Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption

被引:123
作者
Loan, Nazir A. [1 ]
Hurrah, Nasir N. [1 ]
Parah, Shabir A. [1 ]
Lee, Jong Weon [2 ]
Sheikh, Javaid A. [1 ]
Bhat, G. Mohiuddin [3 ]
机构
[1] Univ Kashmir, Dept Elect & Instrumentat Technol, Srinagar 19006, Jammu & Kashmir, India
[2] Sejong Univ, Dept Digital Contents, Seoul 143747, South Korea
[3] Inst Technol Zakoora, Dept Elect Engn, Srinagar 19006, Jammu & Kashmir, India
关键词
Electronic healthcare; Arnold transform; blind watermarking; chaos; DCT; encryption; and robustness; HIGH-CAPACITY; HIDING TECHNIQUE; MEDICAL IMAGES; SCHEME; INFORMATION; ATTACKS; STEGANOGRAPHY;
D O I
10.1109/ACCESS.2018.2808172
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a chaotic encryption-based blind digital image watermarking technique applicable to both grayscale and color images. Discrete cosine transform (DCT) is used before embedding the watermark in the host image. The host image is divided into 8 x 8 nonoverlapping blocks prior to DCT application, and the watermark bit is embedded by modifying difference between DCT coefficients of adjacent blocks. Arnold transform is used in addition to chaotic encryption to add double-layer security to the watermark. Three different variants of the proposed algorithm have been tested and analyzed. The simulation results show that the proposed scheme is robust to most of the image processing operations like joint picture expert group compression, sharpening, cropping, and median filtering. To validate the efficiency of the proposed technique, the simulation results are compared with certain state-of-art techniques. The comparison results illustrate that the proposed scheme performs better in terms of robustness, security, and imperceptivity. Given the merits of the proposed scheme, it can be used in applications like e-healthcare and telemedicine to robustly hide electronic health records in medical images.
引用
收藏
页码:19876 / 19897
页数:22
相关论文
共 76 条
[21]  
Ferdowsi A., 2017, DEEP LEARNING BASED
[22]  
Fridrich J, 1997, IEEE SYS MAN CYBERN, P1105, DOI 10.1109/ICSMC.1997.638097
[23]  
Gao L., 2015, INTELL DATA ANAL, P283
[24]   Robust watermarking against geometric attacks using partial calculation of radial moments and interval phase modulation [J].
Golabi, Sasan ;
Helfroush, Mohammad Sadegh ;
Danyali, Habibollah ;
Owjimehr, Mehri .
INFORMATION SCIENCES, 2014, 269 :94-105
[25]   Secure watermarking scheme against watermark attacks in the encrypted domain [J].
Guo, Jianting ;
Zheng, Peijia ;
Huang, Jiwu .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2015, 30 :125-135
[26]   Robust Image Watermarking Theories and Techniques: A Review [J].
Hai Tao ;
Li Chongmin ;
Zainl, Jasni Mohamad ;
Abdalla, Ahmed N. .
JOURNAL OF APPLIED RESEARCH AND TECHNOLOGY, 2014, 12 :122-138
[27]  
HAKAK S, 2017, ACCESS IEEE, V5, P7305, DOI DOI 10.1109/ACCESS.2017.2682109
[28]   Hidden digital watermarks in images [J].
Hsu, CT ;
Wu, JL .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1999, 8 (01) :58-68
[29]   An efficient and robust image encryption scheme for medical applications [J].
Kanso, A. ;
Ghebleh, M. .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2015, 24 (1-3) :98-116
[30]   Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition [J].
Lai, Chih-Chin ;
Tsai, Cheng-Chih .
IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2010, 59 (11) :3060-3063