Abstract
This paper presents a new and comparatively secure watermarking technique, in the frequency domain. Our scheme deploys a local ring-based substitution box (S-box). The algebraic algorithm used to synthesize S-box basically exploits one–one correspondence between the multiplicative group of units of the local ring \({\mathbb{Z}}_{512}\) and the Galois field \(\varvec{F}_{256}\). This S-box has high confusion creating capability due to the structural properties of the local ring and fulfills the necessary requirements to be reliably used in multimedia applications. We use this S-box in a watermarking scheme to make our technique more confusing and secure to provide more support in copyrights protection strategies. The proposed non-blind digital watermarking technique deals with the application of discrete cosine transform (DCT) in the frequency domain which is comparatively more robust than spatial domain techniques. In the proposed scheme, first the watermark image is substituted through the S-box, and the scrambled watermark is then embedded in the DCT-transformed host image.‘ To measure the strength of the proposed technique, simulation results and statistical analyses are made. Most significant analyses techniques including measures of homogeneity, contrast, energy, entropy, correlation, mean squared error and peak signal to noise ratio are applied which show coherent results. To determine the robustness of our is effectively strong.
Similar content being viewed by others
Abbreviations
- \(\varvec{F}_{{2^{n} }}\) :
-
Galois field of order 2n
- DCT:
-
Discrete cosine transform
- H :
-
The host image
- W :
-
The watermark image
References
Mukherjee, D. P., Maitra, S., & Acton, S. T. (2004). Spatial domain digital watermarking of multimedia objects for buyer authentication. IEEE Transactions on Multimedia, 6(1), 1–15.
Lin, S. D., & Chen, C. F. (2000). A robust DCT-based watermarking for copyright protection. IEEE Transactions on Consumer Electronics, 46, 415–421.
Caronni, G. (1995). Assuring ownership rights for digital images. In Proceedings of reliable IT systems (pp. 251–263).
Vasudev, R. (2016). A review on digital image watermarking and its techniques. Journal of Image and Graphics, 4(2), 150–153.
Kitamytra, I., Kanai, S., Kanai, T., & Kishinami, T. (2001). Copyright protection of vector map using digital watermarking method based on discrete Fourier transform. In Proceedings of IEEE international symposium on geosciences and remote sensing (pp. 1191–1193).
Hong, W. D., Ming, L. D., Jun, Y., & Xiong, C. F. (2007). An improved chirp typed blind watermarking algorithm based on wavelet and fractional Fourier transform. In Proceedings of IEEE international conference on images and graphics (pp. 291–296).
Lai, C. C., & Tsai, C. C. (2008). Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Transaction on Instrumentation and Measurement, 59(11), 3060–3063.
Safabakhsh, R., Zaboli, S., & Tabibiazar, A. (2004). Digital watermarking on still images using wavelet transform. In Proceedings of international conference on information technology: coding and computing-ITCC.
Kang, X., Huang, J., Shi, Y. Q., & Lin, Y. (2003). A DWTDFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Transactions on Circuits and Systems for Video Technology, 13(8), 776–786.
Kaur, S., & Sidhu, R. K. (2016). Robust digital image watermarking for copyright protection with SVD–DWT–DCT and Kalman filtering. International Journal Emerging Technologies in Engineering Research, 4(1), 59–63.
Wang, G. M., & Hou, Z. F. (2008). Watermarking scheme based on DCT. Computer Engineering and Design, 29(21), 5635–5637.
Liu, F., & Yang, F. (2009). An improved blind watermarking algorithm based on DCT. Computer Engineering and Applications, 45(13), 124–126.
Zhang, Q., Li, Y., & Wei, X. (2012). An improved robust and adaptive watermarking algorithm based on DCT. Journal of Applied Research and Technology, 10(3), 405–415.
Xu, Z. H., Shen, G., & Lin, S. (2011). Image encryption algorithm based on chaos and S-boxes scrambling. Advanced Materials Research, 171172, 299–304.
Jamal, S. S., Shah, T., & Khan, M. U. (2016). A watermarking technique with chaotic fractional S-box transformation. Wireless Personal Communications, 90(4), 2033–2049.
Farwa, S., Shah, T., & Idrees, L. (2016). A highly nonlinear S-box based on a fractional linear transfornation. SpringerPlus, 5(1), 1658. https://doi.org/10.1186/s40064-016-3298-7.
Benvenuto, C. J. (2012). Galois field in cryptography. Washington: University of Washington.
Adams, C., & Tavares, S. (1989). In Advances in cryptology: proceedings of CRYPTO. Lecture notes in computer science (Vol. 89, pp. 612–615).
Webster, A. F., & Tavares, S. E. (1986). On the design of S-boxes. In Advances in cryptology: proceedings of CRYPTO’85 (pp. 523–534). Berlin: Springer.
Sattar, F., & Mufti, M. (2011) Spectral characterization and analysis of avalanche in cryptographic substitution boxes using Walsh-Hadamard transformations. International journal of Computer Applications, 28(6), 0975–8887.
Wang, Y., Xie, Q., Wu, Y., & Du, B. (2009) A software for S-box performance analysis and test. In International conference on electronic commerce and business intelligence (pp. 125–128).
Cox, J., Kilian, J., Leighton, F. T., & Shamoon, T. (1997). Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12), 1673–1687.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Jamal, S.S., Shah, T., Farwa, S. et al. A new technique of frequency domain watermarking based on a local ring. Wireless Netw 25, 1491–1503 (2019). https://doi.org/10.1007/s11276-017-1606-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-017-1606-y