Abstract
In this manuscript, we have proposed a novel methodology for watermarking which is a gigantic exploration territory that is dynamically developing. This scheme is basically based on applying the Galois field GF(24), S 4 permutation and least significant bits. The investigation of these methods prompts systems for assaults and countermeasures which are utilized to discover blames and limitations in applications, empowering the improvement of better ones. Computerized watermarking is distinctive relying upon its strategies and applications. The extent of this examination is invisible computerized image watermarking for color and gray-scale images. The exploratory consequences of the proposed strategies are dissected utilizing entropy, contrast, homogeneity, energy, means square error, root mean square error, mean absolute error, peak signal-to-noise ratio, universal image quality index, mutual information, structural similarity, structural dissimilarity and structure content are used to measure the similarity between the cover image and watermarked image.
Similar content being viewed by others
References
Seitz J (2005) Digital watermarking for digital media. Idea Group Publishing, Hershey, PA. doi:10.4018/978-1-59140-518-4.ch001
Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T (2008) Digital watermarking and steganography, 2nd edn. Morgan Kaufmann Publisher, San Francisco, CA
Ruanaidh JJKO, Dowling WJ, Boland FM (1996) Watermarking digital images for copyright protection. In: IEEE ProcVis. Image Signal Process, vol 143, No 4, pp 250–254
Cox IJ, Kilian J, Leighton T, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687
Alghoniemy M, Tewfik AH (2004) Geometric invariance in image watermarking. IEEE Trans Image Process 13(2):145–153
Yang Z, Campisi P, Kundur D (2004) Dual domain watermarking for authentication and compression of cultural heritage images. IEEE Trans Image Process 13(3):430–448
Ruanaidh JJKO, Pereira S (1998) A secure robust digital image watermark. In: Proceedings of SPIE 3409, Electronic imaging: processing, printing, and publishing in color, 150. doi:10.1117/12.324106
Venkatesan R, Jakubowski M (2000) Image watermarking with better resilience. In: Proceeds ICIP 2000
Barni M, Bartolini F, Piva A (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10:783–791
Tefas A, Nikolaidis A, Nikolaidis N, Solachidis V, Tsekeridou S, Pitas I (2001) Statistical analysis of markov chaotic sequences for watermarking applications. In: Proceedings of IEEE international symposium on circuits and systems (ISCAS2001)
Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. J Pattern Recognit Soc 37:469–474
Bamatraf A, Ibrahim R, Salleh M, Mohd N (2011) A new digital watermarking algorithm using combination of least significant bit (LSB) and inverse bit. J Comput 3:1–8
Nikolaidis S, Pitas I (2008) Comparison of different chaotic maps with application to image watermarking. In: Proceedings of IEEE international symposium on circuits and system cryptography based on chaotic random maps with position dependent weighting probabilities Chaos, Solitons & Fractals 35 pp 362–369
Giovanardi A, Mazzini G (2001) Frequency domain chaotic watermarking. In: Proceedings of IEEE Symposium Circuits and System, Sydney, vol 2, pp 521–524
Sujatha SS, Sathik MM (2012) A novel DWT based blind watermarking for image authentication. Int J Netw Secur 14(4):223–228
Hsu CT, Wu JL (1998) DCT-based watermarking for video. IEEE Trans Consum Electron 44(1):206–216
Cox IJ, Miller ML, Bloom JA (2001) Digital watermarking, 1st edn. Morgan Kaufmann Publisher, San Fransisco
Kutter M, Jordan F Digital watermarking technology. AlpVision, Switzerland, pp 1–4
Morimoto Norishige (1999) Digital watermarking technology with practical applications. Inf Sci 2:107–111
Luo H, Chu SH, Lu ZM (2008) Self-embedding watermarking using half toning technique. Circuits Syst Signal Process 27:155–170
Lee YK, Bell G, Huang SY, Wang RZ, Shyu SJ (2009) An advanced least-significant-bit embedding scheme for steganographic encoding. Springer, Berlin
Chandrasekharappa TGS, Prema KV, Shama K (2011) S-boxes generated using affine transformation giving maximum avalanche effect. Int J Comput Sci Eng 3:3185–3193
Cid Carlos, Murphy Sean, Robshaw Matthew (2006) Algebraic Aspects of the advanced encryption standard. Springer, US
Haralick RM, Shanmugam K, Dinstein I (1973) Textural features for Image classification. IEEE Trans Syst Man Cybern 3:610–621
Haralick RM (1979) Statistical and structural approaches to texture. Proc IEEE 67:786–804
Khan M, Shah T (2014) A novel statistical analysis of chaotic S-box in image encryption. 3D Res 5:16. doi:10.1007/s13319-014-0016-5
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Batool, S.I., Shah, T. & Khan, M. A color image watermarking scheme based on affine transformation and S 4 permutation. Neural Comput & Applic 25, 2037–2045 (2014). https://doi.org/10.1007/s00521-014-1691-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-014-1691-0