Z-Transform Based Digital Image Watermarking Scheme with DWT and Chaos

  • N. Jayashree
  • R. S. Bhuvaneswaran
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 43)


Digital Image Watermarking has recently been used widely to address issues concerning authentication and copyright protection. Chaos is one of the promising techniques implemented in image watermarking schemes. In this paper, a new watermarking algorithm based on chaos along with discrete wavelet transform and z-transformation is proposed. The host image is decomposed into 3-level Discrete Wavelet Transform (DWT). The HH3 and HL3 sub-bands are then converted to z-domain using z-transformation (ZT). Arnold Cat Map (ACM), a chaotic map is applied to the watermark image and it is divided into two equal parts. The sub-bands HH3 and HL3 are chosen for embedding the watermark image. One part of the watermark is embedded in the z-transformed HH3 sub-band, and the other part is embedded in the z-transformed HL3 sub-band. The watermarked image is obtained by taking the inverse of the ZT and the inverse of DWT. The experimental results and the performance analysis show that the proposed method is efficient and can provide practical invisibility with additive robustness.


Digital watermarking Chaotic mapping Z-transform Arnold cat map Discrete wavelet transform 


  1. 1.
    Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6, 1673–1687 (1997)CrossRefGoogle Scholar
  2. 2.
    Barni, M., Bartolini, F., Cappellini, V., Piva, A.: A dct-domain system for robust image watermarking. Sig. Process. 66, 357–372 (1998)MATHCrossRefGoogle Scholar
  3. 3.
    Sifuzzaman, M., Islam, M.R., Ali, M.Z.: Application of wavelet transform and its advantages compared to Fourier transform. J. Phys. Sci. 13, 121–134 (2009)Google Scholar
  4. 4.
    Dawei, Z., Guanrong, C., Wenbo, L.: A chaos based robust wavelet domain watermarking algorithm. Chaos, Solitons Fractals 22(1), 47–54 (2004)MATHCrossRefGoogle Scholar
  5. 5.
    Yang, Q., Cai, Y.: A digital image watermarking algorithm based on discrete wavelet transform and discrete cosine transform. In: 2012 International Symposium on Information Technology in Medicine and EducationGoogle Scholar
  6. 6.
    Liu, B., Liu, N., Li, J.X., Liand, W.: Research of image encryption algorithm base on chaos theory. In: IEEE 6th International Forum on Strategic Technology (2011)Google Scholar
  7. 7.
    Wu, X., Guan, Z.H.: A novel digital watermark algorithm based on chaotic maps. Phys. Lett. A 365(5–6), 403–406 (2007)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Rabiner, L.R., Schafer, R.W., Rader, C.M.: The chirp z-transform algorithm and its applications. Bell Syst. Tech. J. 1249–1292 (1969)Google Scholar
  9. 9.
    Vinod, P., Pareek, N.K., Sud, K.K.: A new substitution-diffusion based image cipher using chaotic standard and logistic maps. Elsevier (2008)Google Scholar
  10. 10.
    Fei, C., Kwok-Wo, W., Xiaofeng, L., Tao, X.: Period distribution of the generalized discrete arnold cat map for N = 2e. IEEE Trans. Inform. Theory 59(5) (2013)Google Scholar
  11. 11.
    Pisarchik, A.N., Zanin, M.: Chaotic map cryptography and security. In: Encryption: Methods, Software and SecurityGoogle Scholar
  12. 12.
    Zhang, L., Liao, X., Wang, X.: An image encryption approach based on chaotic maps. Chaos, Solitons Fractals 24, 759–765 (2005)MATHMathSciNetCrossRefGoogle Scholar
  13. 13.
    Ho, A.T.S.,, Xunzhan, Z., Jun, S., Pina, M.: Fragile watermarking based on Encoding of the Zeros of the z-Transform. IEEE Trans. Inform. Forensics Secur. 3(3) (2008)Google Scholar
  14. 14.
    Ho, A.T.S., Xunzhan, Z., Jun, S.: Authentication of biomedical images based on zero location watermarking. In: 8th International Conference on Control, Automation, Robotics and Vision, Kunming, China (2004)Google Scholar
  15. 15.
    Vich, R.: Z-Transform theory and applications. D. Reidel Publishing Company, Dordrechi (1987)Google Scholar
  16. 16.
    Stillings, S.A.: A Study of the Chirp Z-Transform Algorithm and its Applications, Technical Report. Kansas State University (1972)Google Scholar
  17. 17.
    Kolchi, S., Masataka, K., Tomohisa, M.: Applications of image reconstruction by means of Chirp z-Transform. MVA’90, IAPR Workshop on Machine Vision Applications, Tokyo Nov. 28–30 1990Google Scholar
  18. 18.
    Khan, M.S., Boda, R., Vamshi Bhukaya, V.: A copyright protection scheme and tamper detection using z transform. Int. J. Comput. Electric. Adv. Commun. Eng. 1(1) (2012)Google Scholar
  19. 19.
    Mary, A., Erbug, Ç., Gholamreza, A.: A watermarking algorithm based on chirp z-transform, discrete wavelet transform, and singular value decomposition. SIViP. Springer-Verlag, London (2014). doi: 10.1007/s11760-014-0624-9
  20. 20.
    Mandal, J.K.: A frequency domain steganography using Z transform (FDSZT). In: International Workshop on Embedded Computing and Communication System (IWECC 2011), Rajagiri School of Engineering & Technology, Kochin 22–23 Dec. 2011Google Scholar
  21. 21.
    Cox, I.J., Matthew, L.M., Jeffrey, A.B., et al.: Digital watermarking and steganography, 2nd edn. Morgan Kaufmann Publishers (Elsevier), Burlington (2007)Google Scholar
  22. 22.
    Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)Google Scholar

Copyright information

© Springer India 2016

Authors and Affiliations

  1. 1.Ramanujan Computing CentreAnna UniversityChennaiIndia

Personalised recommendations