Construction of S-box based on chaotic piecewise map: Watermark application

被引:8
作者
Sani, R. Hoseini [1 ]
Behnia, S. [1 ]
Ziaei, J. [1 ]
机构
[1] Urmia Univ Technol, Dept Phys, Orumiyeh, Iran
基金
美国国家科学基金会;
关键词
Watermarking; S-box; Finite ridglet transform; Piecewise non-linear chaotic maps; FRAGILE WATERMARKING; DIGITAL WATERMARKING; ENCRYPTION; SCHEME; ROBUST; TRANSFORM; ALGORITHM; BLIND; CRYPTOGRAPHY; WAVELET;
D O I
10.1007/s11042-022-13278-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The spread of using communication technologies has made it necessary to take certain measures to prevent illegal copying. Watermarking techniques are of great potential value in this regard. The present study introduces a watermarking scheme as a block cypher. We use entropy for sorting the blocks. The sorted blocks after finite ridgelet transformation are hosting the logo. The logo's information encrypts before transferring into the blocks by the proposed S-box. We introduce a piecewise non-linear chaotic map for generating the S-box. The ergodic nature of introducing a map is proved by the invariant measure. The ergodic nature of the map is providing an excellent confusion property for encryption. The ability of the watermarked image to resist the attacks is an exam with statistical analysis(PSNR and MSE). The performance of generated S-box is studying with corresponding attacks (Non-linearity, SAC, BIC, LP, and DP). The results are close to the optimal value.
引用
收藏
页码:1131 / 1148
页数:18
相关论文
共 70 条
[1]   PSEUDO RANDOM NUMBER GENERATOR BASED ON SYNCHRONIZED CHAOTIC MAPS [J].
Akhshani, Afshin ;
Behnia, Sohrab ;
Akhavan, Amir ;
Lim, Siew-Choo ;
Hassan, Zainuriah .
INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2010, 21 (02) :275-290
[2]   A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes [J].
Al Solami, Eesa ;
Ahmad, Musheer ;
Volos, Christos ;
Doja, Mohammad Najam ;
Beg, Mirza Mohd Sufyan .
ENTROPY, 2018, 20 (07)
[3]  
Al-Haj Ali, 2007, Journal of Computer Sciences, V3, P740, DOI 10.3844/jcssp.2007.740.746
[4]   An improved DWT-SVD domain watermarking for medical information security [J].
Anand, Ashima ;
Singh, Amit Kumar .
COMPUTER COMMUNICATIONS, 2020, 152 :72-80
[5]   A Technique for Designing Substitution Box Based on Van der Pol Oscillator [J].
Anees, Amir ;
Ahmed, Zeeshan .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (03) :1497-1503
[6]  
[Anonymous], 2012, INT J NETW SECUR
[7]   Neural network-based adaptive multiuser detection schemes in SDMA-OFDM system for wireless application [J].
Bagadi, Kala Praveen ;
Das, Susmita .
NEURAL COMPUTING & APPLICATIONS, 2013, 23 (3-4) :1071-1082
[8]   A DCT-domain system for robust image watermarking [J].
Barni, M ;
Bartolini, F ;
Cappellini, V ;
Piva, A .
SIGNAL PROCESSING, 1998, 66 (03) :357-372
[9]   A color image watermarking scheme based on affine transformation and S 4 permutation [J].
Batool, Syeda Iram ;
Shah, Tariq ;
Khan, Majid .
NEURAL COMPUTING & APPLICATIONS, 2014, 25 (7-8) :2037-2045
[10]   A novel algorithm for image encryption based on mixture of chaotic maps [J].
Behnia, S. ;
Akhshani, A. ;
Mahmodi, H. ;
Akhavan, A. .
CHAOS SOLITONS & FRACTALS, 2008, 35 (02) :408-419