Robust watermarking of digital images based on chaotic mapping and DCT (original) (raw)
Related papers
A DCT-CHAOS digital image watermarking scheme based on Multiple Chaotic Maps
a watermarking scheme for gray scale images is proposed based on a family of the chaotic maps and the discrete cosine transforms. The Jacobian Elliptic maps method is employed to encrypt a watermarked logo. The location of the DCT coefficients for the watermark embedding is determined employing a piecewise nonlinear chaotic map. The size of key space for initial conditions and control parameters is considered as which is large enough to resist to the attacks. The computations of the PSNR and BER for some famous benchmarks, verify that the method could improve the quality of the watermarking as well as increasing the security of images.
Robust digital watermarking based on chaotic maps
Anti-counterfeiting, Security, and Identification, 2012
Based on chaotic maps, a novel robust watermarking algorithm is presented in this paper. The proposed approach improves the invisibility, robustness and security of traditional watermarking algorithm by using chaotic sequences. Taking advantage of the characteristics of extreme sensitivity to initial conditions, Chebyshev maps are used to generate substantially different watermarks as a key. This technique has been shown to offer an added security advantage over the more traditionally generated watermarks created from pseudorandom sequences, in that only the function seed needs to be stored. Various kinds of images are selected as watermark images in order to prove the fidelity of the proposed scheme. Simulation of the algorithm is performed on different types of images, and the results are compared with existing algorithms. Results show that the proposed scheme is simple and applicable, and can resist many attacks such as JPEG compression, rotation, cropping and noising.
Comparison of different chaotic maps with application to image watermarking
… . ISCAS 2000 Geneva. The 2000 IEEE …, 2000
The current paper presents a method for image watermarking based on chaotic sequences produced by different functions. The effect of embedding a chaotic watermark on an image is examined. Extensive experimental results for JPEG and filtering attacks on images watermarked by the different functions are presented together with a comparative study of them. The results show that efficient watermarking methods based on chaos can be designed under certain conditions.
Watermarking Scheme Based on Multiple Chaotic Maps
2011
a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key space and lowsecurity. Therefore the size of key space for initial conditions andcontrol parameters is computed about and this keyspace is large enough to resist the attacks. Toevaluate therobustness and effectiveness of proposed method, several attacksare applied to the
Chaotic-Correlation Based Watermarking Scheme for Still Images
Abstract–In this work, a new blind watermarking scheme in frequency domain is presented. The proposed scheme is based on a chaotic function for embedding, and a correlation method for detection. Three-dimensional maps of PSNR and correlation are used for better selection of embedding parameters according to a quality threshold. The scheme shows increased robustness against JPEG compression and cropping.
A Robust Secured Watermarking Approach using DCT-DWT Chaotic Maps
in this paper an efficient digital watermarking technique is proposed for copyright protection. The proposed watermarking algorithm a binary logo watermark security is also maintained by using chaotic map and then after it is embedded by modifying the appropriate subband in the wavelet domain. Level 2 and level 3 wavelet decompositions are utilized to embed the digital watermark. The approach can effectively hide a robust watermark due to the exploitation of the characteristics of the human visual system in wavelet domain. The watermark is detected by comparing the correlations between the wavelet coefficients and the watermarking code at level 2 and level 3 with the stored side information. The performance of the proposed watermarking is robust to a variety of image processing techniques, such as JPEG compression, sharpening, resizing, and geometric operations.
Two Novel Chaos-Based Algorithms for Image and Video Watermarking
iranian journal of electrical and electronic engineering, 2012
In this paper we introduce two innovative image and video watermarking algorithms. The paper's main emphasis is on the use of chaotic maps to boost the algorithms' security and resistance against attacks. By encrypting the watermark information in a one dimensional chaotic map, we make the extraction of watermark for potential attackers very hard. In another approach, we select embedding positions by a two dimensional chaotic map which enables us to satisfactorily distribute watermark information throughout the host signal. This prevents concentration of watermark data in a corner of the host signal which effectively saves it from being a target for attacks that include cropping of the signal. The simulation results demonstrate that the proposed schemes are quite resistant to many kinds of attacks which commonly threaten watermarking algorithms.
Normalized Image Watermarking Scheme Using Chaotic System
International Journal of Information and Network Security (IJINS), 2012
In contemporary years, different watermarking schemes are proposed for image authentication and copyright protection. In this paper, a novel normalized image watermarking scheme along with chaotic system (NCS) for higher embedding capacity and better robustness is presented. Normalization is useful to recover the watermark even in case of geometrical attacks. Arnold cat map and logistic map allows the proposed watermarking system to remain comprehensible for non experts and become more pleasant. The proposed method overcomes the degradation problem by embedding the watermarks in visually insensitive locations. Quite a lot of experiments have been carried out to test the performance of the proposed system against different attack scenarios. The proposed method highlights security, invisibility and quality, by preserving the original image, while maintaining robustness against common signal processing operations and attacks.
An improved method for digital image fragile watermarking based on chaotic maps
Multimedia Tools and Applications, 2016
In this paper, the digital image fragile watermarking method based on chaotic maps is proposed. Our method has some significant advantageous in comparison with other available methods. Firstly, we reduce watermark payloads, while they have high quality of recovery and security. In watermark embedding phase, we process the image in order to produce the information array for each block, which finally embedded in the host image to build watermarked image. The information array for each block has different length, which is defined based on block characteristic that could be smooth or rough. The second superiority of the proposed method is proposing a new metric for calculating roughness of image block, which leads to less consume of bandwidth in comparison with other available methods. Finally, we use chaotic map for block-mapping that enhances the security. Our method provides basic requirements of watermarking scheme such as, invisibility, recover quality and security. Experimental Results have proved that our method is powerful in tamper detection, self-recovery and robust against known watermarking attacks.
Applications of chaotic signal processing techniques to multimedia watermarking
Proc. Int. Workshop …, 2000
Usage of digital media has witnessed a tremendous growth during the last decades. However digital media are extremely vulnerable to copyright infringement, tampering and unauthorized distribution. Recently the protection of digital information has received significant attention within the digital media community and a number of techniques that try to address the problem by hiding appropriate information within digital media have been proposed. In this paper we present two applications of chaotic systems to watermarking of multimedia data, namely secure spatial scrambling of watermark patterns prior to their embedding in images and generation of 1-D or 2-D watermark signals.