Secure blind watermarking using Fractional-Order Lorenz system in the frequency domain

被引:5
作者
Abdelhaleem, Sherif H. [1 ]
Abd-El-Hafiz, Salwa K. [1 ]
Radwan, Ahmed G. [1 ,2 ]
机构
[1] Cairo Univ, Fac Engn, Engn Math & Phys Dept, Giza 12613, Egypt
[2] Nile Univ, Sch Engn & Appl Sci, Giza 12588, Egypt
关键词
DCT; DWT; Watermark; Encryption; Fractional-order Lorenz system; IMPLEMENTATION; ALGORITHM;
D O I
10.1016/j.aeue.2023.154998
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper investigates two different blind watermarking systems in the frequency domain with the development of a Pseudo Random Number Generator (PRNG), based on a fractional-order chaotic system, for watermark encryption. The methodology is based on converting the cover image to the YCbCr color domain and applying two different techniques of frequency transforms, Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT), to the Y channel. Then, the encrypted watermark is embedded in the middle-frequency band and HH band coefficients for the DCT and DWT, respectively. For more security and long encryption key size, the fractional-order Lorenz system is used to double the encryption key size and make it secure against brute-force attacks. The proposed algorithms successfully detect the hidden watermark by using the statistical properties of the embedding media, where the PRNG is examined using statistical tests and the watermarking systems are evaluated using standard imperceptibility and robustness measures. Common attacks such as noise-adding attacks, image enhancement attacks and geometric transformation attacks are discussed. Results of the PRNG demonstrate sensitivity to the system parameters, and results of the watermarking systems show good imperceptibility while keeping the robustness measures in a good range.
引用
收藏
页数:14
相关论文
共 54 条
[41]   A double-color image watermarking algorithm based on quaternion Schur decomposition [J].
Sun, Yehan ;
Su, Qingtang ;
Chen, Siyu ;
Zhang, Xueting .
OPTIK, 2022, 269
[42]   Robust and blind watermarking algorithm based on DCT and SVD in the contourlet domain [J].
Tian, Cheng ;
Wen, Ru-Hong ;
Zou, Wei-Ping ;
Gong, Li-Hua .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (11-12) :7515-7541
[43]   Watermarking based image authentication and tamper detection algorithm using vector quantization approach [J].
Tiwari, Archana ;
Sharma, Manisha ;
Tamrakar, Raunak Kumar .
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2017, 78 :114-123
[44]   Enhanced FPGA realization of the fractional-order derivative and application to a variable-order chaotic system [J].
Tolba, Mohammed F. ;
Saleh, Hani ;
Mohammad, Baker ;
Al-Qutayri, Mahmoud ;
Elwakil, Ahmed S. ;
Radwan, Ahmed G. .
NONLINEAR DYNAMICS, 2020, 99 (04) :3143-3154
[45]  
Walker J.S., 2008, A Primer on Wavelets and Their Scientific Applications
[46]   A comprehensive survey on robust image watermarking [J].
Wan, Wenbo ;
Wang, Jun ;
Zhang, Yunming ;
Li, Jing ;
Yu, Hui ;
Sun, Jiande .
NEUROCOMPUTING, 2022, 488 :226-247
[47]   Embedding color watermark image to color host image based on 2D-DCT [J].
Wang, Huanying ;
Yuan, Zihan ;
Chen, Siyu ;
Su, Qingtang .
OPTIK, 2023, 274
[48]   Robust periodic blind watermarking based on sub-block mapping and block encryption [J].
Wang, Jiayan ;
Wu, Deyang ;
Li, Li ;
Zhao, Jing ;
Wu, Hanzhou ;
Tang, Yong .
EXPERT SYSTEMS WITH APPLICATIONS, 2023, 224
[49]   A secure dual-color image watermarking scheme based 2D DWT, SVD and Chaotic map [J].
Wang, Kunshu ;
Gao, Tiegang ;
You, Daotao ;
Wu, Xiangjun ;
Kan, Haibin .
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (05) :6159-6190
[50]  
Weber A., 1997, Dataset, USC-SIPI