Secure and robust digital image watermarking scheme using logistic and RSA encryption

https://doi.org/10.1016/j.eswa.2017.12.003Get rights and content

Highlights

  • A secure high-efficient watermarking scheme for copyright protection is proposed.

  • The security and robustness of watermarks has been improved significantly.

  • Time consuming in the watermarking scheme has been reduced to a certain extent.

Abstract

In the era of big data and networking, it is necessary to develop a secure and robust digital watermarking scheme with high computational efficiency to protect copyrights of digital works. However, most of the existing methods focus on robustness and embedding capacity, losing sight of security or requiring significant computational resources in the encryption process. This paper proposed a new digital image watermarking model based on scrambling algorithm Logistic and RSA asymmetric encryption algorithm to guarantee the security of the hidden data at the foundation of large embedding capacity, good robustness and high computational efficiency. The experiments involved applying the encryption algorithms of Logistic and RSA to the watermark image and performing the hybrid decomposition of Discrete wavelet transform (DWT) and Singular Value Decomposition (SVD) on the host image, and the watermark was embedded into the low-frequency sub-band of the host. The values of PSNR and NCC were measured to estimate the imperceptibility and robustness of the proposed watermarking scheme, and the CPU running time was recorded to measure the complexity of the proposed main algorithm in execution time. Experimental results showed the superiority of the proposed watermarking scheme.

Section snippets

Introduce

In the era of rapid development of digitalization and network technology, information sharing becomes much easier. A noteworthy fact is that, multimedia objects stored in the digital format are subject to cyber attacks in an unsecure public channel. First of all, digital media can be easily copied and re-disseminated by a cyber citizen when spreading in a public channel. The process costs low and the information is transmitted with no degradation, but it is unlikely to guarantee that the

Discrete wavelet transform

Discrete wavelet transform (DWT) is a process of multi-scale and spatial-frequency decomposition to an image. In the DWT-based watermarking scheme, DWT is used to decompose an aimed image into four types of sub-bands which are LL, HL, LH and HH. LL is low frequency component, and has a low resolution, representing approximate information of an image. The other three are horizontal high-frequency part, vertical high-frequency part, and high frequency part, respectively, and their resolutions are

The proposed algorithm

In this section, we present a new watermarking scheme in Fig. 2, which contains two main processes of watermark embedding and watermark extraction. Watermark preprocessing and embedding procedure are performed on the sending side, and the watermarked image is transmitted to the receiver over the internet. At the receiving end, watermark extraction and recovery is carried out. The blocks in the figure represent the corresponding algorithm operations. Arrow symbols pointing to them means that

Experimental results and discussion

A series of experiments were conducted to validate the effectiveness of the proposed watermarking scheme, which was further compared with the related methods. Table 1 shows the CUP running time in the process of watermark encryption using Saha et al. (2014)'s scheme, Kishore et al. (2014)'s scheme, and our proposed scheme. Saha et al.’s scheme represents a class of algorithms that use the asymmetric encryption algorithm RSA for the watermark image. They yielded higher security compared with the

Conclusion

In this paper, an improved secure and robust digital watermarking scheme has been proposed. The embedding process includes embedding a gray-scale image into the singular value of low frequency sub-band of the host image. The combination of a image-scrambling algorithm and a secure data-encryption algorithm was used to improve the security of the proposed watermarking scheme. The scrambling parameters could be stolen when information is transformed on a public network, but the asymmetric

References (20)

  • B. Czaplewski

    Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher chaining

    Journal of Visual Communication and Image Representation

    (2016)
  • N.K. Pareek et al.

    Image encryption using chaotic logistic map

    Image and Vision Computing

    (2006)
  • N Saikrishna et al.

    An invisible logo watermarking using Arnold transform

    Procedia Computer Science

    (2016)
  • B. Czaplewski et al.

    Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia

    Signal Processing

    (2014)
  • W. Han et al.

    Digital watermark encryption algorithm based on arnold and DCT transform

    Electrical, Information Engineering and Mechatronics

    (2011)
  • D. Kundur et al.

    Video fingerprinting and encryption principles for digital rights management

  • P.V.V. Kishore et al.

    Medical image watermarking using RSA encryption in wavelet domain

  • S. Mukherjee et al.

    A DCT-SVD based robust watermarking scheme for grayscale image

  • Y. Niu et al.

    A SVD-based color image watermark algorithm in DWT domain

    Advanced Graphic Communications, Packaging Technology and Materials

    (2016)
  • D.V.R. Prasad

    An improved invisible watermarking technique for image authentication

    International Journal of Advanced Research in Computer Science and Software Engineering

    (2013)
There are more references available in the full text version of this article.

Cited by (137)

  • Color image quantum steganography scheme and circuit design based on DWT+DCT+SVD

    2023, Physica A: Statistical Mechanics and its Applications
View all citing articles on Scopus
View full text