Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption

被引:123
作者
Loan, Nazir A. [1 ]
Hurrah, Nasir N. [1 ]
Parah, Shabir A. [1 ]
Lee, Jong Weon [2 ]
Sheikh, Javaid A. [1 ]
Bhat, G. Mohiuddin [3 ]
机构
[1] Univ Kashmir, Dept Elect & Instrumentat Technol, Srinagar 19006, Jammu & Kashmir, India
[2] Sejong Univ, Dept Digital Contents, Seoul 143747, South Korea
[3] Inst Technol Zakoora, Dept Elect Engn, Srinagar 19006, Jammu & Kashmir, India
关键词
Electronic healthcare; Arnold transform; blind watermarking; chaos; DCT; encryption; and robustness; HIGH-CAPACITY; HIDING TECHNIQUE; MEDICAL IMAGES; SCHEME; INFORMATION; ATTACKS; STEGANOGRAPHY;
D O I
10.1109/ACCESS.2018.2808172
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a chaotic encryption-based blind digital image watermarking technique applicable to both grayscale and color images. Discrete cosine transform (DCT) is used before embedding the watermark in the host image. The host image is divided into 8 x 8 nonoverlapping blocks prior to DCT application, and the watermark bit is embedded by modifying difference between DCT coefficients of adjacent blocks. Arnold transform is used in addition to chaotic encryption to add double-layer security to the watermark. Three different variants of the proposed algorithm have been tested and analyzed. The simulation results show that the proposed scheme is robust to most of the image processing operations like joint picture expert group compression, sharpening, cropping, and median filtering. To validate the efficiency of the proposed technique, the simulation results are compared with certain state-of-art techniques. The comparison results illustrate that the proposed scheme performs better in terms of robustness, security, and imperceptivity. Given the merits of the proposed scheme, it can be used in applications like e-healthcare and telemedicine to robustly hide electronic health records in medical images.
引用
收藏
页码:19876 / 19897
页数:22
相关论文
共 76 条
[1]   Image encryption based on Independent Component Analysis and Arnold's Cat Map [J].
Abbas, Nidaa AbdulMohsin .
EGYPTIAN INFORMATICS JOURNAL, 2016, 17 (01) :139-146
[2]   A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine [J].
Abd-Eldayem, Mohamed M. .
EGYPTIAN INFORMATICS JOURNAL, 2013, 14 (01) :1-13
[3]  
[Anonymous], 2007, DIGITAL WATER MARKIN
[4]  
[Anonymous], 2012, ELIXIR COMP SCI ENG
[5]  
Arnold VI., 1968, ERGODIC PROBLEMS CLA
[6]  
Battisti F, 2006, 3 INT C COMPUTERS DE, P1
[7]   Blind image watermarking technique based on differential embedding in DWT and DCT domains [J].
Benoraira, Ali ;
Benmahammed, Khier ;
Boucenna, Noureddine .
EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2015,
[8]   Robust ROI Watermarking Scheme Based on Visual Cryptography: Application on Mammograms [J].
Benyoussef, Meryem ;
Mabtoul, Samira ;
El Marraki, Mohamed ;
Aboutajdine, Driss .
JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2015, 11 (04) :495-508
[9]  
Bors AG, 1996, INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, PROCEEDINGS - VOL III, P231, DOI 10.1109/ICIP.1996.560426
[10]   A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images [J].
Bouslimi, Dalel ;
Coatrieux, Gouenou ;
Cozic, Michel ;
Roux, Christian .
IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2012, 16 (05) :891-899