Skip to main content

Two Levels of Security for Protection of Images Copyright

  • Conference paper
  • First Online:
Inventive Communication and Computational Technologies

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 311))

  • 956 Accesses

Abstract

Due to illegal manipulation and image processing attacks, digital image copyright protection is receiving a significant research attention. This paper has introduced a blind invisible watermarking method to protect the copyright of digital color images. This method is based on the combination of digital transforms (DWT, DCT) in the frequency domain. The embedding process involved in this method is based on partitioning the host image into 16 × 16 non-overlap blocks, and the chaotic maps are used to generate random numbers in order to choose the appropriate blocks for the inclusion process involved in the purpose of increasing the security of proposed system. As for the extraction process, it is carried out in a way that does not require the presence of original image but rather follows the same embedding protocol to extract the embedded and encrypted watermark. To raise the security level, a hybrid encryption method has been proposed by using the chaotic map and DNA coding for encrypting the watermark before embedding it. Experimental results evident the good imperceptibility. In addition, the proposed method effectively resists common “image processing attacks.”

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. R. Sinhal, I.A. Ansari, “A multipurpose image watermarking scheme for digital image protection. Int. J. Syst. Assur. Eng. Manag. 11, 274–286 (2020). https://doi.org/10.1007/s13198-019-00855-0

    Article  Google Scholar 

  2. V. Suma, A Novel Information retrieval system for distributed cloud using hybrid deep fuzzy hashing algorithm. JITDW 2(03), 151–160 (2020)

    Article  Google Scholar 

  3. T. Vijayakumar, R. Vinothkanna, Retrieval of complex images using visual saliency guided cognitive classification. J. Innov. Image Process (JIIP) 2(02), 102–109 (2020)

    Article  Google Scholar 

  4. T. Sumanth, S. Vijay Harisudan, M.N. Tarun Kumar, K. Geetha, A new audio watermarking algorithm with DNA sequenced image embedded in spatial domain using pseudo-random locations, in 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), (Coimbatore, 2018), pp 1813–1817. doi: https://doi.org/10.1109/ICECA.2018.8474758.

  5. M.R. Khosravi, H. Rostami, S. Samadi, Enhancing the binary watermark-based data hiding scheme using an interpolation –based approach for optical remote sensing images. Int. J. Agric. Environ. Inf. Syst. 9(2) (2018)

    Google Scholar 

  6. P.A. Mendez, R. James, R James," An imperceptible blind image watermarking scheme for image authentication using DNA encoding and multi-resolution wavelet decomposition. Int. J. Eng. Inventions 4(12), 23–30 (2015)

    Google Scholar 

  7. R. Rmana, V.N.K.P. Munaga, D. Sreenivas Rao, Robust digital watermarking of color images under noise attacks. Int. J. Rec. Trends Eng. 1(1), 334

    Google Scholar 

  8. N.F. Mohammed, S.A. Ali, M.J. Jawad, Biometric-based medical watermarking system for verifying privacy and source authentication. Kuwait J. Sci. 47(3) (2020)

    Google Scholar 

  9. R. French-Baidoo, D. Asamoah, S.O. Oppong, Achieving confidentiality in electronic health records using cloud systems 1, 18–25 (2018). https://doi.org/10.5815/ijcnis.2018.01.03

  10. M. Moosazadeha, G. Ekbatanifard, An improved robust image watermarking method using DCT and YCoCg-R color space. Optik—Int. J. Light Electron Opt. 140, 975–988 (2017)

    Article  Google Scholar 

  11. A.J. Yousif, A discrete cosine transform based watermarking scheme for color image using YCBCR space, J. Eng. Sustain. Dev. 22(06) (2018). doi.org/https://doi.org/10.31272/jeasd.2018.6.1

  12. F.A. Rafrastara, A.V. Hadinata, D.R.I.M. Setiadi, E.H. Rachmawanto, C.A. Sari, Copyright Embedding Analysis in Color Image Channel based on Non-Blind DCT Method, in International Conference on Information and Communications Technology (ICOIACT) (2019), pp. 185–190. https://doi.org/10.1109/ICOIACT46704.2019.8938427

  13. M. Moosazadeh, G. Ekbatanifard, A new DCT-based robust image watermarking method using teaching-learning-Based optimizatio. J. Inf. Secur.Appl 47, 28–38 (2019). https://doi.org/10.1016/j.jisa.2019.04.001

    Article  Google Scholar 

  14. M. Li, X. Yuan, H. Chen, J. Li, Quaternion discrete fourier transform based color image watermarking method using quaternion QR decomposition. IEEE Access 8, 72308–72315 (2020). https://doi.org/10.1109/ACCESS.2020.2987914

    Article  Google Scholar 

  15. J. Wang, W.B. Wan, X.X. Li, J. De Sun, H.X. Zhang, Color image watermarking based on orientation diversity and color complexity. Expert Syst. Appl. 140 (2020). doi.org/https://doi.org/10.1016/j.eswa.2019.112868

  16. S.A. Kadhim, S.A. Ali, M.J. Jawad, Binary image encryption based on chaotic and DNA encoding. Lect. Notes Netw. Syst. 201

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hadi, S.A., Ali, S.A., Jawad, M.J. (2022). Two Levels of Security for Protection of Images Copyright. In: Ranganathan, G., Fernando, X., Shi, F. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 311. Springer, Singapore. https://doi.org/10.1007/978-981-16-5529-6_44

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-5529-6_44

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-5528-9

  • Online ISBN: 978-981-16-5529-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics