A new secure and robust watermarking technique based on logistic map and modification of DC coefficient
- 132 Downloads
The proliferation of information and communication technology has made exchange of information easier than ever. Security and copyright protection of multimedia contents in such a scenario has become a major challenge for the research community round the globe. Digital watermarking has been found as an effective tool for protection and security of multimedia content. A secure and robust watermarking scheme based on DC coefficient modification in pixel domain and a modified logistic map is presented in this paper. The cover image is divided into \(8 \times 8\) sub-blocks and instead of computing DC coefficient using discrete cosine transform (DCT), we compute DC coefficient of each block in spatial domain. Watermark bits are embedded by modifying DC coefficients of various blocks in spatial domain. The quantum of change to be brought in various pixels of a block for embedding watermark bit depends upon DC coefficient of respective blocks, nature of watermark bit (0 or 1) to be embedded and the adjustment factor. The security of embedded watermark has been taken care of by using chaotic encryption based on a generalized logistic map (GLM). We show that GLM has better properties like ergodicity, larger lyapunov exponent, uniform invariant density, mixing, higher range of bifurcation parameter etc., compared to basic logistic map. We exploit these properties of GLM for designing a secure robust, strong efficient cryptosystem to encrypt the watermark information before embedding it. Experimental investigations show that besides being highly secure the proposed technique is robust to both signal processing and geometric attacks. Further, the proposed scheme is computationally efficient as DC coefficient which holds the information is computed in pixel domain instead of using DCT on an image block.
KeywordsWatermarking Security Chaotic encryption Generalized logistic map Robustness, computational complexity
The authors acknowledge the support rendered by University Grants Commission (UGC) Government of India under its SAP programme for conduct of this work.
- 1.Li, C., Lin, D., Lu, J., Hao, F.: Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography. (2017). arXiv:1711.01858
- 5.Parah, S.A., Javaid, A.S, Farhana, A., Bhat, G.M.: On the realization of robust watermarking system for medical images. In: 12th IEEE India International Conference (INDICON) on Electronics, Energy, Environment, Communication, Computers, Control (E3-C3), pp. 1–6. Jamia Millia Islamia, New Delhi (2015)Google Scholar
- 6.Shabir, A.P., Javaid, A.S., Bhat, G.M.: On the realization of a secure, high capacity data embedding technique using joint top-down and down- top embedding approach. Elixir Comp. Sci. Eng. 49, 10141–10146 (2012)Google Scholar
- 7.Shabir, A.P., Javaid, A.S., Bhat, G.M.: High capacity data embedding using joint intermediate significant bit and least significant technique. Int. J. Inf. Eng. Appl. 2, 1–11 (2013)Google Scholar
- 13.Chen, R., Luo, Y., Lan, Y., Alsharif, M.: A new robust digital image watermarking algorithm based on singular value decomposition and independent component analysis. J. Con. Inf. Tech. 8(5), 530–537 (2013)Google Scholar
- 20.Ma, F., Zhang, J., Zhang, W.: A blind watermarking technology based on DCT do-main, In: Proceedings of the IEEE International Conference on Computer Science and Service System, CSSS, 2012, pp. 398–401 (2012)Google Scholar
- 30.Elbadri, M., Peterkin, R., Groza, V., Ionescu, D., Saddik, A.E.: Hardware support of JPEG. In: Proceedings of Canadian Conference on Electrical and Computer Engineering pp. 812–815 (2005)Google Scholar
- 39.Nidhi, S.: A new image encryption method using chirikov and logistic map. Int. J. Comput. Appl. 59, 2123–2129 (2013)Google Scholar