Skip to main content
Log in

A new watermarking scheme based on Daubechies wavelet and chaotic map for quick response code images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The world is evolving due to fast transmission of digital information in the forms of different digital contents over numerous online web applications. The transmission of information over social media is at its peak. The advanced means of different digital applications make our lives quite easy but it added more sensitivity to our digital information which can accessed through internet. In the advanced digital era, the protection of digital information and intellectual properties of any organizations is one of the vital problems in technologically advanced ages. To protect the illegal access and duplication of any digital information over insecure communication is fall in the copyright protection techniques. The digital watermarking which is one of the fundamental classes of information hiding techniques that can be used to protect the ownership of any digital contents. Generally, the digital contents cannot be altered in information hiding schemes but secret information is embedded in information carriers. The perception of this article is to design a new digital watermarking scheme which uses multi-layer of information security algorithms. We have utilized chaotic logistic map in order to generate a nonlinear component of block cipher and then applied the suggested substitution box (S-box) in order to encrypt a quick response code (QR-code). Moreover, our innovative suggested watermarking scheme uses Daubechies wavelet transform which is an efficient multi-determination frequency domain for the insertion of encrypted digital logo in the form of QR-codes. We have used different strength analysis which clearly authenticates the validity of our anticipated watermarking scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Ali KM, Khan M (2019) Application based construction and optimization of substitution boxes over 2D mixed chaotic maps. Int J Theor Phys 58(9):3091–3117

    Article  MathSciNet  Google Scholar 

  2. Ali KM, Khan M (2019) A new construction of confusion component of block ciphers. Multimed Tools Appl:1–20

  3. Arshad U, Batool SI, Amin M (2019) A novel image encryption scheme based on Walsh compressed quantum spinning chaotic Lorenz system. Int J Theor Phys:1–24

  4. Batool SI, Waseem HM (2019) A novel image encryption scheme based on Arnold scrambling and Lucas series. Multimed Tools Appl:1–27

  5. Batool SI, Khan M, Shah T (2014) A color image watermarking scheme based on affine transformation and S4 permutation. Neural Comput Appl 25:2037–2045

    Article  Google Scholar 

  6. Conners RW, Harlow CA (1980) A theoretical comparison of texture algorithms. IEEE Trans Pattern Anal Mach Intell 2:204–222

    Article  Google Scholar 

  7. Conners RW, Trivedi MM, Harlow CA (1984) Segmentation of a high-resolution urban scene using texture operators. Comput Vis Graph Image Process 25:273–310

    Article  Google Scholar 

  8. Firdousi F, Batool SI, Amin M (2019) A novel construction scheme for nonlinear component based on quantum map. Int J Theor Phys:1–28

  9. Geo M, Sun B (2012) Blinding watermark algorithm based on QR-code. Found Intell Syst Adv Intell Soft Comput 122:457–462

  10. Gunjal BL, Mali SN (2011) Secured color image watermarking technique in DWT-DCT domain. arXiv preprint arXiv:1109.2325

  11. Haralick RM, Shanmugam K (1973) Computer classification of reservoir sandstones. IEEE Trans Geo Eng 11:171–177

    Google Scholar 

  12. Haralick RM, Shanmugam K, Dinstein I (1973) Textural features for image classification. IEEE Trans Syst Man Cybern 3:610–621

    Article  Google Scholar 

  13. Hasija M, Jindal A (2011) Contrast of watermarking techniques in different domains. IJCSI, Int J Comput Sci Issues 8(3):559–563

  14. He DC, Wang L, Guibert J (1987) Texture feature extraction. Pattern Recogn Lett 6(4):269–273

    Article  Google Scholar 

  15. Iizulca M (1987) Quantitative evaluation of similar images with quasi-gray levels. Comput Vis Graph Image Process 38:342–360

    Article  Google Scholar 

  16. Javeed A, Shah T Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption. Multimed Tools 78(22):31467–31484

  17. Kaur M, Jindal S, Behal S (2012) A study of digital image watermarking. Int J Res Eng Appl Sci 2(2):226–236

    Google Scholar 

  18. Khan M, Asghar Z (2018) A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S 8 permutation. Neural Comput Appl 29(4):993–999

    Article  Google Scholar 

  19. Khan M, Masood F (2019) A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimed Tools 78(18):26203–26222

  20. Khan M, Munir N (2019) A novel image encryption technique based on generalized advanced encryption standard based on field of any characteristic. Wirel Pers Commun:1–19

  21. Khan M, Shah T (2014) A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dyn 76(1):377–382

    Article  MathSciNet  Google Scholar 

  22. Khan M, Shah T (2015) An efficient chaotic image encryption scheme. Neural Comput Appl 26(5):1137–1148

    Article  Google Scholar 

  23. Khan M, Shah T (2015) A copyright protection using watermarking scheme based on nonlinear permutation and its quality metrics. Neural Comput Appl 26(4):845–855

    Article  Google Scholar 

  24. Khan M, Waseem HM (2018) A novel image encryption scheme based on quantum dynamical spinning and rotations. PLoS One 13(11):e0206460

    Article  Google Scholar 

  25. Khan M, Waseem HM (2019) A novel digital contents privacy scheme based on Kramer’s arbitrary spin. Int J Theor Phys:1–24

  26. Khan M, Shah T, Mahmood H, Gondal (2013) An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dyn 71:493–504

    Article  MathSciNet  Google Scholar 

  27. Khan M, Shah T, Gondal MA (2013) An efficient technique for the construction of substitution box with chaotic partial differential equation. Nonlinear Dyn 73:1795–1801

    Article  MathSciNet  Google Scholar 

  28. Khan M, Shah T, Batool SI (2015) Texture analysis of chaotic coupled map lattices based image encryption algorithm. 3D Res 15(3):1–5

    Google Scholar 

  29. Khan M, Shah T, Batool SI (2016) A new implementation of chaotic S-boxes in CAPTCHA. SIViP 10(2):293–300

    Article  Google Scholar 

  30. Khan M, Shah T, Batool SI (2017) A new approach for image encryption and watermarking based on substitution box over the classes of chain rings. Multimed Tools Appl 76(22):24027–24062

    Article  Google Scholar 

  31. Kim C, Shin D, Leng L, Yang CN (2018) Lossless data hiding for absolute moment block truncation coding using histogram modification. J Real-Time Image Proc 14(1):101–114

    Article  Google Scholar 

  32. Kim C, Shin D, Leng L, Yang CN (2018) Separable reversible data hiding in encrypted halftone image. Displays 55:71–79

    Article  Google Scholar 

  33. Lee HC, Dong CR, Lin TM (2013) Digital watermarking based on JND model and QR code features. In: Advances in intelligent systems and applications, vol 2. Springer, Berlin, pp 141–148

    Google Scholar 

  34. Leng L, Zhang J (2013) Palmhash code vs. palmphasor code. Neurocomputing 108:1–12

    Article  Google Scholar 

  35. Leng L, Zhang J, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: a novel approach for face and palmprint recognition in DCT domain. Int J Phys Sci 5(17):2543–2554

    Google Scholar 

  36. Leng L, Zhang J, Xu J, Khan MK, Alghathbar K (2010) Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition. In: 2010 international conference on information and communication technology convergence (ICTC). IEEE, pp 467–471

  37. Leng L, Teoh ABJ, Li M, Khan MK (2014) Analysis of correlation of 2DPalmHash code and orientation range suitable for transposition. Neurocomputing 131:377–387

    Article  Google Scholar 

  38. Leng L, Teoh ABJ, Li M, Khan MK (2015) Orientation range of transposition for vertical correlation suppression of 2DPalmPhasor code. Multimed Tools Appl 74(24):11683–11701

  39. Madane AR, Talele KT, Shah MM (2008) Watermark logo in digital image using DWT. In: Proceedings of SPIT-IEEE colloquium and international conference, Mumbai, 1, pp 121–127

  40. Munir N, Khan M (2018) A generalization of algebraic expression for nonlinear component of symmetric key algorithms of any characteristic p. In: 2018 international conference on applied and engineering mathematics (ICAEM). IEEE, pp 48–52

  41. Naseer Y, Shah T, Shah D, Hussain S (2019) A novel algorithm of constructing highly nonlinear S-p-boxes. Cryptography 3(1):6. https://doi.org/10.3390/cryptography3010006

    Article  Google Scholar 

  42. Naseer Y, Shah D, Shah T (2019) A novel approach to improve multimedia security utilizing 3D mixed chaotic map. Microprocess Microsyst 65:1–6

    Article  Google Scholar 

  43. Shah T, Shah D (2019) Construction of highly nonlinear S-boxes for degree 8 primitive irreducible polynomials over ℤ2. Multimed Tools Appl 78(2):1219–1234

    Article  Google Scholar 

  44. Shah D, ul Haq T, Shah T (2018) Image encryption based on action of projective general linear group on a Galois field GF (2 8). In: 2018 international conference on applied and engineering mathematics (ICAEM). IEEE, pp 38–41

  45. Shaikh H, Khan MI, Kelkar Y (2012) A robust DWT digital image watermarking technique basis on scaling factor. Int J Comput Sci Eng Appl 2(4):63

    Google Scholar 

  46. Si M, Si J (2007) Research on embedding and extracting methods for digital watermarks applied to QR-code images. N Z J Agric Res 50:861–867

    Article  Google Scholar 

  47. Siew LH, Hodgson RM, Wood EJ (1988) Texture measures for carpet wear assessment. IEEE Trans Pattern Anal Mach Intell 10(1):92–105

    Article  Google Scholar 

  48. Song W, Hou JJ, Li ZH, Huang L (2011) Chaotic system and QR factorization based robust digital image watermarking algorithm. J Cent S Univ Technol 18(1):116–124

    Article  Google Scholar 

  49. Travedi MM, Haralick RM, Conners RW, Goh S (1984) Object detection based on gray level co-occurrence. Comput Vis Graph Image Process 28:199–219

    Article  Google Scholar 

  50. Ullah A, Javeed A, Shah T (2019) A scheme based on algebraic and chaotic structures for the construction of substitution box. Multimed Tools Appl:1–18

  51. Waseem HM, Khan M (2018) Information confidentiality using quantum spinning, rotation and finite state machine. Int J Theor Phys 57:3584. https://doi.org/10.1007/s10773-018-3872-6

    Article  MATH  Google Scholar 

  52. Waseem HM, Khan M (2019) A new approach to digital content privacy using quantum spin and finite-state machine. Appl Phys B 125(2):27

    Article  MathSciNet  Google Scholar 

  53. Waseem HM, Khan M, Shah T (2018) Image privacy scheme using quantum spinning and rotation. J Electron Imaging 27(6):063022

    Article  Google Scholar 

  54. Weszka JS, Dyer CR, Rosenfeld A (1976) A comparative study of texture measures for terrain classification. IEEE Trans Syst Man Cybern 6(4):269–285

    Article  Google Scholar 

  55. Wu CM, Chen YC (1992) Statistical feature matrix for texture analysis. CVGIP: Graph Models Image Process 54(5):407–419

    Google Scholar 

  56. Younas I, Khan M (2018) A new efficient digital image encryption based on inverse left almost semi group and Lorenz chaotic system. Entropy 20(12):913

    Article  Google Scholar 

  57. Zhang J, Liu L (2017) Publicly verifiable watermarking for intellectual property protection in FPGA design. IEEE Trans Very Large Scale Integr (VLSI) Syst 25(4):1520–1527

    Article  Google Scholar 

  58. Zhang J, Lin Y, Wu Q, Che W (2012) Watermarking FPGA Bitfile for intellectual property protection. Radioengineering 21(2):764–771

    Google Scholar 

  59. Zhang J, Lin Y, Lyu Y, Qu G (2015) A PUF-FSM binding scheme for FPGA IP protection and pay-per-device licensing. IEEE Trans Inf Forensics Secur 10(6):1137–1150

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Majid Khan.

Ethics declarations

Funding information

There is no funding to publish this research work.

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Waqas, U.A., Khan, M. & Batool, S.I. A new watermarking scheme based on Daubechies wavelet and chaotic map for quick response code images. Multimed Tools Appl 79, 6891–6914 (2020). https://doi.org/10.1007/s11042-019-08570-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08570-5

Keywords

Navigation