Skip to main content
Log in

Triple byte nonlinear component of block cipher and its application in frequency domain watermarking

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In today’s world, digital data such as images, videos, and texts are easily accessible to just about anyone, posing significant security and copyright concerns. An effective tool to address this concern is digital watermarking. We propose a new digital watermarking technique for color images based on discrete cosine transform (DCT) and a triple-byte nonlinear component of a block cipher. We have first constructed a triple byte nonlinear component of block cipher i.e. 24×24 substitution box (S-box) based on the Galois ring GR(23,8) and then we use it in watermarking procedure by dividing it into 3 bytes and each byte deals with Red (R), Green (G) and Blue (B) channels separately. We split the watermark and original image into R, G, and B channels. Then we embed the combined S-box substituted R, G, and B channel of the watermark image in the combined DCT applied R, G, and B channel of the original image. Experimental and comparative analysis shows that our proposed method is more secure,effective, and robust than previous schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Data Availability

Data sharing not applicable to this article as no datasets were generated or analysed during the current study.

References

  1. Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. PhD Thesis, University of Buckingham

  2. Agarwal N, Singh PK (2022) Discrete cosine transforms and genetic algorithm based watermarking method for robustness and imperceptibility of color images for intelligent multimedia applications. Multimed Tools Appl:1–27

  3. Al-Maadeed TA, Hussain I, Anees A, Mustafa MT (2021) A image encryption algorithm based on chaotic lorenz system and novel primitive polynomial s-boxes. Multimed Tools Appl:1–22

  4. Arya V, Choudhary N (2021) RGB Image watermarking using DCT. Proc Integr Intell Enable Netw Comput:311–316

  5. He Y, Hu Y (2018) A proposed digital image watermarking based on DWT-DCT-SVD. In: 2018 2nd IEEE advanced information management, communicates, electronic and automation control conference (IMCEC). IEEE, pp 1214–1218

  6. Hua Z, Li J, Chen Y, Yi S (2021) Design and application of an s-box using complete latin square. Nonlinear Dyn 104(1):807–825

    Article  Google Scholar 

  7. Jamal SS, Shah T, Farwa S, Khan MU (2019) A new technique of frequency domain watermarking based on a local ring. Wirel Netw 25(4):1491–1503

    Article  Google Scholar 

  8. Lee CF, Chang C, Wang ZH, Di YF (2021) A high robust and blind image watermarking using Arnold transform mapping in the DCT domain of YCbCr color space

  9. Moosazadeh M, Ekbatanifard G (2017) An improved robust image watermarking method using dct and ycocg-r color space. Optik 140:975–988. https://doi.org/10.1016/j.ijleo.2017.05.011

    Article  Google Scholar 

  10. Rakhmawati L, Wirawan W, Suwadi S, Delpha C, Duhamel P (2022) Blind robust image watermarking based on adaptive embedding strength and distribution of quantified coefficients. Expert Syst Appl 187:115906

    Article  Google Scholar 

  11. Shah T, Qamar A, Hussain I (2013) Substitution box on maximal cyclic subgroup of units of a galois ring. Zeitschrift fü,r Naturforschung A 68 (8-9):567–572

    Article  Google Scholar 

  12. Shah T, Mehmood N, de Andrade AA, Palazzo R (2017) Maximal cyclic subgroups of the groups of units of galois rings: a computational approach. Comput Appl Math 36(3):1273–1297

    Article  MathSciNet  MATH  Google Scholar 

  13. Shah T, Ali A, Khan M, Farooq G, de Andrade AA (2020) Galois ring GR(23, 8) dependent 24x24 S-box design: an RGB image encryption application. Wirel Pers Commun 113(2):1201–1224

    Article  Google Scholar 

  14. Shah T, Jamal SS, et al. (2020) An improved chaotic cryptosystem for image encryption and digital watermarking. Wirel Pers Commun 110 (3):1429–1442

    Article  Google Scholar 

  15. Shah T, et al. (2022) Design of 24-by-24-replacement-matrix: a functionality to astronomical visual. Multimed Tools Appl:1–27

  16. Shih FY, Wu Y-T (2005) Enhancement of image watermark retrieval based on genetic algorithms. J Visual Commun Image Represent 16(2):115–133

    Article  Google Scholar 

  17. Sinhal R, Jain DK, Ansari IA (2021) Machine learning based blind color image watermarking scheme for copyright protection. Pattern Recogn Lett 145:171–177

    Article  Google Scholar 

  18. Thanki RM, Borisagar KR (2013) Combined dct–cs theory based digital watermarking technique for color images. In: Proceedings on national conference on emerging trends in information and communication technology (NCETICT 2013). Citeseer, pp 17–23

  19. Ullah A, Jamal SS, Shah T (2017) A novel construction of substitution box using a combination of chaotic maps with improved chaotic range. Nonlinear Dyn 88(4):2757–2769

    Article  Google Scholar 

  20. Ullah A, Jamal SS, Shah T (2018) A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dyn 91(1):359–370

    Article  MathSciNet  Google Scholar 

  21. University of Southern California S, Institute IP (2023) SIPI image database-misc. https://sipi.usc.edu/database/database.php?volume=misc&image=37#top/

  22. Yen J-C (2001) Watermark embedded in permuted domain. Electron Lett 37(2):80–81

    Article  Google Scholar 

  23. Yuan Z, Liu D, Zhang X, Wang H, Su Q (2020) DCT-Based color digital image blind watermarking method with variable steps. Multimed Tools Appl 79(41):30557–30581

    Article  Google Scholar 

  24. Zhao M, Dang Y (2008) Color image copyright protection digital watermarking algorithm based on DWT and DCT. In: 2008 4th International conference on wireless communications, networking and mobile computing. IEEE, pp 1–4

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Asma Batool.

Ethics declarations

Conflict of Interests

The authors declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shah, T., Batool, A. Triple byte nonlinear component of block cipher and its application in frequency domain watermarking. Multimed Tools Appl 82, 40937–40952 (2023). https://doi.org/10.1007/s11042-023-15125-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15125-2

Keywords

Navigation