Skip to main content
Log in

A new technique of frequency domain watermarking based on a local ring

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

This paper presents a new and comparatively secure watermarking technique, in the frequency domain. Our scheme deploys a local ring-based substitution box (S-box). The algebraic algorithm used to synthesize S-box basically exploits one–one correspondence between the multiplicative group of units of the local ring \({\mathbb{Z}}_{512}\) and the Galois field \(\varvec{F}_{256}\). This S-box has high confusion creating capability due to the structural properties of the local ring and fulfills the necessary requirements to be reliably used in multimedia applications. We use this S-box in a watermarking scheme to make our technique more confusing and secure to provide more support in copyrights protection strategies. The proposed non-blind digital watermarking technique deals with the application of discrete cosine transform (DCT) in the frequency domain which is comparatively more robust than spatial domain techniques. In the proposed scheme, first the watermark image is substituted through the S-box, and the scrambled watermark is then embedded in the DCT-transformed host image.‘ To measure the strength of the proposed technique, simulation results and statistical analyses are made. Most significant analyses techniques including measures of homogeneity, contrast, energy, entropy, correlation, mean squared error and peak signal to noise ratio are applied which show coherent results. To determine the robustness of our is effectively strong.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

Abbreviations

\(\varvec{F}_{{2^{n} }}\) :

Galois field of order 2n

DCT:

Discrete cosine transform

H :

The host image

W :

The watermark image

References

  1. Mukherjee, D. P., Maitra, S., & Acton, S. T. (2004). Spatial domain digital watermarking of multimedia objects for buyer authentication. IEEE Transactions on Multimedia, 6(1), 1–15.

    Article  Google Scholar 

  2. Lin, S. D., & Chen, C. F. (2000). A robust DCT-based watermarking for copyright protection. IEEE Transactions on Consumer Electronics, 46, 415–421.

    Article  Google Scholar 

  3. Caronni, G. (1995). Assuring ownership rights for digital images. In Proceedings of reliable IT systems (pp. 251–263).

  4. Vasudev, R. (2016). A review on digital image watermarking and its techniques. Journal of Image and Graphics, 4(2), 150–153.

    Article  Google Scholar 

  5. Kitamytra, I., Kanai, S., Kanai, T., & Kishinami, T. (2001). Copyright protection of vector map using digital watermarking method based on discrete Fourier transform. In Proceedings of IEEE international symposium on geosciences and remote sensing (pp. 1191–1193).

  6. Hong, W. D., Ming, L. D., Jun, Y., & Xiong, C. F. (2007). An improved chirp typed blind watermarking algorithm based on wavelet and fractional Fourier transform. In Proceedings of IEEE international conference on images and graphics (pp. 291–296).

  7. Lai, C. C., & Tsai, C. C. (2008). Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Transaction on Instrumentation and Measurement, 59(11), 3060–3063.

    Article  Google Scholar 

  8. Safabakhsh, R., Zaboli, S., & Tabibiazar, A. (2004). Digital watermarking on still images using wavelet transform. In Proceedings of international conference on information technology: coding and computing-ITCC.

  9. Kang, X., Huang, J., Shi, Y. Q., & Lin, Y. (2003). A DWTDFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Transactions on Circuits and Systems for Video Technology, 13(8), 776–786.

    Article  Google Scholar 

  10. Kaur, S., & Sidhu, R. K. (2016). Robust digital image watermarking for copyright protection with SVD–DWT–DCT and Kalman filtering. International Journal Emerging Technologies in Engineering Research, 4(1), 59–63.

    Google Scholar 

  11. Wang, G. M., & Hou, Z. F. (2008). Watermarking scheme based on DCT. Computer Engineering and Design, 29(21), 5635–5637.

    Google Scholar 

  12. Liu, F., & Yang, F. (2009). An improved blind watermarking algorithm based on DCT. Computer Engineering and Applications, 45(13), 124–126.

    Google Scholar 

  13. Zhang, Q., Li, Y., & Wei, X. (2012). An improved robust and adaptive watermarking algorithm based on DCT. Journal of Applied Research and Technology, 10(3), 405–415.

    Google Scholar 

  14. Xu, Z. H., Shen, G., & Lin, S. (2011). Image encryption algorithm based on chaos and S-boxes scrambling. Advanced Materials Research, 171172, 299–304.

    Google Scholar 

  15. Jamal, S. S., Shah, T., & Khan, M. U. (2016). A watermarking technique with chaotic fractional S-box transformation. Wireless Personal Communications, 90(4), 2033–2049.

    Article  Google Scholar 

  16. Farwa, S., Shah, T., & Idrees, L. (2016). A highly nonlinear S-box based on a fractional linear transfornation. SpringerPlus, 5(1), 1658. https://doi.org/10.1186/s40064-016-3298-7.

    Article  Google Scholar 

  17. Benvenuto, C. J. (2012). Galois field in cryptography. Washington: University of Washington.

    Google Scholar 

  18. Adams, C., & Tavares, S. (1989). In Advances in cryptology: proceedings of CRYPTO. Lecture notes in computer science (Vol. 89, pp. 612–615).

  19. Webster, A. F., & Tavares, S. E. (1986). On the design of S-boxes. In Advances in cryptology: proceedings of CRYPTO’85 (pp. 523–534). Berlin: Springer.

  20. Sattar, F., & Mufti, M. (2011) Spectral characterization and analysis of avalanche in cryptographic substitution boxes using Walsh-Hadamard transformations. International journal of Computer Applications, 28(6), 0975–8887.

    Article  Google Scholar 

  21. Wang, Y., Xie, Q., Wu, Y., & Du, B. (2009) A software for S-box performance analysis and test. In International conference on electronic commerce and business intelligence (pp. 125–128).

  22. Cox, J., Kilian, J., Leighton, F. T., & Shamoon, T. (1997). Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12), 1673–1687.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sajjad Shaukat Jamal.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jamal, S.S., Shah, T., Farwa, S. et al. A new technique of frequency domain watermarking based on a local ring. Wireless Netw 25, 1491–1503 (2019). https://doi.org/10.1007/s11276-017-1606-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-017-1606-y

Keywords

Navigation