Secure and robust digital image watermarking scheme using logistic and RSA encryption
Section snippets
Introduce
In the era of rapid development of digitalization and network technology, information sharing becomes much easier. A noteworthy fact is that, multimedia objects stored in the digital format are subject to cyber attacks in an unsecure public channel. First of all, digital media can be easily copied and re-disseminated by a cyber citizen when spreading in a public channel. The process costs low and the information is transmitted with no degradation, but it is unlikely to guarantee that the
Discrete wavelet transform
Discrete wavelet transform (DWT) is a process of multi-scale and spatial-frequency decomposition to an image. In the DWT-based watermarking scheme, DWT is used to decompose an aimed image into four types of sub-bands which are LL, HL, LH and HH. LL is low frequency component, and has a low resolution, representing approximate information of an image. The other three are horizontal high-frequency part, vertical high-frequency part, and high frequency part, respectively, and their resolutions are
The proposed algorithm
In this section, we present a new watermarking scheme in Fig. 2, which contains two main processes of watermark embedding and watermark extraction. Watermark preprocessing and embedding procedure are performed on the sending side, and the watermarked image is transmitted to the receiver over the internet. At the receiving end, watermark extraction and recovery is carried out. The blocks in the figure represent the corresponding algorithm operations. Arrow symbols pointing to them means that
Experimental results and discussion
A series of experiments were conducted to validate the effectiveness of the proposed watermarking scheme, which was further compared with the related methods. Table 1 shows the CUP running time in the process of watermark encryption using Saha et al. (2014)'s scheme, Kishore et al. (2014)'s scheme, and our proposed scheme. Saha et al.’s scheme represents a class of algorithms that use the asymmetric encryption algorithm RSA for the watermark image. They yielded higher security compared with the
Conclusion
In this paper, an improved secure and robust digital watermarking scheme has been proposed. The embedding process includes embedding a gray-scale image into the singular value of low frequency sub-band of the host image. The combination of a image-scrambling algorithm and a secure data-encryption algorithm was used to improve the security of the proposed watermarking scheme. The scrambling parameters could be stolen when information is transformed on a public network, but the asymmetric
References (20)
Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher chaining
Journal of Visual Communication and Image Representation
(2016)- et al.
Image encryption using chaotic logistic map
Image and Vision Computing
(2006) - et al.
An invisible logo watermarking using Arnold transform
Procedia Computer Science
(2016) - et al.
Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia
Signal Processing
(2014) - et al.
Digital watermark encryption algorithm based on arnold and DCT transform
Electrical, Information Engineering and Mechatronics
(2011) - et al.
Video fingerprinting and encryption principles for digital rights management
- et al.
Medical image watermarking using RSA encryption in wavelet domain
- et al.
A DCT-SVD based robust watermarking scheme for grayscale image
- et al.
A SVD-based color image watermark algorithm in DWT domain
Advanced Graphic Communications, Packaging Technology and Materials
(2016) An improved invisible watermarking technique for image authentication
International Journal of Advanced Research in Computer Science and Software Engineering
(2013)
Cited by (137)
Quantum-enhanced Chaotic Image Encryption: Strengthening Digital Data Security With 1-D Sine-based Chaotic Maps and Quantum Coding
2024, Journal of King Saud University - Computer and Information SciencesTarget-based image encryption via infinite interval chaotic system with Ill-conditioned parameter and 3DBDM
2023, Expert Systems with ApplicationsRobust periodic blind watermarking based on sub-block mapping and block encryption
2023, Expert Systems with ApplicationsColor image quantum steganography scheme and circuit design based on DWT+DCT+SVD
2023, Physica A: Statistical Mechanics and its ApplicationsAn attack resistant hybrid blind image watermarking scheme based on combination of DWT, DCT and PCA
2024, Multimedia Tools and Applications