Abstract
The world is evolving due to fast transmission of digital information in the forms of different digital contents over numerous online web applications. The transmission of information over social media is at its peak. The advanced means of different digital applications make our lives quite easy but it added more sensitivity to our digital information which can accessed through internet. In the advanced digital era, the protection of digital information and intellectual properties of any organizations is one of the vital problems in technologically advanced ages. To protect the illegal access and duplication of any digital information over insecure communication is fall in the copyright protection techniques. The digital watermarking which is one of the fundamental classes of information hiding techniques that can be used to protect the ownership of any digital contents. Generally, the digital contents cannot be altered in information hiding schemes but secret information is embedded in information carriers. The perception of this article is to design a new digital watermarking scheme which uses multi-layer of information security algorithms. We have utilized chaotic logistic map in order to generate a nonlinear component of block cipher and then applied the suggested substitution box (S-box) in order to encrypt a quick response code (QR-code). Moreover, our innovative suggested watermarking scheme uses Daubechies wavelet transform which is an efficient multi-determination frequency domain for the insertion of encrypted digital logo in the form of QR-codes. We have used different strength analysis which clearly authenticates the validity of our anticipated watermarking scheme.
Similar content being viewed by others
References
Ali KM, Khan M (2019) Application based construction and optimization of substitution boxes over 2D mixed chaotic maps. Int J Theor Phys 58(9):3091–3117
Ali KM, Khan M (2019) A new construction of confusion component of block ciphers. Multimed Tools Appl:1–20
Arshad U, Batool SI, Amin M (2019) A novel image encryption scheme based on Walsh compressed quantum spinning chaotic Lorenz system. Int J Theor Phys:1–24
Batool SI, Waseem HM (2019) A novel image encryption scheme based on Arnold scrambling and Lucas series. Multimed Tools Appl:1–27
Batool SI, Khan M, Shah T (2014) A color image watermarking scheme based on affine transformation and S4 permutation. Neural Comput Appl 25:2037–2045
Conners RW, Harlow CA (1980) A theoretical comparison of texture algorithms. IEEE Trans Pattern Anal Mach Intell 2:204–222
Conners RW, Trivedi MM, Harlow CA (1984) Segmentation of a high-resolution urban scene using texture operators. Comput Vis Graph Image Process 25:273–310
Firdousi F, Batool SI, Amin M (2019) A novel construction scheme for nonlinear component based on quantum map. Int J Theor Phys:1–28
Geo M, Sun B (2012) Blinding watermark algorithm based on QR-code. Found Intell Syst Adv Intell Soft Comput 122:457–462
Gunjal BL, Mali SN (2011) Secured color image watermarking technique in DWT-DCT domain. arXiv preprint arXiv:1109.2325
Haralick RM, Shanmugam K (1973) Computer classification of reservoir sandstones. IEEE Trans Geo Eng 11:171–177
Haralick RM, Shanmugam K, Dinstein I (1973) Textural features for image classification. IEEE Trans Syst Man Cybern 3:610–621
Hasija M, Jindal A (2011) Contrast of watermarking techniques in different domains. IJCSI, Int J Comput Sci Issues 8(3):559–563
He DC, Wang L, Guibert J (1987) Texture feature extraction. Pattern Recogn Lett 6(4):269–273
Iizulca M (1987) Quantitative evaluation of similar images with quasi-gray levels. Comput Vis Graph Image Process 38:342–360
Javeed A, Shah T Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption. Multimed Tools 78(22):31467–31484
Kaur M, Jindal S, Behal S (2012) A study of digital image watermarking. Int J Res Eng Appl Sci 2(2):226–236
Khan M, Asghar Z (2018) A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S 8 permutation. Neural Comput Appl 29(4):993–999
Khan M, Masood F (2019) A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimed Tools 78(18):26203–26222
Khan M, Munir N (2019) A novel image encryption technique based on generalized advanced encryption standard based on field of any characteristic. Wirel Pers Commun:1–19
Khan M, Shah T (2014) A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dyn 76(1):377–382
Khan M, Shah T (2015) An efficient chaotic image encryption scheme. Neural Comput Appl 26(5):1137–1148
Khan M, Shah T (2015) A copyright protection using watermarking scheme based on nonlinear permutation and its quality metrics. Neural Comput Appl 26(4):845–855
Khan M, Waseem HM (2018) A novel image encryption scheme based on quantum dynamical spinning and rotations. PLoS One 13(11):e0206460
Khan M, Waseem HM (2019) A novel digital contents privacy scheme based on Kramer’s arbitrary spin. Int J Theor Phys:1–24
Khan M, Shah T, Mahmood H, Gondal (2013) An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dyn 71:493–504
Khan M, Shah T, Gondal MA (2013) An efficient technique for the construction of substitution box with chaotic partial differential equation. Nonlinear Dyn 73:1795–1801
Khan M, Shah T, Batool SI (2015) Texture analysis of chaotic coupled map lattices based image encryption algorithm. 3D Res 15(3):1–5
Khan M, Shah T, Batool SI (2016) A new implementation of chaotic S-boxes in CAPTCHA. SIViP 10(2):293–300
Khan M, Shah T, Batool SI (2017) A new approach for image encryption and watermarking based on substitution box over the classes of chain rings. Multimed Tools Appl 76(22):24027–24062
Kim C, Shin D, Leng L, Yang CN (2018) Lossless data hiding for absolute moment block truncation coding using histogram modification. J Real-Time Image Proc 14(1):101–114
Kim C, Shin D, Leng L, Yang CN (2018) Separable reversible data hiding in encrypted halftone image. Displays 55:71–79
Lee HC, Dong CR, Lin TM (2013) Digital watermarking based on JND model and QR code features. In: Advances in intelligent systems and applications, vol 2. Springer, Berlin, pp 141–148
Leng L, Zhang J (2013) Palmhash code vs. palmphasor code. Neurocomputing 108:1–12
Leng L, Zhang J, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: a novel approach for face and palmprint recognition in DCT domain. Int J Phys Sci 5(17):2543–2554
Leng L, Zhang J, Xu J, Khan MK, Alghathbar K (2010) Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition. In: 2010 international conference on information and communication technology convergence (ICTC). IEEE, pp 467–471
Leng L, Teoh ABJ, Li M, Khan MK (2014) Analysis of correlation of 2DPalmHash code and orientation range suitable for transposition. Neurocomputing 131:377–387
Leng L, Teoh ABJ, Li M, Khan MK (2015) Orientation range of transposition for vertical correlation suppression of 2DPalmPhasor code. Multimed Tools Appl 74(24):11683–11701
Madane AR, Talele KT, Shah MM (2008) Watermark logo in digital image using DWT. In: Proceedings of SPIT-IEEE colloquium and international conference, Mumbai, 1, pp 121–127
Munir N, Khan M (2018) A generalization of algebraic expression for nonlinear component of symmetric key algorithms of any characteristic p. In: 2018 international conference on applied and engineering mathematics (ICAEM). IEEE, pp 48–52
Naseer Y, Shah T, Shah D, Hussain S (2019) A novel algorithm of constructing highly nonlinear S-p-boxes. Cryptography 3(1):6. https://doi.org/10.3390/cryptography3010006
Naseer Y, Shah D, Shah T (2019) A novel approach to improve multimedia security utilizing 3D mixed chaotic map. Microprocess Microsyst 65:1–6
Shah T, Shah D (2019) Construction of highly nonlinear S-boxes for degree 8 primitive irreducible polynomials over ℤ2. Multimed Tools Appl 78(2):1219–1234
Shah D, ul Haq T, Shah T (2018) Image encryption based on action of projective general linear group on a Galois field GF (2 8). In: 2018 international conference on applied and engineering mathematics (ICAEM). IEEE, pp 38–41
Shaikh H, Khan MI, Kelkar Y (2012) A robust DWT digital image watermarking technique basis on scaling factor. Int J Comput Sci Eng Appl 2(4):63
Si M, Si J (2007) Research on embedding and extracting methods for digital watermarks applied to QR-code images. N Z J Agric Res 50:861–867
Siew LH, Hodgson RM, Wood EJ (1988) Texture measures for carpet wear assessment. IEEE Trans Pattern Anal Mach Intell 10(1):92–105
Song W, Hou JJ, Li ZH, Huang L (2011) Chaotic system and QR factorization based robust digital image watermarking algorithm. J Cent S Univ Technol 18(1):116–124
Travedi MM, Haralick RM, Conners RW, Goh S (1984) Object detection based on gray level co-occurrence. Comput Vis Graph Image Process 28:199–219
Ullah A, Javeed A, Shah T (2019) A scheme based on algebraic and chaotic structures for the construction of substitution box. Multimed Tools Appl:1–18
Waseem HM, Khan M (2018) Information confidentiality using quantum spinning, rotation and finite state machine. Int J Theor Phys 57:3584. https://doi.org/10.1007/s10773-018-3872-6
Waseem HM, Khan M (2019) A new approach to digital content privacy using quantum spin and finite-state machine. Appl Phys B 125(2):27
Waseem HM, Khan M, Shah T (2018) Image privacy scheme using quantum spinning and rotation. J Electron Imaging 27(6):063022
Weszka JS, Dyer CR, Rosenfeld A (1976) A comparative study of texture measures for terrain classification. IEEE Trans Syst Man Cybern 6(4):269–285
Wu CM, Chen YC (1992) Statistical feature matrix for texture analysis. CVGIP: Graph Models Image Process 54(5):407–419
Younas I, Khan M (2018) A new efficient digital image encryption based on inverse left almost semi group and Lorenz chaotic system. Entropy 20(12):913
Zhang J, Liu L (2017) Publicly verifiable watermarking for intellectual property protection in FPGA design. IEEE Trans Very Large Scale Integr (VLSI) Syst 25(4):1520–1527
Zhang J, Lin Y, Wu Q, Che W (2012) Watermarking FPGA Bitfile for intellectual property protection. Radioengineering 21(2):764–771
Zhang J, Lin Y, Lyu Y, Qu G (2015) A PUF-FSM binding scheme for FPGA IP protection and pay-per-device licensing. IEEE Trans Inf Forensics Secur 10(6):1137–1150
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Funding information
There is no funding to publish this research work.
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Waqas, U.A., Khan, M. & Batool, S.I. A new watermarking scheme based on Daubechies wavelet and chaotic map for quick response code images. Multimed Tools Appl 79, 6891–6914 (2020). https://doi.org/10.1007/s11042-019-08570-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-08570-5