Abstract
Due to illegal manipulation and image processing attacks, digital image copyright protection is receiving a significant research attention. This paper has introduced a blind invisible watermarking method to protect the copyright of digital color images. This method is based on the combination of digital transforms (DWT, DCT) in the frequency domain. The embedding process involved in this method is based on partitioning the host image into 16 × 16 non-overlap blocks, and the chaotic maps are used to generate random numbers in order to choose the appropriate blocks for the inclusion process involved in the purpose of increasing the security of proposed system. As for the extraction process, it is carried out in a way that does not require the presence of original image but rather follows the same embedding protocol to extract the embedded and encrypted watermark. To raise the security level, a hybrid encryption method has been proposed by using the chaotic map and DNA coding for encrypting the watermark before embedding it. Experimental results evident the good imperceptibility. In addition, the proposed method effectively resists common “image processing attacks.”
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
R. Sinhal, I.A. Ansari, “A multipurpose image watermarking scheme for digital image protection. Int. J. Syst. Assur. Eng. Manag. 11, 274–286 (2020). https://doi.org/10.1007/s13198-019-00855-0
V. Suma, A Novel Information retrieval system for distributed cloud using hybrid deep fuzzy hashing algorithm. JITDW 2(03), 151–160 (2020)
T. Vijayakumar, R. Vinothkanna, Retrieval of complex images using visual saliency guided cognitive classification. J. Innov. Image Process (JIIP) 2(02), 102–109 (2020)
T. Sumanth, S. Vijay Harisudan, M.N. Tarun Kumar, K. Geetha, A new audio watermarking algorithm with DNA sequenced image embedded in spatial domain using pseudo-random locations, in 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), (Coimbatore, 2018), pp 1813–1817. doi: https://doi.org/10.1109/ICECA.2018.8474758.
M.R. Khosravi, H. Rostami, S. Samadi, Enhancing the binary watermark-based data hiding scheme using an interpolation –based approach for optical remote sensing images. Int. J. Agric. Environ. Inf. Syst. 9(2) (2018)
P.A. Mendez, R. James, R James," An imperceptible blind image watermarking scheme for image authentication using DNA encoding and multi-resolution wavelet decomposition. Int. J. Eng. Inventions 4(12), 23–30 (2015)
R. Rmana, V.N.K.P. Munaga, D. Sreenivas Rao, Robust digital watermarking of color images under noise attacks. Int. J. Rec. Trends Eng. 1(1), 334
N.F. Mohammed, S.A. Ali, M.J. Jawad, Biometric-based medical watermarking system for verifying privacy and source authentication. Kuwait J. Sci. 47(3) (2020)
R. French-Baidoo, D. Asamoah, S.O. Oppong, Achieving confidentiality in electronic health records using cloud systems 1, 18–25 (2018). https://doi.org/10.5815/ijcnis.2018.01.03
M. Moosazadeha, G. Ekbatanifard, An improved robust image watermarking method using DCT and YCoCg-R color space. Optik—Int. J. Light Electron Opt. 140, 975–988 (2017)
A.J. Yousif, A discrete cosine transform based watermarking scheme for color image using YCBCR space, J. Eng. Sustain. Dev. 22(06) (2018). doi.org/https://doi.org/10.31272/jeasd.2018.6.1
F.A. Rafrastara, A.V. Hadinata, D.R.I.M. Setiadi, E.H. Rachmawanto, C.A. Sari, Copyright Embedding Analysis in Color Image Channel based on Non-Blind DCT Method, in International Conference on Information and Communications Technology (ICOIACT) (2019), pp. 185–190. https://doi.org/10.1109/ICOIACT46704.2019.8938427
M. Moosazadeh, G. Ekbatanifard, A new DCT-based robust image watermarking method using teaching-learning-Based optimizatio. J. Inf. Secur.Appl 47, 28–38 (2019). https://doi.org/10.1016/j.jisa.2019.04.001
M. Li, X. Yuan, H. Chen, J. Li, Quaternion discrete fourier transform based color image watermarking method using quaternion QR decomposition. IEEE Access 8, 72308–72315 (2020). https://doi.org/10.1109/ACCESS.2020.2987914
J. Wang, W.B. Wan, X.X. Li, J. De Sun, H.X. Zhang, Color image watermarking based on orientation diversity and color complexity. Expert Syst. Appl. 140 (2020). doi.org/https://doi.org/10.1016/j.eswa.2019.112868
S.A. Kadhim, S.A. Ali, M.J. Jawad, Binary image encryption based on chaotic and DNA encoding. Lect. Notes Netw. Syst. 201
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Hadi, S.A., Ali, S.A., Jawad, M.J. (2022). Two Levels of Security for Protection of Images Copyright. In: Ranganathan, G., Fernando, X., Shi, F. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 311. Springer, Singapore. https://doi.org/10.1007/978-981-16-5529-6_44
Download citation
DOI: https://doi.org/10.1007/978-981-16-5529-6_44
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-5528-9
Online ISBN: 978-981-16-5529-6
eBook Packages: EngineeringEngineering (R0)