Skip to main content
Log in

A color image watermarking scheme based on affine transformation and S 4 permutation

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

In this manuscript, we have proposed a novel methodology for watermarking which is a gigantic exploration territory that is dynamically developing. This scheme is basically based on applying the Galois field GF(24), S 4 permutation and least significant bits. The investigation of these methods prompts systems for assaults and countermeasures which are utilized to discover blames and limitations in applications, empowering the improvement of better ones. Computerized watermarking is distinctive relying upon its strategies and applications. The extent of this examination is invisible computerized image watermarking for color and gray-scale images. The exploratory consequences of the proposed strategies are dissected utilizing entropy, contrast, homogeneity, energy, means square error, root mean square error, mean absolute error, peak signal-to-noise ratio, universal image quality index, mutual information, structural similarity, structural dissimilarity and structure content are used to measure the similarity between the cover image and watermarked image.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Seitz J (2005) Digital watermarking for digital media. Idea Group Publishing, Hershey, PA. doi:10.4018/978-1-59140-518-4.ch001

  2. Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T (2008) Digital watermarking and steganography, 2nd edn. Morgan Kaufmann Publisher, San Francisco, CA

    Google Scholar 

  3. Ruanaidh JJKO, Dowling WJ, Boland FM (1996) Watermarking digital images for copyright protection. In: IEEE ProcVis. Image Signal Process, vol 143, No 4, pp 250–254

  4. Cox IJ, Kilian J, Leighton T, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687

    Article  Google Scholar 

  5. Alghoniemy M, Tewfik AH (2004) Geometric invariance in image watermarking. IEEE Trans Image Process 13(2):145–153

    Article  Google Scholar 

  6. Yang Z, Campisi P, Kundur D (2004) Dual domain watermarking for authentication and compression of cultural heritage images. IEEE Trans Image Process 13(3):430–448

    Article  Google Scholar 

  7. Ruanaidh JJKO, Pereira S (1998) A secure robust digital image watermark. In: Proceedings of SPIE 3409, Electronic imaging: processing, printing, and publishing in color, 150. doi:10.1117/12.324106

  8. Venkatesan R, Jakubowski M (2000) Image watermarking with better resilience. In: Proceeds ICIP 2000

  9. Barni M, Bartolini F, Piva A (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10:783–791

    Article  MATH  Google Scholar 

  10. Tefas A, Nikolaidis A, Nikolaidis N, Solachidis V, Tsekeridou S, Pitas I (2001) Statistical analysis of markov chaotic sequences for watermarking applications. In: Proceedings of IEEE international symposium on circuits and systems (ISCAS2001)

  11. Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. J Pattern Recognit Soc 37:469–474

    Article  MATH  Google Scholar 

  12. Bamatraf A, Ibrahim R, Salleh M, Mohd N (2011) A new digital watermarking algorithm using combination of least significant bit (LSB) and inverse bit. J Comput 3:1–8

    Google Scholar 

  13. Nikolaidis S, Pitas I (2008) Comparison of different chaotic maps with application to image watermarking. In: Proceedings of IEEE international symposium on circuits and system cryptography based on chaotic random maps with position dependent weighting probabilities Chaos, Solitons & Fractals 35 pp 362–369

  14. Giovanardi A, Mazzini G (2001) Frequency domain chaotic watermarking. In: Proceedings of IEEE Symposium Circuits and System, Sydney, vol 2, pp 521–524

  15. Sujatha SS, Sathik MM (2012) A novel DWT based blind watermarking for image authentication. Int J Netw Secur 14(4):223–228

    Google Scholar 

  16. Hsu CT, Wu JL (1998) DCT-based watermarking for video. IEEE Trans Consum Electron 44(1):206–216

    Article  Google Scholar 

  17. Cox IJ, Miller ML, Bloom JA (2001) Digital watermarking, 1st edn. Morgan Kaufmann Publisher, San Fransisco

    Google Scholar 

  18. Kutter M, Jordan F Digital watermarking technology. AlpVision, Switzerland, pp 1–4

  19. Morimoto Norishige (1999) Digital watermarking technology with practical applications. Inf Sci 2:107–111

    Google Scholar 

  20. Luo H, Chu SH, Lu ZM (2008) Self-embedding watermarking using half toning technique. Circuits Syst Signal Process 27:155–170

    Article  MathSciNet  Google Scholar 

  21. Lee YK, Bell G, Huang SY, Wang RZ, Shyu SJ (2009) An advanced least-significant-bit embedding scheme for steganographic encoding. Springer, Berlin

    Google Scholar 

  22. Chandrasekharappa TGS, Prema KV, Shama K (2011) S-boxes generated using affine transformation giving maximum avalanche effect. Int J Comput Sci Eng 3:3185–3193

    Google Scholar 

  23. Cid Carlos, Murphy Sean, Robshaw Matthew (2006) Algebraic Aspects of the advanced encryption standard. Springer, US

    MATH  Google Scholar 

  24. Haralick RM, Shanmugam K, Dinstein I (1973) Textural features for Image classification. IEEE Trans Syst Man Cybern 3:610–621

    Article  Google Scholar 

  25. Haralick RM (1979) Statistical and structural approaches to texture. Proc IEEE 67:786–804

    Article  Google Scholar 

  26. Khan M, Shah T (2014) A novel statistical analysis of chaotic S-box in image encryption. 3D Res 5:16. doi:10.1007/s13319-014-0016-5

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Majid Khan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Batool, S.I., Shah, T. & Khan, M. A color image watermarking scheme based on affine transformation and S 4 permutation. Neural Comput & Applic 25, 2037–2045 (2014). https://doi.org/10.1007/s00521-014-1691-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-014-1691-0

Keywords

Navigation