CFP last date
20 December 2024
Reseach Article

Hybrid Watermarking Scheme for Copyright Protection using Chaotic Maps Cryptography

by M.A. Mohamed, H.M. Abdel-Atty A.M Aboutaleb, M.G. Abdel-Fattah, A.S. Samrah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 126 - Number 4
Year of Publication: 2015
Authors: M.A. Mohamed, H.M. Abdel-Atty A.M Aboutaleb, M.G. Abdel-Fattah, A.S. Samrah
10.5120/ijca2015906031

M.A. Mohamed, H.M. Abdel-Atty A.M Aboutaleb, M.G. Abdel-Fattah, A.S. Samrah . Hybrid Watermarking Scheme for Copyright Protection using Chaotic Maps Cryptography. International Journal of Computer Applications. 126, 4 ( September 2015), 13-26. DOI=10.5120/ijca2015906031

@article{ 10.5120/ijca2015906031,
author = { M.A. Mohamed, H.M. Abdel-Atty A.M Aboutaleb, M.G. Abdel-Fattah, A.S. Samrah },
title = { Hybrid Watermarking Scheme for Copyright Protection using Chaotic Maps Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { September 2015 },
volume = { 126 },
number = { 4 },
month = { September },
year = { 2015 },
issn = { 0975-8887 },
pages = { 13-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume126/number4/22539-2015906031/ },
doi = { 10.5120/ijca2015906031 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:16:34.028186+05:30
%A M.A. Mohamed
%A H.M. Abdel-Atty A.M Aboutaleb
%A M.G. Abdel-Fattah
%A A.S. Samrah
%T Hybrid Watermarking Scheme for Copyright Protection using Chaotic Maps Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 126
%N 4
%P 13-26
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays, there is an explosive growth in the digital multimedia creation, capturing, processing and distribution. Protecting the multimedia contents from copyright infringement has become a major concern. Encryption and watermarking are two complementary techniques that are used for protecting the multimedia data. In this paper, a proposed hybrid encryption-watermarking algorithm for copyright protection is proposed. The watermarking phase of this proposed algorithm is based on combining the discrete wavelet transform (DWT), the discrete cosine transform (DCT), and the singular value decomposition (SVD), while the encryption phase is based on using four chaotic maps with different dimensions. The proposed watermarking scheme uses a new PN-codes embedding strategy of the watermark into the cover image. This strategy allows decreasing the embedding strength factor of the scheme to a value that maximizes imperceptibility performance while maintaining acceptable robustness of the watermarking scheme. The performance of the proposed watermarking scheme is evaluated individually based on the robustness and the imperceptibility measures. This scheme is compared with some recent existing algorithms and experimental results show the improvements of the proposed algorithm over these algorithms. On the other hand, the proposed chaos-based encryption algorithm used four chaotic maps of different dimensions and it has two diffusion stages rather than one to improve the algorithm efficiency. The proposed encryption algorithm is tested using different experiments. The experimental results demonstrate that the proposed encryption algorithm shows advantages of large key space, high resistance against differential attacks and high security analysis such as statistical analysis, and sensitivity analysis. Compared to some traditional and recent encryption algorithms, the proposed encryption algorithm is much more secure. Finally experimental tests demonstrate that the proposed hybrid encryption-watermarking algorithm introduces high degree of efficiency, robustness, and security.

References
  1. F. Hartung and M. Kutter, “Multimedia Watermarking Techniques," Proceedings of the IEEE, vol. 87, no. 7, pp. 1079-1107, July 1999.
  2. R. Ni, Q. Ruan, Y. Zhao, “Pinpoint authentication watermarking based on a chaotic system,” Forensic Science International vol. 179, no. 1, pp. 54-62, 2008.
  3. C. Deng, X. Gao, X. Li, D. Tao, “Local histogram based geometric invariant image watermarking”, Signal Processing vol. 90, no. 12, pp.3256–3264, 2010.
  4. O. Findik, I. Babaoglu, E. Ulker, “A color image watermarking scheme based on hybrid classification method: particle swarm optimization and k-nearest neighbor algorithm,” Optics Communications, vol. 283, no. 24, pp. 4916–4922, 2010.
  5. J.C. Patra, J.E. Phua, C. Bornand, “A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression,” Digital Signal Processing, vol. 20, no. 6, pp. 1597–1611, 2010.
  6. S.D. Lin, S.C. Shie, J.Y. Guo, “Improving the robustness of DCT-based image watermarking against JPEG compression,” Computer Standards & Interfaces, vol. 32, no. 1-2, pp.54-60, 2010.
  7. D. Kundur, D. Hatzinakos, “Toward robust logo watermarking using multiresolution image fusion,” IEEE Transactions on Multimedia, vol. 6, no.1, pp. 185–197, 2004.
  8. W.H. Lin, Y.R. Wang, S.J. Horng, “A wavelet-tree-based watermarking method using distance vector of binary cluster,” Expert Systems with Applications vol. 36, no. 6, pp. 9869–9878, 2009.
  9. H.M. Al-Otum, N.A. Samara, “A robust blind color image watermarking based on wavelet-tree bit host difference selection,” Signal Processing, vol. 90, no. 8, pp. 2498–2512, 2010.
  10. A.A. Mohammad, A. Alhaj, S. Shaltaf, “An improved SVD-based watermarking scheme for protecting rightful ownership,” Signal Processing vol. 88, no. 9, pp. 2158–2180, 2008.
  11. C.C. Lai, “An improved SVD-based watermarking scheme using human visual characteristics,” Optics Communications, vol. 284, no. 4, pp. 938–944, 2011.
  12. K. R. Rao, and P. Yip, “Discrete Cosine Transform: algorithms, advantages, applications,” Academic Press Professional, USA, 1990.
  13. H. M. Yang, Y. Q. Liang, X. D. Wang, S. J. Ji, “ A DWT-Based Evaluation Method of Imperceptibility of watermark in watermarked color image,” Proceeding of the 2007 International Conference on Wavelet Analysis and Pattern Recognition, vol. 1, Nov, 2007.
  14. R. Liu and T. Tan, “An SVD-based watermarking scheme for protecting rightful ownership,” IEEE Transactions on Multimedia, vol. 4, pp. 121–128, 2002.
  15. F. Huang, Z.H. Guan, “A hybrid SVD-DCT watermarking method based on LPSNR,” Pattern Recognition Letters, vol. 25, no. 15, pp. 1769–1775, 2004.
  16. P. Singh, S. Agarwal, “A hybrid DCT-SVD based robust watermarking scheme for copyright protection,” AFRICON, pp. 1-5, 2013.
  17. E. Ganic, A.M. Eskicioglu, “Robust embedding of visual watermarks using DWT-SVD,” Journal of Electronic Imaging, vol. 14, no.4, 2005.
  18. V. Aslantas, L. A. Dog¢an, and S. Ozturk, “DWT-SVD based image watermarking using particle swarm optimizer,” IEEE International Conference on Multimedia Expo, pp. 241–244, 2008.
  19. S.K. Amirgholipour, A. R. Naghsh-Nilchi, “Robust Digital Image Watermarking Based on Joint DWT-DCT, ”International Journal of Digital Content Technology and its Applications, vol. 3, no. 2, pp.42-54, 2009.
  20. A. Al-Haj, “Combined DWT-DCT Digital Image Watermarking,” Journal of Computer Science vol. 3, no. 9, pp. 740-746, 2007.
  21. P.S. Murty, M. U. Bhaskar, P. R. Kumar, “A Semi-Blind Reference Watermarking SchemeUsing DWT-DCT-SVD for Copyright Protection,” International Journal of Computer Science & Information Technology (IJCSIT), vol. 4, no. 2, 2012.
  22. R. Matthews, “On the derivation of a chaotic encryption algorithm” Cryptologia, vol. 13, no. 1, pp. 29–42, 1984.
  23. L. Zhang, X. Liao, X. Wang, “An image encryption approach based on chaotic maps,” Chaos Solitons& Fractals, vol. 24, no. 3, pp. 759-765, 2005.
  24. X. Wu, H. Hu, B. Zhang, “Analyzing and improving a chaotic encryption method,” Chaos Solitons &Fractals, vol. 22, no. 2, pp. 367-373, 2004.
  25. S. Li, X.Mou, Y. Cai, “Improving security of a chaotic encryption approach,” Physics Letters A vol. 290, no. 3-4, pp. 127-133,2001.
  26. S. Katzenbeisser,et al., “First summary report on hybrid systems,” European ProjectIST-2002-507932, ECRYPT-Network of Excellence in Cryptology, Jan2005.
  27. N. Merhav, “On joint coding of watermarking and encryption,” IEEE Transactions on Information Theory vol. 52, pp. 190–205, Jan. 2006.
  28. M. Kutter, F. Jordan, and F. Bossen, “Digital signature of color images using amplitude modulation,” in Proc. SPZE Int. Conf: Storage and Retrieval for Zmage and Video Database, vol. 3022, pp. 518-526, 1997.
  29. M.M. Rahman, “A DWT, DCT AND SVD Based Watermarking Technique to Project the Image Piracy,” International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT), vol. 4, no. 2, June 2013.
  30. J. Kaur, R. Khanna, and D. Sandhu, “New Watermarking Scheme for Gray Image Based on DWT and SVD-DCT,” International Journal of Electronics and Communication Engineering, vol. 5, no. 4, pp. 389-397, 2012.
  31. K. Chaitanya, E. S. Reddy, and K. G. Rao, “Digital Color Image Watermarking In RGB Planes Using DWT-DCT-SVD Coefficients,” International Journal of Computer Science and Information Technologies (IJCSIT), vol. 5, no. 2, pp. 2413-2417, 2014.
  32. O. M. Al-hazaimeh, “A Novel Encryption Scheme for Digital Image Based on One Dimensional Logistic Map,” Computer and Information Science, vol. 7, no. 4, pp.65-73, 2014.
  33. T. Sivakumar and R. Venkatesan, "A novel approach for image encryption using dynamic SCAN pattern", IAENG International Journal of Computer Science, vol. 41, no. 2, pp. 91-101, 2014.
  34. P.V. Saraswathi and M. Venkatesulu, "A block cipher algorithm for multimedia content protection with random substitution using binary tree traversal", Journal of Computer Science, vol. 8, no. 9, pp. 1541-1546, 2012.
  35. M. Ghebleh, A. Kanso and H. Noura, "An image encryption scheme based on irregularly decimated chaotic maps", Signal Processing: Image Communication, vol. 29, no. 5, pp. 618-627, 2014.
  36. R.E. Boriga, A.C. Dascalescu, and A.V. Diaconua, “New Fast Image Encryption Scheme Based on 2D Chaotic Maps,” IAENG International Journal of Computer Science, vol.41, no.4, 2014
Index Terms

Computer Science
Information Sciences

Keywords

Chaotic maps Encryption Digital Watermarking Discrete Wavelet Transform (DWT) Discrete Cosine Transform (DCT) Singular Value Decomposition (SVD).