The Secure Watermarking Of Digital Color Images By Using A Combination Of Chaotic Mapping
[Full Text]
AUTHOR(S)
Arezoo Nouri Heydarlo, Amin Babazadeh Sangar, Sajjad Aghania
KEYWORDS
Watermarking, chaos mapping, digital images, Logistics.
ABSTRACT
With the development of computer networks and data editing programs, the possibility of transferring or investigating digital data identity has encountered some difficulties. In this paper, some information is placed within images by using watermarking to verify the identity of images that will be destroyed by editing any of this information. Additionally, the slightest change watermarking methods that use chaotic maps are provided to enhance the sensitivity of these data. Then, a new method is proposed to insert one or two logo in a cover image and finally the necessary tests will apply on images. The proposed test and comparing the proposed approach with other methods show the high sensitivity and successful application of this method in images.
REFERENCES
[1]. Lei, B., Tan, E.-L., Chen, S., Ni, D., Wang, T., & Lei, H. (2014). Reversible watermarking scheme for medical image based on differential evolution. Expert Systems with Applications, 41(7), 3178-3188.
[2]. Bansal, N., Deolia, V. K., Bansal, A., & Pathak, P. (2014). Digital Image Watermarking Using Least Significant Bit Technique in Different Bit Positions. Paper presented at the Computational Intelligence and Communication Networks (CICN), 2014 International Conference on.
[3]. Moniruzzaman, M., Hawlader, M. A. K., & Hossain, M. F. (2014, May). An image fragile watermarking scheme based on chaotic system for image tamper detection. In Informatics, Electronics & Vision (ICIEV), 2014 International Conference on (pp. 1-6). IEEE.
[4]. Munir, R. (2015, May). A chaos-based fragile watermarking method in spatial domain for image authentication. In Intelligent Technology and Its Applications (ISITIA), 2015 International Seminar on (pp. 227-232). IEEE.
[5]. Tong, X., Liu, Y., Zhang, M., & Chen, Y. (2013). A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Processing: Image Communication, 28(3), 301-308.
[6]. Gao, G. (2013). Composite chaos-based lossless image authentication and tamper localization. Multimedia tools and applications, 63(3), 947-964.
[7]. May, R. M. (1976). Simple mathematical models with very complicated dynamics. Nature, 261(5560), 459-467.
[8]. Peitgen, H.-O., Richter, P. H., & Schultens, H. (1986). The beauty of fractals: images of complex dynamical systems: Springer-Verlag Berlin.
[9]. Caragata, D., El Assad, S., & Luduena, M. (2015). An improved fragile watermarking algorithm for JPEG images. AEU-International Journal of Electronics and Communications, 69(12), 1783-1794.
[10]. Teng, L., Wang, X., & Wang, X. (2013). Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme. AEU-International Journal of Electronics and Communications, 67(6), 540-547.
[11]. Xiao, D., & Shih, F. Y. (2012). An improved hierarchical fragile watermarking scheme using chaotic sequence sorting and subblock post-processing. Optics Communications, 285(10), 2596-2606.
[12]. Chang, C.-C., Chen, K.-N., Lee, C.-F., & Liu, L.-J. (2011). A secure fragile watermarking scheme based on chaos-and-hamming code. Journal of Systems and Software, 84(9), 1462-1470.
[13]. Wu, X., & Guan, Z.-H. (2007). A novel digital watermark algorithm based on chaotic maps. Physics Letters A, 365(5), 403-406.
|