Abstract
We present a hybrid and robust encryption and watermarking algorithm based on a new chaotic map key generation method. The chaotic map uses a rule to generate the encryption key using an innovative approach. The main goal is to propose a hybrid scheme by applying a One Time Pad (OTP) encryption algorithm and a semi-blind watermarking approach to the host medical image. The encrypted watermark is embedded in the encrypted host image, directly in the spatial domain. The results obtained show perfect watermark extraction even after applying some attack scenarios. Using this approach, we conclude that our technique has a high robustness and a remarkable resistance against geometric, non-geometric and encryption attacks.
Similar content being viewed by others
References
Akhshani A, Akhavan A, Mobaraki A, Lim SC, Hassan Z (2014) Pseudo random number generator based on quantum chaotic map. Commun Nonlinear Sci Numer Simul 19(1):101–111
Akkaş MA, Sokullu R. Channel modeling and analysis for wireless underground sensor networks in water medium using electromagnetic waves in the 300–700 MHz range. Wirel Per Commun, 1–20
Alanazi H, Zaidan BB, Zaidan AA, Jalab HA, Shabbir M, Al-Nabhani Y (2010) New comparative study between DES, 3DES and AES within nine factors. arXiv preprint arXiv:1003.4085
Avants BB, Epstein CL, Grossman M, Gee JC (2008) Symmetric diffeomorphic image registration with cross-correlation: evaluating automated labeling of elderly and neurodegenerative brain. Med Image Anal 12(1):26–41
Benhocine A, Laouamer L, Nana L, Pascu AC (2013) New images watermarking scheme based on singular value decomposition. J Inf Hiding Multimed Signal Process 4(1):9–18
Bouslimi D, Coatrieux G, Cozic M, Roux C (2012) A joint encryption/watermarking system for verifying the reliability of medical images.Information. IEEE Trans Technol Biomed 16(5):891–899
Bouslimi D, Coatrieux G, Roux C (2012) A joint encryption/watermarking algorithm for verifying the reliability of medical images: application to echographic images. Comput Methods Prog Biomed 106(1):47–54
Cao D (2015) Quantum fuzzy classification hashing algorithm with the one-time pad security properties. In: Applied mechanics and materials, Vol 701, pp 1102–1105
Fouda JAE, Effa JY, Sabat SL, Ali M (2014) A fast chaotic block cipher for image encryption. Commun Nonlinear Sci Numer Simul 19(3):578–588
Guo J, Zheng P, Huang J (2015) Secure watermarking scheme against watermark attacks in the encrypted domain. J Vis Commun Image Represent 30:125–135
Harrison O, Waldron J (2007) AES encryption implementation and analysis on commodity graphics processing units. Springer, Berlin Heidelberg, pp 209–226
Hina AD, Said MRM, Banerjee S (2015) Chaotic pseudorandom sequences and the security of cryptosystems. In: Chaos, complexity and leadership 2013. Springer International Publishing, pp 163–173
Huynh-Thu Q, Ghanbari M (2008) Scope of validity of PSNR in image/video quality assessment. Electron Lett 44(13):800–801
Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circuits Syst Mag 1(3):6–21
Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in cryptology—CRYPTO’99. Springer Berlin, Heidelberg, pp 388–397
Laouamer L, Al Shaikh M, Nana LT, Pascu AC (2013) Informed symmetric encryption algorithm for DICOM medical image based on N-grams. In: 2013 Science and Information Conference (SAI), IEEE. pp 353–357
Laouamer L, Tayan O (2013) An enhanced SVD technique for authentication and protection of text-images using a case study on digital Quran content with sensitivity constraints. Life Sci J 10(2):2591–2597
Leone L, Pezzella A, Crescenzi O, Napolitano A, Barone V, d’Ischia M (2015) Trichocyanines: a red‐hair‐inspired modular platform for dye‐based one‐time‐pad molecular cryptography. ChemistryOpen 9999
Li J, Dong C, Huang M, Bai Y, Zhang H (2012) The medical images watermarking using DWT and Arnold. In: 2012 I.E. international conference on computer science and automation engineering (CSAE), IEEE. Vol 1, pp 27–31
Li J, Dong C, Huang M, Zhang H, Chen YW (2012) A novel robust watermarking for medical image. Adv Inf Sci Serv Sci 4(11)
Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–934
Petitcolas FA (2000) Watermarking schemes evaluation. IEEE Signal Process Mag 17(5):58–64
Petitcolas F (2012) Watermarking Stirmark, www.petitcolas.net/fabien/watermarking/stirmark/
Pradhan C, Rath S, Bisoi AK (2012) Non blind digital watermarking technique using DWT and cross chaos. Proc Technol 6:897–904
Puentes J, Roux C, Garreau M, Coatrieux JL (1998) Dynamic feature extraction of coronary artery motion using DSA image sequences. IEEE Trans Med Imaging 17(6):857–871
Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126
Rubin F (.om,ul9lj1996) One-time pad cryptography. Cryptologia 20(4): 359–364
Saha BJ, Kabi KK, Pradhan C (2014) Non blind watermarking technique using enhanced one time pad in DWT domain. In: 2014 International Conference on Computing, Communication and Networking Technologies (ICCCNT), IEEE, pp 1–6
Schneier B (1993) The idea encryption algorithm-The International Data Encryption Algorithm (IDEA). Dr Dobb’s J-Softw Tools Prof Programmer 18(13):50–57
Sneyers R (1997) Climate chaotic instability: statistical determination and theoretical background. Environmetrics 8(5):517–532
Subramanyam AV, Emmanuel S, Kankanhalli MS (2012) Robust watermarking of compressed and encrypted JPEG2000 images. IEEE Trans Multimed 14(3):703–716
Teh JS, Samsudin A, Akhavan A (2015) Parallel chaotic hash function based on the shuffle-exchange network. Nonlinear Dyn 1–13
Wang Z, Bovik AC (2002) A universal image quality index. IEEE Signal Process Lett 9(3):81–84
Xia W, Lu H, Zhao Y (2010) A dual binary image watermarking based on wavelet domain and pixel distribution features. In: Advances in multimedia modeling. Springer Berlin, Heidelberg, pp 130–14
Yap WS, Phan RCW, Yau WC, Heng SH (2015) Cryptanalysis of a new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn 80(3):1483–1491
Yuen CH, Wong KW (2011) A chaos-based joint image compression and encryption scheme using DCT and SHA-1. Appl Soft Comput 11(8):5092–5098
Zhao G, Yang X, Zhou B, Wei W(2010) RSA-based digital image encryption algorithm in wireless sensor networks. 2nd International Conference on Signal Processing Systems (ICSPS), 3, 640–643
Zheng P, Huang J (2013) Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image watermarking. In: Information hiding, Springer Berlin, Heidelberg, pp 240–254
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
AlShaikh, M., Laouamer, L., Nana, L. et al. Efficient and robust encryption and watermarking technique based on a new chaotic map approach. Multimed Tools Appl 76, 8937–8950 (2017). https://doi.org/10.1007/s11042-016-3499-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-3499-7