Skip to main content
Log in

An image copyright protection system using chaotic maps

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a simple and efficient watermarking method is proposed by using visual cryptography, singular value decomposition and chaotic maps. The proposed scheme uses a gray-level image as watermark instead of binary logo or bit sequence. The proposed scheme is a zero-watermarking scheme, where the watermark is not embedded directly in the host image. The host image is encrypted with secret watermark image by constructing two shares- master share and ownership share. The two shares separately do not give any information about the watermark but when stacked together, the watermark is revealed. Singular value decomposition has been used to select the robust features of the host image and chaotic maps have been used to improve the security. Experimental study is conducted to evaluate the robustness of the algorithm against various signal processing and geometrical attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Arnold VI, Avez A (1968) Ergodic problems in classical mechanics. Benjamin, New York

    MATH  Google Scholar 

  2. Bao J, Yang Q (2012) Period of the discrete arnold cat map and general cat map. Nonlinear Dynamics, Springer Science+Business Media 70(2):1365–1375. doi:10.1007/s11071-012-0539-3

    Article  MathSciNet  MATH  Google Scholar 

  3. Bao P, Ma X (2005) Image adaptive watermarking using wavelet domain singular value decomposition. IEEE Trans Circuits Syst Video Technol 15(1):96–102

    Article  Google Scholar 

  4. Chang C, Chung J (2002) An image intellectual property protection scheme for gray level images using visual secrets sharing strategy. Pattern Recogn Lett 23:931–941

    Article  MATH  Google Scholar 

  5. Chen T-H, Chang C-C, Wu C-S, Lou D-C (2009) On the security of a copyright protection scheme based on visual cryptography. Computer Standards & Interfaces 31:1–5

    Article  Google Scholar 

  6. Dyson FJ, Falk H (1992) Period of a discrete cat mapping, The American Mathematical Monthly. Mathematical Association of America 99(7):605–614. http://www.jstor.org/stable/232498

    Google Scholar 

  7. Guitart O, Kim HC, Delp EJ (2006) Watermark evaluation testbed. J Electron Imaging 14(4)

  8. Hardy GH, Wright EM (1980) An introduction to the theory of numbers, 5th Edition. Oxford University Press, Oxford

    MATH  Google Scholar 

  9. Horn RA, Johnson CR (1985) Matrix analysis. Cambridge University Press ISBN 0-521-38632-2

  10. Hou Y-C, Huang P-H (2011) Image protection based on visual cryptography and statistical property. In: IEEE statistical signal processing workshop (SSP), pp 481–484

  11. Hsu C, Hou Y (2005) Copyright protection scheme for digital images using visual cryptography and sampling methods. Opt Eng 44(7):077003

    Article  Google Scholar 

  12. Kutter M, Petitcolas FAP (1999) A fair benchmark for image watermarking systems. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents, vol 3657, pp 226–239

  13. Lin Y-K (2014) A data hiding scheme based upon dct coefficient modification. Computer Standards & Interfaces 36:855–862

    Article  Google Scholar 

  14. Liu J-L, Lou D-C, Chang M-C, Tso H-K (2006) A robust watermarking scheme using self-reference image. Computer Standards and Interfaces 28:356–367

    Article  Google Scholar 

  15. Lou D, Tso H, Liu J (2007) A copyright protection scheme for digital images using visual cryptography technique. Computer Standards & Interfaces 29:125–131

    Article  Google Scholar 

  16. Makbol NM, EeKhoo B (2014) A new robust and secure digital image watermarking scheme based on the integer wavelet transform and singular value decomposition. Digital Signal Process 33:134–147

    Article  Google Scholar 

  17. Naor M, Shamir A (1995) Visual cryptography. In: Proceedings of the Advances in Cryptology, Lecture Notes in Computer Science, vol 950, EUROCRYPT94, LNCS, Springer-Verlag, pp 1–12

  18. Rani A, Balasubramanian R (2014) An image copyright protection scheme by encrypting secret data with the host image. Multimed Tools Appl. doi:10.1007/s11042-014-2344-0

  19. Rani A, Balasubramanian R, Kumar S (2011) A fragile watermarking scheme exploiting neural tree for image tamper detection. In: International conference on soft computing for problem solving (SocProS) proceedings, pp 547–554

  20. Rani A, Balasubrmanian R, Kumar S (2013) A robust watermarking scheme exploiting balanced neural tree for rightful ownership protection. Multimed Tools Appl. doi:10.1007/s11042-013-1528-3

  21. Rawat S, Balasubramanian R (2012) A blind watermarking algorithm based on fractional fourier transform and visual cryptography. Signal Process 92(6):1480–1491

    Article  Google Scholar 

  22. Shieh J-M, Lou D-C, Chang M-C (2006) A semi-blind digital watermarking scheme based on singular value decomposition. Computer Standards and Interfaces 28:428–440

    Article  Google Scholar 

  23. Su P-C, Chang Y-C, Wu C-Y (2013) Geometrically resilient digital image watermarking by using interest point extraction and extended pilot signals. IEEE Trans Inf Forensics Secur 8(12):1897–1908

    Article  Google Scholar 

  24. Tirkel A, Rankin G, Van Schyndel R, Ho W, Mee N, Osborne C (1993) Electronic water mark. DICTA 93, Macquarie University (93), 666–673

  25. Voloshynovski S, Pereiera S, Pun T, Eggers J, Su J (2001) Attacks on digital watermarks: classification, estimation-based attacks and benchmarks. In: IEEE Communications Magazine, vol 39, pp 118–126

  26. Wang M, Chen W (2009) A hybrid dwt-svd copyright protection scheme based on k-means clustering and visual cryptography. Computer Standards & Interfaces 31:757–762

    Article  Google Scholar 

  27. Wua X, Sunb W (2013) Robust copyright protection scheme for digital images using overlapping dct and svd. Appl Soft Comput 13:1170–1182

    Article  Google Scholar 

  28. Yu L, Niu X, Sun S (2005) Print-and-scan model and the watermarking countermeasure. Image Vis Comput 23:807–814

    Article  Google Scholar 

  29. Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inf Forensics Secur 7(2):826–832

    Article  Google Scholar 

  30. Zhao D, Chen G, Liu W (2004) A chaos-based robust wavelet-domain watermarking algorithm. Chaos, Solitons Fractals 22:47–54

    Article  MATH  Google Scholar 

Download references

Acknowledgments

This research work is supported by Council of Scientific and Industrial Research (CSIR), New Delhi under the grant number CSR-557-MTD.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Asha Rani.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rani, A., Raman, B. An image copyright protection system using chaotic maps. Multimed Tools Appl 76, 3121–3138 (2017). https://doi.org/10.1007/s11042-016-3287-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3287-4

Keywords

Navigation