An edge inspired image watermarking approach using compass edge detector and LSB in cybersecurity

被引:11
作者
Bin Faheem, Zaid [1 ]
Hanif, Danial [1 ]
Arslan, Farrukh [2 ]
Ali, Mubashir [3 ]
Hussain, Aamir [4 ]
Ali, Jehad [5 ]
Baz, Abdullah [6 ]
机构
[1] Islamia Univ Bahawalpur, Dept Comp Sci & IT, Bahawalpur 63100, Pakistan
[2] Univ Engn & Technol, Dept Elect Engn, Lahore 54000, Pakistan
[3] Chinese Acad Sci, Shenzhen Inst Adv Technol, Shenzhen 518055, Guangdong, Peoples R China
[4] Muhammad Nawaz Shareef Univ Agr, Dept Comp Sci, Multan 6000, Pakistan
[5] Ajou Univ, Dept AI Convergence Network, Suwon 16499, South Korea
[6] Umm Al Qura Univ, Coll Comp & Informat Syst, Dept Comp Engn, Mecca, Saudi Arabia
关键词
Cybersecurity; Substitution box; Image watermarking; Least significant bit; SCHEME;
D O I
10.1016/j.compeleceng.2023.108979
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the contemporary era, data holds a vital significance, and ensuring the security of data stands as an exceptionally challenging endeavor. Both industry and academia dedicate substantial efforts to mitigate security breaches. Given the evolving nature of modern cyber threats, there arises a compelling necessity for robust cybersecurity measures concerning digital content. We propose the merits of digital watermarking within the realm of cybersecurity for digital content. Researchers within the watermarking domain are diligently striving to offer the utmost security services. Unfortunately, achieving both robustness and security concurrently within these techniques has proven to be a formidable task. Hence, we delve into a novel approach for image watermarking, which draws inspiration from gradient-based methodologies. This scheme hinges upon compass edge detection, the least significant bit mechanism, and the utilization of chaotic encryption for watermark embedding. The effectiveness and performance are rigorously evaluated against a spectrum of geometrical and image-processing attacks.
引用
收藏
页数:13
相关论文
共 29 条
[1]   Survey of robust and imperceptible watermarking [J].
Agarwal, Namita ;
Singh, Amit Kumar ;
Singh, Pradeep Kumar .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (07) :8603-8633
[2]   An intelligent and blind dual color image watermarking for authentication and copyright protection [J].
Ahmadi, Sajjad Bagheri Baba ;
Zhang, Gongxuan ;
Rabbani, Mahdi ;
Boukela, Lynda ;
Jelodar, Hamed .
APPLIED INTELLIGENCE, 2021, 51 (03) :1701-1732
[3]   Robust hybrid watermarking techniques for different color imaging systems [J].
Al-Afandy, Khalid A. ;
El-Shafai, Walid ;
El-Rabaie, El-Sayed M. ;
Abd El-Samie, Fathi E. ;
Faragallah, Osama S. ;
El-Mhalaway, Ahmed ;
Shehata, Ahmed M. ;
El-Banby, Ghada M. ;
El-Halawany, Mohamed M. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (19) :25709-25759
[4]  
Amer GMH, 2015, 2015 2ND WORLD SYMPOSIUM ON WEB APPLICATIONS AND NETWORKING (WSWAN)
[5]   AuSR2: Image watermarking technique for authentication and self-recovery with image texture preservation [J].
Aminuddin, A. ;
Ernawan, F. .
COMPUTERS & ELECTRICAL ENGINEERING, 2022, 102
[6]   Digital Image Watermarking Techniques: A Review [J].
Begum, Mahbuba ;
Uddin, Mohammad Shorif .
INFORMATION, 2020, 11 (02)
[7]   Highly dispersive substitution box (S-box) design using chaos [J].
Bin Faheem, Zaid ;
Ali, Asim ;
Khan, Muhamad Asif ;
Ul-Haq, Muhammad Ehatisham ;
Ahmad, Waqar .
ETRI JOURNAL, 2020, 42 (04) :619-632
[8]  
Chapaneri R, 2013, ANNU IEEE IND CONF
[9]   A semi-blind HVS based image watermarking scheme using elliptic curve cryptography [J].
Gupta, Ritu ;
Mishra, Anurag ;
Jain, Sarika .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (15) :19235-19260
[10]   Encryption Based Image Watermarking Algorithm in 2DWT-DCT Domains [J].
Hasan, Nayeem ;
Islam, Md Saiful ;
Chen, Wenyu ;
Kabir, Muhammad Ashad ;
Al-Ahmadi, Saad .
SENSORS, 2021, 21 (16)