Skip to main content
Log in

Efficient and robust encryption and watermarking technique based on a new chaotic map approach

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

We present a hybrid and robust encryption and watermarking algorithm based on a new chaotic map key generation method. The chaotic map uses a rule to generate the encryption key using an innovative approach. The main goal is to propose a hybrid scheme by applying a One Time Pad (OTP) encryption algorithm and a semi-blind watermarking approach to the host medical image. The encrypted watermark is embedded in the encrypted host image, directly in the spatial domain. The results obtained show perfect watermark extraction even after applying some attack scenarios. Using this approach, we conclude that our technique has a high robustness and a remarkable resistance against geometric, non-geometric and encryption attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Akhshani A, Akhavan A, Mobaraki A, Lim SC, Hassan Z (2014) Pseudo random number generator based on quantum chaotic map. Commun Nonlinear Sci Numer Simul 19(1):101–111

    Article  MATH  Google Scholar 

  2. Akkaş MA, Sokullu R. Channel modeling and analysis for wireless underground sensor networks in water medium using electromagnetic waves in the 300–700 MHz range. Wirel Per Commun, 1–20

  3. Alanazi H, Zaidan BB, Zaidan AA, Jalab HA, Shabbir M, Al-Nabhani Y (2010) New comparative study between DES, 3DES and AES within nine factors. arXiv preprint arXiv:1003.4085

  4. Avants BB, Epstein CL, Grossman M, Gee JC (2008) Symmetric diffeomorphic image registration with cross-correlation: evaluating automated labeling of elderly and neurodegenerative brain. Med Image Anal 12(1):26–41

    Article  Google Scholar 

  5. Benhocine A, Laouamer L, Nana L, Pascu AC (2013) New images watermarking scheme based on singular value decomposition. J Inf Hiding Multimed Signal Process 4(1):9–18

    Google Scholar 

  6. Bouslimi D, Coatrieux G, Cozic M, Roux C (2012) A joint encryption/watermarking system for verifying the reliability of medical images.Information. IEEE Trans Technol Biomed 16(5):891–899

    Article  Google Scholar 

  7. Bouslimi D, Coatrieux G, Roux C (2012) A joint encryption/watermarking algorithm for verifying the reliability of medical images: application to echographic images. Comput Methods Prog Biomed 106(1):47–54

    Article  Google Scholar 

  8. Cao D (2015) Quantum fuzzy classification hashing algorithm with the one-time pad security properties. In: Applied mechanics and materials, Vol 701, pp 1102–1105

  9. Fouda JAE, Effa JY, Sabat SL, Ali M (2014) A fast chaotic block cipher for image encryption. Commun Nonlinear Sci Numer Simul 19(3):578–588

    Article  MathSciNet  Google Scholar 

  10. Guo J, Zheng P, Huang J (2015) Secure watermarking scheme against watermark attacks in the encrypted domain. J Vis Commun Image Represent 30:125–135

    Article  Google Scholar 

  11. Harrison O, Waldron J (2007) AES encryption implementation and analysis on commodity graphics processing units. Springer, Berlin Heidelberg, pp 209–226

    Google Scholar 

  12. Hina AD, Said MRM, Banerjee S (2015) Chaotic pseudorandom sequences and the security of cryptosystems. In: Chaos, complexity and leadership 2013. Springer International Publishing, pp 163–173

  13. Huynh-Thu Q, Ghanbari M (2008) Scope of validity of PSNR in image/video quality assessment. Electron Lett 44(13):800–801

    Article  Google Scholar 

  14. Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circuits Syst Mag 1(3):6–21

    Article  MathSciNet  Google Scholar 

  15. Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in cryptology—CRYPTO’99. Springer Berlin, Heidelberg, pp 388–397

  16. Laouamer L, Al Shaikh M, Nana LT, Pascu AC (2013) Informed symmetric encryption algorithm for DICOM medical image based on N-grams. In: 2013 Science and Information Conference (SAI), IEEE. pp 353–357

  17. Laouamer L, Tayan O (2013) An enhanced SVD technique for authentication and protection of text-images using a case study on digital Quran content with sensitivity constraints. Life Sci J 10(2):2591–2597

    Google Scholar 

  18. Leone L, Pezzella A, Crescenzi O, Napolitano A, Barone V, d’Ischia M (2015) Trichocyanines: a red‐hair‐inspired modular platform for dye‐based one‐time‐pad molecular cryptography. ChemistryOpen 9999

  19. Li J, Dong C, Huang M, Bai Y, Zhang H (2012) The medical images watermarking using DWT and Arnold. In: 2012 I.E. international conference on computer science and automation engineering (CSAE), IEEE. Vol 1, pp 27–31

  20. Li J, Dong C, Huang M, Zhang H, Chen YW (2012) A novel robust watermarking for medical image. Adv Inf Sci Serv Sci 4(11)

  21. Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–934

    Article  Google Scholar 

  22. Petitcolas FA (2000) Watermarking schemes evaluation. IEEE Signal Process Mag 17(5):58–64

    Article  Google Scholar 

  23. Petitcolas F (2012) Watermarking Stirmark, www.petitcolas.net/fabien/watermarking/stirmark/

  24. Pradhan C, Rath S, Bisoi AK (2012) Non blind digital watermarking technique using DWT and cross chaos. Proc Technol 6:897–904

    Article  Google Scholar 

  25. Puentes J, Roux C, Garreau M, Coatrieux JL (1998) Dynamic feature extraction of coronary artery motion using DSA image sequences. IEEE Trans Med Imaging 17(6):857–871

    Article  Google Scholar 

  26. Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126

    Article  MathSciNet  MATH  Google Scholar 

  27. Rubin F (.om,ul9lj1996) One-time pad cryptography. Cryptologia 20(4): 359–364

  28. Saha BJ, Kabi KK, Pradhan C (2014) Non blind watermarking technique using enhanced one time pad in DWT domain. In: 2014 International Conference on Computing, Communication and Networking Technologies (ICCCNT), IEEE, pp 1–6

  29. Schneier B (1993) The idea encryption algorithm-The International Data Encryption Algorithm (IDEA). Dr Dobb’s J-Softw Tools Prof Programmer 18(13):50–57

    Google Scholar 

  30. Sneyers R (1997) Climate chaotic instability: statistical determination and theoretical background. Environmetrics 8(5):517–532

    Article  Google Scholar 

  31. Subramanyam AV, Emmanuel S, Kankanhalli MS (2012) Robust watermarking of compressed and encrypted JPEG2000 images. IEEE Trans Multimed 14(3):703–716

    Article  Google Scholar 

  32. Teh JS, Samsudin A, Akhavan A (2015) Parallel chaotic hash function based on the shuffle-exchange network. Nonlinear Dyn 1–13

  33. Wang Z, Bovik AC (2002) A universal image quality index. IEEE Signal Process Lett 9(3):81–84

    Article  Google Scholar 

  34. Xia W, Lu H, Zhao Y (2010) A dual binary image watermarking based on wavelet domain and pixel distribution features. In: Advances in multimedia modeling. Springer Berlin, Heidelberg, pp 130–14

  35. Yap WS, Phan RCW, Yau WC, Heng SH (2015) Cryptanalysis of a new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn 80(3):1483–1491

    Article  MathSciNet  MATH  Google Scholar 

  36. Yuen CH, Wong KW (2011) A chaos-based joint image compression and encryption scheme using DCT and SHA-1. Appl Soft Comput 11(8):5092–5098

    Article  Google Scholar 

  37. Zhao G, Yang X, Zhou B, Wei W(2010) RSA-based digital image encryption algorithm in wireless sensor networks. 2nd International Conference on Signal Processing Systems (ICSPS), 3, 640–643

  38. Zheng P, Huang J (2013) Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image watermarking. In: Information hiding, Springer Berlin, Heidelberg, pp 240–254

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muath AlShaikh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

AlShaikh, M., Laouamer, L., Nana, L. et al. Efficient and robust encryption and watermarking technique based on a new chaotic map approach. Multimed Tools Appl 76, 8937–8950 (2017). https://doi.org/10.1007/s11042-016-3499-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3499-7

Keywords

Navigation