A Novel Compressed Encrypted and Encoded Watermark Embedding Scheme for Digital Images
DOI:
https://doi.org/10.14419/ijet.v7i3.12.17842Published:
2018-07-20Keywords:
Spatial domain watermarking, Lozi mapping, Logistic mapping, Huffman code, repetition code.Abstract
In this research work a novel idea of compressed, encrypted and encoded watermark embedding scheme for digital images is proposed. Initially watermark is compressed using Huffman encoder. Compressed watermark is encrypted using combined binary key sequence {Ki} derived from sequence of logistic map and Lozi map. The compressed and encrypted binary watermark is encoded using (n,1) repetition code. This compressed, encrypted and encoded binary watermark is embedded in alternate locations of cover image pixels using of Least Significant Bit (LSB) and Second Least Significant Bit (SLSB). To study the watermarked image quality, parameters such as Signal to Noise Ratio (SNR) and Mean Square Error (MSE) are used. Also performance of the proposed system is compared with uncompressed, encrypted, encoded watermark embedding scheme. There is a significant improvement in MSE, SNR of watermarked image, when compressed watermark embedding scheme is compared to uncompressed watermark embedding scheme.
References
[1]. F.M. Boland, J.J.K. O Ruanaidh, C. Dautzenberg, "Watermarking Digital images for Copyright Protection", Proceedings of the 5th IEEE International Conference on Image Processing and its Applications, no. 410, Edinburgh, July, 1995, pp. 326-330.
[2]. H. Berghel , L. O’Gorman, “Protecting Ownership Rights through Digital Watermarkingâ€, IEEE Computer Mag., Volume:29 , Issue: 7, pp.101-103, July 1996.
[3]. M. Abdullatif, A. M. Zeki, J. Chebil, and T. S. Gunawan, “Properties of Digital Image Watermarking,†proceedings of IEEE 9th International Colloquium on Signal Processing and its Applications, 8 - 10 Mac. 2013, Kuala Lumpur, Malaysiapp.
[4]. A.Z.Tirkel, G.A. Rankin, R.M. Van Schyndel, W.J.Ho, N.R.A.Mee, C.F.Osborne. “Electronic Water Mark†DICTA-1993, Macquarie University. pp. 666-673.
[5]. An, ZhiYuan, and Haiyan Liu. "Research on digital watermark technology based on LSB algorithm." Proceedings of Fourth International Conference on Computational and Information Sciences, 2012.
[6]. Agung, B. W. R., and Febri Puguh Permana. "Medical image watermarking with tamper detection and recovery using reversible watermarking with LSB modification and run length encoding (RLE) compression." Proceedings of IEEE International Conference on Communication, Networks and Satellite (ComNetSat), 2012.
[7]. El Kerek, Bilal, et al. "A New Technique to Multiplex Stereo Images: LSB Watermarking and Hamming Code." Proceedings of first International Conference on.Artificial Intelligence, Modelling and Simulation (AIMS), 2013
[8]. Yahaya, Cik Ku Haroswati Che Ku, Harnani Hassan, and Mohd Izwan Bin Md Kahmi. "Investigation on perceptual and robustness of LSB digital watermarking scheme on Halal Logo authentication." Proceedings of International Conference on System Engineering and Technology (ICSET), 2012.
[9]. Kumar, S., & Singh, T. “Performance improvement of simple LSB watermarking using SVD†Proceeding of Innovative Applications of Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH), 2014 (pp. 133-137). IEEE, (2014, November).
[10]. Zhong, Qian-Chuan, Qing-xin Zhu, and Ping Zhang. "A spatial domain color watermarking scheme based on chaos." Proceedings of IEEE International Conference on Apperceiving Computing and Intelligence Analysis, 2008. ICACIA.
[11]. Zhang Xueyi, Jin Lu,Wang Kejun and Li Dianpu “Logistic-Map Chaotic Spreading Spectrum Sequences Under Linear transformation†Proceedings of the 3“ World Congress on Intelligent Control and Automation June 28-July 2,2000, Hefei, P.R China.
[12]. Lozi R 1978 Un attracteur _etrange (?) du type attracteur de H_enon Journal de Physique.
[13]. Rohith.S, K.N. Hari Bhat, “A Simple Robust Digital Image Watermarking against Salt and Pepper Noise using Repetition Codes†ACEEE International Journal on Signal & Image Processing, pp-48-54 Vol. 03, No. 01, Jan 2012.
[14]. S Rohith, B K Sujatha “Image encryption and decryption using combined key sequence of Logistic map and Lozi mapâ€, Proceedings of IEEE International Conference on Communications and Signal Processing (ICCSP),2015, pp.1053-1058.
[15]. S Rohith, KN Hari Bhat, BK Sujatha“A secure and robust digital image watermarking scheme using repetition codes for copyright protection†Proceedings of 2014 International Conference on Advances in Electronics, Computers and Communications (ICAECC),2014, Bangalore, pp-1-8.
[16]. Shu Lin, Daniel J. Costello “Error Control Coding: Fundamentals and Applications†Pearson-Prentice Hall, 2004.
[17]. K Sayood “Introduction to Data Compressionâ€, Morgan Kaufmann,3rd Edition,2005
[18]. H.Zhang, H.Z.Shu, J. G.Coatrieux and L.M.Luo, "Affine Legendre Moment invariants for image watermark robust to geometric distortions," IEEE Trans. Image Process, vol. 20, no. 8, pp. 2189-2199, 2011.
How to Cite
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Accepted 2018-08-18
Published 2018-07-20