Skip to main content
Log in

Wavelet tree based digital image watermarking by adopting the chaotic system for security enhancement

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Wavelet tree based watermarking algorithms are generally using the wavelet coefficient energy difference for copyright protection and ownership verification. Since there are cryptanalysis-based methods addressed for successfully attacking wavelet tree based watermarking algorithm of wavelet tree quantization (WTQ), it is the motivation in this research to devise a scheme to improve WTQ’s robustness. Furthermore, the combination of wavelet tree based watermarking techniques, chaotic system for block based scrambling techniques have not been seen or few discussed in the literatures. The study in this paper has presented such research findings and contribution for the academic and industry fields. Therefore, a chaotic system is adopted for WTQ to counteract the attacks in this paper. The digital image is first split into many blocks and the chaotic system is applied to scramble the image before the implementation of WTQ. The experimental results demonstrate the effectiveness of using chaotic system to enhance the security of WTQ, especially, to resist cryptanalysis attack. In addition, such mechanism also works for other advanced wavelet tree based algorithms like wavelet tree group modulation (WTGM) and dynamic energy enabled differentiation (called DEED) watermarking techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Battisti F, Carli M, Neri A, Egiazarian K (September 10–12 2007) Image watermarking in the Fibonacci-Haar transform domain. International Workshop on Nonlinear Signal and Image Proc., Bucharest, Romania, pp 15–19

  2. Cox IJ, Linnartz JP (1998) Some general methods for tampering with watermarks. IEEE J Sel Areas Commun 16(4):587–593

    Article  Google Scholar 

  3. Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1658

    Article  Google Scholar 

  4. Das TK, Maitra S (2004) Cryptanalysis of wavelet tree quantization watermarking scheme. IWDC 2004, LNCS 3326, pp 219–230

  5. Das TK, Maitra S, Mitra J (2005) Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme. IEEE Trans Signal Process 53(2):768–775

    Article  MathSciNet  Google Scholar 

  6. He Z (2007) Peak transform for efficient image representation and coding. IEEE Trans Image Proc 16(7):1741–1754

    Article  Google Scholar 

  7. Kalker T (Oct 3–5 2001) Considerations on watermarking security. Proceedings of the IEEE Workshop on Multimedia Signal Proc, pp 201–106

  8. Kerckhoffs A. La Cryptographie Militaire. Journal des Sciences Militaires, 9th series, pp. 5–38, Jan. 1883, pp.161–191, Feb, 1883

  9. Kok CW, Nguyen TQ (1998) Multirate filter banks and transform coding gain. IEEE Trans Signal Process 46(7):2041–2044

    Article  Google Scholar 

  10. Kundur D, Hatzinakos D (1998) Digital watermarking using multiresolution wavelet decomposition. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing 5:2869–2972

  11. Langelaar GC, Lagendijk RL (2001) Optimal differential energy watermarking of DCT encoded images and video. IEEE Trans Image Process 10(1):148–158

    Article  MATH  Google Scholar 

  12. Lu CS, Huang SK, Sze CJ, Liao HY (2000) Cocktail watermarking for digital image protection. IEEE Trans Multimedia 2(4):209–224

    Article  Google Scholar 

  13. Rao S, Pearlman WA (1996) Analysis of linear prediction, coding, and spectral estimation from subbands. IEEE Trans Inf Theory 42(4):1160–1178

    Article  MATH  Google Scholar 

  14. Saha S, Vemuri R (Nov. 1999) Adaptive wavelet filters in image coders—How important are they? Proc. IEEE/IECON’99, vol. 2, San Jose, CA, pp 559–564

  15. Saha S, Vemuri R (2000) An analysis on the effect of image features on lossy coding performance. IEEE Signal Proc Lett 7(5):104–107

    Article  Google Scholar 

  16. Said A, Pearlman WA (1996) A new, fast, and efficient image codec based on set partitioning in hierarchical trees. IEEE Trans Circuits Syst Video Technol 6:243–250

    Article  Google Scholar 

  17. StirMark, [Online]: http://www.petitcolas.net/fabien/software/StirMarkBenchmark_4_0_129.zip.

  18. Tsai MJ (accepted for publication in 2009) Dynamic Energy Enabled Differentiation (DEED) Image Watermarking Based on Human Visual System and Wavelet Tree Classification. Multimedia Tools and Applications

  19. Tsai MJ, Shen CH (2007) Wavelet Tree Group Modulation (WTGM) for digital image watermarking. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing 2:173–176

  20. Tsai MJ, Shen CH (2008) Differential energy based watermarking algorithm using Wavelet Tree Group Modulation (WTGM) and human visual system. IEICE E91-A(8):1961–1973

    Google Scholar 

  21. Tsai MJ, Yu KY, Chen YZ (2000) Joint wavelet and spatial transformation for digital watermarking. IEEE Trans Consum Electron 241–245

  22. USC SIPI - The USC-SIPI Image Database [Online]. Available: http://sipi.suc.edu/services/database/Database.html.

  23. Voyatzis G, Pitas I (Sep 16–19 1996) Applications of toral automorphisms in image watermarking. International Conference on Image Processing 1237–1240, Lausanne, Switzerland

  24. Wang SH, Lin YP (2004) Wavelet tree quantization for copyright protection watermarking. IEEE Trans Image Process 13(2):154–165

    Article  Google Scholar 

  25. Zou J, Ward RK, Qi D (2004) The generalized Fibonacci transformations and application to image scrambling. Acoust Speech Signal Process 3:385–388

    Google Scholar 

Download references

Acknowledgments

The author would like to thank the anonymous reviewers with their valuable comments to improve the quality of this manuscript. This work is partially supported by the National Science Council in Taiwan, Republic of China, under Grant NSC96-2416-H009-015, NSC97-2410-H009-034 and 99-2918-1-009-008.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Min-Jen Tsai.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Tsai, MJ. Wavelet tree based digital image watermarking by adopting the chaotic system for security enhancement. Multimed Tools Appl 52, 347–367 (2011). https://doi.org/10.1007/s11042-010-0475-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-010-0475-5

Keywords

Navigation