficient correlation. Inf. Sci. 517(1), 128–147 (2020)

    Google Scholar 

  5. Ali, M., Ahn, C.W.: An optimized watermarking technique based on self-adaptive DE in DWT-SVD transform domain. Signal Process. 94(1), 545–556 (2014)

    Article  Google Scholar 

  6. Rajani, D., Kumar, P.R.: An optimized blind watermarking scheme based on principal component analysis in redundant discrete wavelet domain. Signal Process. 172(1), 1–15 (2020)

    Google Scholar 

  7. Luo, Y., Lin, J., Liu, J., Wei, D., Cao, L., Zhou, R.: A robust image encryption algorithm based on chua’s circuit and compressive sensing. Signal Process. 161(1), 227–247 (2019)

    Article  Google Scholar 

  8. Luo, Y., Cao, L., Qiu, S., Lin, H., Harkin, J., Liu, J.: A chaotic map-control-based and the plain image-related cryptosystem. Nonlinear Dyn. 83(4), 2293–2310 (2015). https://doi.org/10.1007/s11071-015-2481-7

    Article  MathSciNet  MATH  Google Scholar 

  9. Luo, Y., Tang, S., Liu, J., Cao, L., Qiu, S.: Image encryption scheme by combining the hyper-chaotic system with quantum coding. Optics Lasers Eng. 124(1), 1–13 (2020)

    Google Scholar 

  10. Luo, Y., Ouyang, X., Liu, J., Cao, L.: An image encryption method based on elliptic curve elgamal encryption and chaotic systems. IEEE Access 7(1), 38507–38522 (2019)

    Article  Google Scholar 

  11. Makbol, N.M., Khoo, B.E., Rassem, T.H., Loukhaoukha, K.: A new reliable optimized image watermarking scheme based on the integer wavelet transform and singular value decomposition for copyright protection. Inf. Sci. 417(1), 381–400 (2017)

    Article  Google Scholar 

  12. Zhang, L., Wei, D.: Image watermarking based on matrix decomposition and gyrator transform in invariant integer wavelet domain. Signal Process. 169(1), 1–18 (2020)

    Google Scholar 

  13. Chan, C.K., Cheng, L.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004)

    Article  MATH  Google Scholar 

  14. Liu, J., Huang, J., Luo, Y., Cao, L., Yang, S.: An optimized image watermarking method based on HD and SVD in DWT domain. IEEE Access 7(1), 80849–80860 (2019)

    Article  Google Scholar 

  15. Hsu, L.Y., Hu, H.T.: Robust blind image watermarking using crisscross inter-block prediction in the DCT domain. J. Visual Commun. Image Representation 46(1), 33–47 (2017)

    Article  Google Scholar 

  16. Parah, S.A., Sheikh, J.A., Loan, N.A., Bhat, G.M.: Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digital Signal Process. A Rev. J. 53(1), 11–24 (2016)

    Article  Google Scholar 

  17. Das, C., Panigrahi, S., Sharma, V.K., Mahapatra, K.K.: A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. AEU - Int. J. Electron. Commun. 68(3), 244–253 (2014)

    Article  Google Scholar 

  18. Byun, S.W., Son, H.S., Lee, S.P.: Fast and robust watermarking method based on DCT specific location. IEEE Access 7(1), 100,706–100,718 (2019)

    Google Scholar 

  19. Cayre, F., Fontaine, C., Furon, T.: Watermarking security: theory and practice. IEEE Trans. Signal Process. 53(10), 3976–3987 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  20. Wang, Y.G., Zhu, G., Kwong, S., Shi, Y.Q.: A study on the security levels of spread-spectrum embedding schemes in the WOA framework. IEEE Trans. Cybern. 48(8), 2307–2320 (2018)

    Article  Google Scholar 

  21. Liu, N., Li, H., Dai, H., Guo, D., Chen, D.: Robust blind image watermarking based on chaotic mixtures. Nonlinear Dyn. 80(3), 1329–1355 (2015). https://doi.org/10.1007/s11071-015-1946-z

    Article  Google Scholar 

  22. Habib, S.M., Ries, S., Max, M.: A blind chaos-based watermarking technique. Secur. Commun. Netw. 7(4), 800–811 (2014)

    Article  Google Scholar 

  23. Chen, L., Chen, J., Zhao, G., Wang, S.: Cryptanalysis and improvement of a chaos-based watermarking scheme. IEEE Access 7(1), 97549–97565 (2019)

    Article  Google Scholar 

  24. Hua, Z., Zhou, Y., Huang, H.: Cosine-transform-based chaotic system for image encryption. Inf. Sci. 480(1), 403–419 (2019)

    Article  Google Scholar 

  25. Murillo-Escobar, M.A., Cruz-Hernández, C., Cardoza-Avendaño, L., Méndez-Ramírez, R.: A novel pseudorandom number generator based on pseudorandomly enhanced logistic map. Nonlinear Dyn. 87(1), 407–425 (2016). https://doi.org/10.1007/s11071-016-3051-3

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

This research is supported by the National Natural Science Foundation of China under Grants 61801131 and 61661008, the Guangxi Natural Science Foundation under Grants 2017GXNSFAA198180, the funding of Overseas 100 Talents Program of Guangxi Higher Education, 2018 Guangxi One Thousand Young and Middle-Aged College and University Backbone Teachers Cultivation Program, Research Fund of Guangxi Key Lab of Multi-source Information Mining & Security (19-A-03-02), Research Fund of Guangxi Key Laboratory of Wireless Wideband Communication and Signal Processing, and the Young and Middle-aged Teachers’ Research Ability Improvement Project in Guangxi Universities under Grant 2020KY02030.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuling Luo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, L., Luo, Y., Liu, J., Qiu, S., Li, L. (2020). A Robust Watermarking Scheme with High Security and Low Computational Complexity. In: Park, N., Sun, K., Foresti, S., Butler, K., Saxena, N. (eds) Security and Privacy in Communication Networks. SecureComm 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 336. Springer, Cham. https://doi.org/10.1007/978-3-030-63095-9_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-63095-9_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-63094-2

  • Online ISBN: 978-3-030-63095-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics