Image Watermarking Technique Based on Two-Dimensional Chaotic Stream Encryption (original) (raw)

Abstract

This paper proposes a kind of wavelet domain image digital watermarking technique using two-dimensional chaotic stream encryption and human visual model. A stream encryption algorithm based on two-dimensional Logistic chaotic map is researched and realized for meaningful grayscale watermarking image. The block embedding intensity is calculated and combined with the human visual model, so that the embedding and detection steps of encrypted binary watermark can be adaptively fulfilled in the wavelet coefficients of the host image. The experimental results have shown that this watermarking technique can endure regular digital image processing and have preferable performance.

Chapter PDF

Similar content being viewed by others

References

  1. Cox, I.J., Miller, M.L., Bloom, J.A.: Digital watermarking. Morgan Kaufmann Publishers, San Francisco (2002)
    Google Scholar
  2. Yang, J., Lee, M.H., Chen, X.H., et al.: Mixing chaotic watermarks for embedding in wavelet transform domain. In: Proceedings of IEEE International Symposium on Circuits and Systems V2, Phoenix, USA, pp. 668–671 (2002)
    Google Scholar
  3. Yen, J.C.: Watermarks embedded in the permuted image. In: Proceedings of IEEE International Symposium on Circuits and Systems V2, Sydney, Australia, pp. 53–56 (2001)
    Google Scholar
  4. Tefas, A., Pitas, I.: Image authentication using chaotic mixing system. In: Proceedings of IEEE International Symposium on Circuits and Systems V1, Geneva, Switzerland, pp. 216–219 (2000)
    Google Scholar
  5. Ferretti, A., Rahman, N.K.: A study of coupled Logistic map and applications in chemical physics. Chemical Physics 119, 275–288 (1988)
    Google Scholar
  6. Nill, N.B.: A visual model weighted cosine transform for image compression and quality assessment. IEEE Transaction on Communication 33(6), 551–557 (1985)
    Article Google Scholar
  7. Tan, S.H., Ngan, K.N.: Classified perceptual coding with adaptive quantization. IEEE Transaction on Circuits and Systems for Video Technology 37(6), 375–383 (1996)
    Google Scholar
  8. Nill, N.B.: A visual model weighted cosine transform for image compression and quality assessment. IEEE Transaction on Communication 33(6), 551–557 (1985)
    Article Google Scholar
  9. AT&T Laboratories Cambridge. The ORL Database of Faces, http://www.uk.research.att.com/facedatabase.html (2004-11-12)

Download references

Author information

Authors and Affiliations

  1. Institute for Pattern Recognition and Artificial Intelligence, State Education Department Key Laboratory for Image Processing and Intelligent Control, Huazhong University of Science and Technology, Wuhan, 430074, China
    Hanping Hu & Yongqiang Chen
  2. Department of Computer and Information Engineering, Wuhan Polytechnic University, Wuhan, 430023, China
    Yongqiang Chen

Authors

  1. Hanping Hu
  2. Yongqiang Chen

Editor information

Editors and Affiliations

  1. Rissho University, Japan
    Tomoya Enokido
  2. School of Computer Science, University of Hertfordshire, College Lane, AL10 9AB, Hatfield, Hertfordshire, UK
    Lu Yan
  3. Department of Computing, Hong Kong Polytechnic University, Hong Kong
    Bin Xiao
  4. Empas Corporation, Republic of Korea
    Daeyoung Kim
  5. Department of Computer and Information Science, Indiana University, Purdue University, IN 46202, Indianapolis, USA
    Yuanshun Dai
  6. Department of Computer Science, St. Francis Xavier University, Antigonish, Canada
    Laurence T. Yang

Rights and permissions

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hu, H., Chen, Y. (2005). Image Watermarking Technique Based on Two-Dimensional Chaotic Stream Encryption. In: Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y., Yang, L.T. (eds) Embedded and Ubiquitous Computing – EUC 2005 Workshops. EUC 2005. Lecture Notes in Computer Science, vol 3823. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596042\_84

Download citation

Keywords

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Publish with us