Multimedia Tools and Applications

, Volume 76, Issue 6, pp 8937–8950 | Cite as

Efficient and robust encryption and watermarking technique based on a new chaotic map approach

  • Muath AlShaikh
  • Lamri Laouamer
  • Laurent Nana
  • Anca Chrisitine Pascu
Article
  • 269 Downloads

Abstract

We present a hybrid and robust encryption and watermarking algorithm based on a new chaotic map key generation method. The chaotic map uses a rule to generate the encryption key using an innovative approach. The main goal is to propose a hybrid scheme by applying a One Time Pad (OTP) encryption algorithm and a semi-blind watermarking approach to the host medical image. The encrypted watermark is embedded in the encrypted host image, directly in the spatial domain. The results obtained show perfect watermark extraction even after applying some attack scenarios. Using this approach, we conclude that our technique has a high robustness and a remarkable resistance against geometric, non-geometric and encryption attacks.

Keywords

Watermarking Chaotic map OTP Attacks Robustness 

References

  1. 1.
    Akhshani A, Akhavan A, Mobaraki A, Lim SC, Hassan Z (2014) Pseudo random number generator based on quantum chaotic map. Commun Nonlinear Sci Numer Simul 19(1):101–111CrossRefMATHGoogle Scholar
  2. 2.
    Akkaş MA, Sokullu R. Channel modeling and analysis for wireless underground sensor networks in water medium using electromagnetic waves in the 300–700 MHz range. Wirel Per Commun, 1–20Google Scholar
  3. 3.
    Alanazi H, Zaidan BB, Zaidan AA, Jalab HA, Shabbir M, Al-Nabhani Y (2010) New comparative study between DES, 3DES and AES within nine factors. arXiv preprint arXiv:1003.4085Google Scholar
  4. 4.
    Avants BB, Epstein CL, Grossman M, Gee JC (2008) Symmetric diffeomorphic image registration with cross-correlation: evaluating automated labeling of elderly and neurodegenerative brain. Med Image Anal 12(1):26–41CrossRefGoogle Scholar
  5. 5.
    Benhocine A, Laouamer L, Nana L, Pascu AC (2013) New images watermarking scheme based on singular value decomposition. J Inf Hiding Multimed Signal Process 4(1):9–18Google Scholar
  6. 6.
    Bouslimi D, Coatrieux G, Cozic M, Roux C (2012) A joint encryption/watermarking system for verifying the reliability of medical images.Information. IEEE Trans Technol Biomed 16(5):891–899CrossRefGoogle Scholar
  7. 7.
    Bouslimi D, Coatrieux G, Roux C (2012) A joint encryption/watermarking algorithm for verifying the reliability of medical images: application to echographic images. Comput Methods Prog Biomed 106(1):47–54CrossRefGoogle Scholar
  8. 8.
    Cao D (2015) Quantum fuzzy classification hashing algorithm with the one-time pad security properties. In: Applied mechanics and materials, Vol 701, pp 1102–1105Google Scholar
  9. 9.
    Fouda JAE, Effa JY, Sabat SL, Ali M (2014) A fast chaotic block cipher for image encryption. Commun Nonlinear Sci Numer Simul 19(3):578–588MathSciNetCrossRefGoogle Scholar
  10. 10.
    Guo J, Zheng P, Huang J (2015) Secure watermarking scheme against watermark attacks in the encrypted domain. J Vis Commun Image Represent 30:125–135CrossRefGoogle Scholar
  11. 11.
    Harrison O, Waldron J (2007) AES encryption implementation and analysis on commodity graphics processing units. Springer, Berlin Heidelberg, pp 209–226Google Scholar
  12. 12.
    Hina AD, Said MRM, Banerjee S (2015) Chaotic pseudorandom sequences and the security of cryptosystems. In: Chaos, complexity and leadership 2013. Springer International Publishing, pp 163–173Google Scholar
  13. 13.
    Huynh-Thu Q, Ghanbari M (2008) Scope of validity of PSNR in image/video quality assessment. Electron Lett 44(13):800–801CrossRefGoogle Scholar
  14. 14.
    Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circuits Syst Mag 1(3):6–21MathSciNetCrossRefGoogle Scholar
  15. 15.
    Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in cryptology—CRYPTO’99. Springer Berlin, Heidelberg, pp 388–397Google Scholar
  16. 16.
    Laouamer L, Al Shaikh M, Nana LT, Pascu AC (2013) Informed symmetric encryption algorithm for DICOM medical image based on N-grams. In: 2013 Science and Information Conference (SAI), IEEE. pp 353–357Google Scholar
  17. 17.
    Laouamer L, Tayan O (2013) An enhanced SVD technique for authentication and protection of text-images using a case study on digital Quran content with sensitivity constraints. Life Sci J 10(2):2591–2597Google Scholar
  18. 18.
    Leone L, Pezzella A, Crescenzi O, Napolitano A, Barone V, d’Ischia M (2015) Trichocyanines: a red‐hair‐inspired modular platform for dye‐based one‐time‐pad molecular cryptography. ChemistryOpen 9999Google Scholar
  19. 19.
    Li J, Dong C, Huang M, Bai Y, Zhang H (2012) The medical images watermarking using DWT and Arnold. In: 2012 I.E. international conference on computer science and automation engineering (CSAE), IEEE. Vol 1, pp 27–31Google Scholar
  20. 20.
    Li J, Dong C, Huang M, Zhang H, Chen YW (2012) A novel robust watermarking for medical image. Adv Inf Sci Serv Sci 4(11)Google Scholar
  21. 21.
    Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–934CrossRefGoogle Scholar
  22. 22.
    Petitcolas FA (2000) Watermarking schemes evaluation. IEEE Signal Process Mag 17(5):58–64CrossRefGoogle Scholar
  23. 23.
    Petitcolas F (2012) Watermarking Stirmark, www.petitcolas.net/fabien/watermarking/stirmark/
  24. 24.
    Pradhan C, Rath S, Bisoi AK (2012) Non blind digital watermarking technique using DWT and cross chaos. Proc Technol 6:897–904CrossRefGoogle Scholar
  25. 25.
    Puentes J, Roux C, Garreau M, Coatrieux JL (1998) Dynamic feature extraction of coronary artery motion using DSA image sequences. IEEE Trans Med Imaging 17(6):857–871CrossRefGoogle Scholar
  26. 26.
    Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126MathSciNetCrossRefMATHGoogle Scholar
  27. 27.
    Rubin F (.om,ul9lj1996) One-time pad cryptography. Cryptologia 20(4): 359–364Google Scholar
  28. 28.
    Saha BJ, Kabi KK, Pradhan C (2014) Non blind watermarking technique using enhanced one time pad in DWT domain. In: 2014 International Conference on Computing, Communication and Networking Technologies (ICCCNT), IEEE, pp 1–6Google Scholar
  29. 29.
    Schneier B (1993) The idea encryption algorithm-The International Data Encryption Algorithm (IDEA). Dr Dobb’s J-Softw Tools Prof Programmer 18(13):50–57Google Scholar
  30. 30.
    Sneyers R (1997) Climate chaotic instability: statistical determination and theoretical background. Environmetrics 8(5):517–532CrossRefGoogle Scholar
  31. 31.
    Subramanyam AV, Emmanuel S, Kankanhalli MS (2012) Robust watermarking of compressed and encrypted JPEG2000 images. IEEE Trans Multimed 14(3):703–716CrossRefGoogle Scholar
  32. 32.
    Teh JS, Samsudin A, Akhavan A (2015) Parallel chaotic hash function based on the shuffle-exchange network. Nonlinear Dyn 1–13Google Scholar
  33. 33.
    Wang Z, Bovik AC (2002) A universal image quality index. IEEE Signal Process Lett 9(3):81–84CrossRefGoogle Scholar
  34. 34.
    Xia W, Lu H, Zhao Y (2010) A dual binary image watermarking based on wavelet domain and pixel distribution features. In: Advances in multimedia modeling. Springer Berlin, Heidelberg, pp 130–14Google Scholar
  35. 35.
    Yap WS, Phan RCW, Yau WC, Heng SH (2015) Cryptanalysis of a new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn 80(3):1483–1491MathSciNetCrossRefMATHGoogle Scholar
  36. 36.
    Yuen CH, Wong KW (2011) A chaos-based joint image compression and encryption scheme using DCT and SHA-1. Appl Soft Comput 11(8):5092–5098CrossRefGoogle Scholar
  37. 37.
    Zhao G, Yang X, Zhou B, Wei W(2010) RSA-based digital image encryption algorithm in wireless sensor networks. 2nd International Conference on Signal Processing Systems (ICSPS), 3, 640–643Google Scholar
  38. 38.
    Zheng P, Huang J (2013) Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image watermarking. In: Information hiding, Springer Berlin, Heidelberg, pp 240–254Google Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  • Muath AlShaikh
    • 1
  • Lamri Laouamer
    • 1
    • 2
  • Laurent Nana
    • 1
  • Anca Chrisitine Pascu
    • 1
    • 3
  1. 1.Lab-STICC (UMR CNRS 6285)University of Western Brittany, BrestBrest CedexFrance
  2. 2.Department of Management Information Systems, CBEQassim UniversityBuraydahSaudi Arabia
  3. 3.Faculty of LettersUniversity of Western BrittanyBrest CedexFrance

Personalised recommendations