Skip to main content
Log in

Watermarking technique for copyright protection of digital images using coupled differential equations

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Advancement and expansion of the internet, along with regular software upgrades, have generated many benefits in communication patterns. This rapid growth has also had a negative impact on the security of communicated content, such as images, audio/video messages, and especially on copyright protection for important images. In this paper, a novel watermarking technique is proposed to address the challenge of copyright protection more effectively. Initially, a chaotic dynamical system presented by coupled differential equations is utilized to generate three random, as well as chaotic, sequences of numbers. These sequences are then processed on each channel (red, green, and blue) of a colored image, respectively. Subsequently, the watermark (logo image) is embedded by converting its most significant bits (MSBs) to least significant bits (LSBs). The watermark in the processed image is nearly invisible due to the presence of third-order nonlinearity in the chaotic system and the complexity of the watermarking technique. This technique has demonstrated remarkable resistance to various attacks, such as noise attacks, compression attacks, and more specifically cropping attacks, confirming its applicability in copyright protection for digital images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data availability

The datasets generated during the current study are not publicly available due to privacy but are available from the corresponding author on reasonable request.

References

  1. Mukherjee DP, Maitra S, Acton ST (2004) Spatial domain digital watermarking of multimedia objects for buyer authentication. IEEE Trans Multimed 6(1):1–15

    Article  Google Scholar 

  2. Lin SD, Chen CF (2000) A robust DCT-based watermarking for copyright protection. IEEE Trans Consumer Electron 46:415–421

    Article  Google Scholar 

  3. Caronni G (1995) Assuring ownership rights for digital images. Proceedings of Reliable IT Systems, viewveg Publishing Company, Germany, pp 251–263

  4. Kang Y, Huang X, Shi J, Lin YQ (2003) A DWT DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans Circuits Syst Video Technol 13(8):776–786

    Article  Google Scholar 

  5. Batool SI, Shah T (2014) A color image watermarking scheme based on affine transformation and S4 permutation. Neural Comput Appl 25:2037–2045. https://doi.org/10.1007/s00521-014-1691-0

    Article  Google Scholar 

  6. Giovanardi A, Mazzini G Frequency domain chaotic watermarking. The 2001 IEEE International Symposium on Circuits and Systems (ISCAS), 2, pp 521–524

  7. Jamal SS, Khan MU, Shah T (2016) A Watermarking technique with chaotic fractional S-Box Transformation. Wirel Personal Communictions 90(4). https://doi.org/10.1007/s11277-016-3436-0

  8. Chiu W, Tai Y, Hsue W (2017) Image watermarking based on discrete fractional fourier transforms with multiple parameters. 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), pp 2687–2693. https://doi.org/10.1109/FSKD.2017.8393202

  9. Chen B, Coatrieux G, Chen G, Sun X, Coatrieux JL, Shu H (2014) Full 4-D quaternion discrete fourier transform based watermarking for color images. Digit Signal Proc 28(1):106–119. https://doi.org/10.1016/j.dsp.2014.02.010

    Article  Google Scholar 

  10. Barnouti NH, Sabri ZS, Hameed KL (2018) Digital watermarking based on DWT (Discrete Wavelet transform) and DCT (Discrete Cosine Transform). Int J Eng Technol 7(4):4825–4829. https://doi.org/10.14419/ijet.v7i4.25085

    Article  Google Scholar 

  11. Li X, Wang X, Chen A, Xiao L (2017) A Simplified and Robust DCT-based Watermarking Algorithm. 2nd International. Conference on Multimedia and Image Processing. (ICMIP), 167–171. https://doi.org/10.1109/ICMIP.2017.18

  12. Su Q, Wang G, Zhang X, Lv G, Chen B (2018) A new algorithm of blind color image watermarking based on LU decomposition. Multidimensional Syst Signal Process 29:1055–1074. https://doi.org/10.1007/s11045-017-0487-7

    Article  MathSciNet  Google Scholar 

  13. Zhang X, Li Q, Wei Y (2012) An improved robust and adaptive watermarking algorithm based on DCT. J Appl Res Technol 10(3):405–415

    Article  Google Scholar 

  14. Hernández JR, Amado M, Pérez-González F (2000) DCT-domain watermarking techniques for still images: detector performance analysis and a new structure. IEEE Trans Image Process 9(1):55–68. https://doi.org/10.1109/83.817598

    Article  Google Scholar 

  15. Khan M, Shah T (2015) A copyright protection using watermarking scheme based on nonlinear permutation and its quality metrics. Neural Comput Appl 26:845–855. https://doi.org/10.1007/s00521-014-1747-1

    Article  Google Scholar 

  16. Kaur RK, Sidhu S (2016) Robust digital image watermarking for copyright protection with SVD-DWT-DCT and Kalman filtering. Int J Emerg Technol Eng Res (IJETER) 4(1):59–63

    Google Scholar 

  17. Wang D-H, Li D-M, Jun Y, Chen X F (2007) An Improved Chirp Typed Blind Watermarking Algorithm Based on Wavelet and Fractional Fourier Transform, 4th International Conference on Image and Graphics, Chengdu, China, 291–296. https://doi.org/10.1109/ICIG.2007.38

  18. Vasudev R (2016) A review on digital image watermarking and its techniques. J Image Graphics 4(2):150–153. https://doi.org/10.18178/joig.4.2

    Article  Google Scholar 

  19. Javeed A, Shah T, Ullah A (2020) Construction of non-linear component of block cipher by means of chaotic dynamical system and symmetric group. Wirel Personal Commun 112:467–480. https://doi.org/10.1007/s11277-020-07052-4

    Article  Google Scholar 

  20. Attaullah A, Javeed A, Shah T (2019) Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption. Multimed Tools Appl 78(22):31467–31484. https://doi.org/10.1007/s11042-019-07981-8

    Article  Google Scholar 

  21. Razaq A, Yousaf A, Shuaib U, Siddiqui N, Ullah A, Waheed A (2017) A novel construction of substitution box involving coset diagram and a bijective map. Secur Commun Netw. https://doi.org/10.1155/2017/5101934

    Article  Google Scholar 

  22. Ullah A, Jamal SS, Shah T (2018) A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dyn 91:359–370. https://doi.org/10.1007/s11071-017-3874-6

    Article  MathSciNet  Google Scholar 

  23. Rabinovich MI, Fabrikant AL (1979) Stochastic self-mudulation of waves in non-equilibrium media. Inst Appl Phys Acad Sci USSR 77:617–629

    Google Scholar 

  24. Danca MF, Kuznetsov N, Chen G (2017) Unusual dynamics and hidden attrackters of the Rabinovich-Fabrikant system. Nonlinear Dyn 88:791–805

    Article  Google Scholar 

  25. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image qualty assessment: from error visibilty to structural similarity. IEEE Trans Image Process 13(4):600–612. https://doi.org/10.1109/TIP.2003.819861

    Article  Google Scholar 

  26. Jamal SS, Shah T, Farwa S, Khan MU (2019) A new technique of frequency domain watermarking based on a local ring. Wireless Netw 25(4):1491–1503. https://doi.org/10.1007/s11276-017-1606-y

    Article  Google Scholar 

  27. Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Proc 6(12):1673–1687. https://doi.org/10.1109/83.650120

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Attaullah.

Ethics declarations

Conflict of interest

The authors declare that there is no conflict of interests regarding the publication of this paper.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Attaullah, Javeed, A., Shah, D. et al. Watermarking technique for copyright protection of digital images using coupled differential equations. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-19337-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11042-024-19337-y

Keywords

Navigation