Enabling secure image transmission in unmanned aerial vehicle using digital image watermarking with H-Grey optimization

被引:16
作者
Devi, K. Jyothsna [1 ]
Singh, Priyanka [1 ]
Bilal, Muhammad [2 ,3 ]
Nayyar, Anand [4 ]
机构
[1] SRM Univ AP, Guntur 522240, India
[2] Univ Lancaster, Sch Comp & Commun, Lancaster LA1 4WA, England
[3] Hankuk Univ Foreign Studies, Dept Comp Engn, Yongin 17035, South Korea
[4] Duy Tan Univ, Fac Informat Technol, Grad Sch, Da Nang 550000, Vietnam
关键词
DWT-SVD; HSO; GWO; H-Grey; Digital Image Watermarking; Symmetric cryptography; Hybrid optimization; WAVELET TRANSFORM; SVD; ALGORITHM; SCHEME;
D O I
10.1016/j.eswa.2023.121190
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Drone technology, also known as Unmanned Aerial Vehicles (UAVs), has advanced rapidly in the last decade owing to the huge number of users. This approach has an immense opportunity in areas like healthcare, agriculture, and forestry. However, the transmission of digital images via drone technology is associated with vulnerabilities and risks, due to a lack of efficient security solutions. Digital Image Watermarking (DIW) has emerged as a viable solution for digital image transmission in UAV applications. However, achieving robustness, security, and imperceptibility in a watermarking system at the same time is a difficult task. To address the aforementioned concerns, this paper proposes a secure digital image watermarking scheme in the hybrid DWT-SVD domain. The scaling factor is chosen adaptively from the hybrid Harmony-Grey Wolf (H-Grey) optimization algorithm to maintain a balance between imperceptibility and robustness. In addition, a novel symmetric cryptographic-based four-level encryption approach PSMD (Partitioning, Substituting, Merging, Division) is proposed to address UAV image security concerns by using Fibonacci and prime number series to generate two random keys. The proposed encryption scheme provides high security at low computational cost. The experimental results show that the visual quality and robustness are both high (Avg. PSNR = 41.27 dB and Avg. SSIM = 0.99, NC = 0.99, and BER = 0.0008 calculated for 100 images). The subjective and objective experimental analysis indicates that the proposed encryption scheme is highly secure and the computational cost is also low. The average embedding and extraction time is 0.25 s and 0.09 s It is resistant to various image processing attacks. A comparison with some of the most recent popular schemes confirms the scheme's effectiveness. The presented DIW can be used for copyright protection, UAV image transmission applications, military applications, and other purposes.
引用
收藏
页数:18
相关论文
共 55 条
[1]   An imperceptible spatial domain color image watermarking scheme [J].
Abraham, Jobin ;
Paul, Varghese .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2019, 31 (01) :125-133
[2]   A New Image Encryption Algorithm Based on DNA State Machine for UAV Data Encryption [J].
Alawida, Moatsum ;
Teh, Je Sen ;
Alshoura, Wafa' Hamdan .
DRONES, 2023, 7 (01)
[3]   A robust image watermarking technique using SVD and differential evolution in DCT domain [J].
Ali, Musrrat ;
Ahn, Chang Wook ;
Pant, Millie .
OPTIK, 2014, 125 (01) :428-434
[4]   Hybrid SVD-Based Image Watermarking Schemes: A Review [J].
Alshoura, Wafa' Hamdan ;
Zainol, Zurinahni ;
Teh, Je Sen ;
Alawida, Moatsum ;
Alabdulatif, Abdulatif .
IEEE ACCESS, 2021, 9 :32931-32968
[6]   Hybrid Nature-Inspired Optimization and Encryption-Based Watermarking for E-Healthcare [J].
Anand, Ashima ;
Singh, Amit Kumar .
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2023, 10 (04) :2033-2040
[7]   Adaptive scaling factors based on the impact of selected DCT coefficients for image watermarking [J].
Ariatmanto, Dhani ;
Ernawan, Ferda .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (03) :605-614
[8]   LWT-DCT-SVD and DWT-DCT-SVD based watermarking schemes with their performance enhancement using Jaya and Particle swarm optimization and comparison of results under various attacks [J].
Awasthi, Divyanshu ;
Srivastava, Vinay Kumar .
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (18) :25075-25099
[9]   Image encryption using a combination of Grain-128a algorithm and Zaslavsky chaotic map [J].
Balaska, Nawel ;
Ahmida, Zahir ;
Belmeguenai, Aissa ;
Boumerdassi, Selma .
IET IMAGE PROCESSING, 2020, 14 (06) :1120-1131
[10]   A Hybrid robust watermarking system based on discrete cosine transform, discrete wavelet transform, and singular value decomposition [J].
Begum, Mahbuba ;
Ferdush, Jannatul ;
Uddin, Mohammad Shorif .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (08) :5856-5867