Abstract

Image watermarking schemes based on singular value decomposition (SVD) have become popular due to a good trade-off between robustness and imperceptibility. However, the false positive problem (FPP) is the main drawback of SVD-based watermarking schemes. The singular value is the main cause of FPP issues because it a fixed value that does not hold structural information of an image. In this paper, a new SVD-based image watermarking scheme that uses a chaotic map is proposed to overcome this issue. The secret key is first extracted from both the host and watermark image. This key is used to generate a new chaotic matrix and chaotic multiple scaling factors (CMSF) to increase the sensitivity of the proposed scheme. The watermark image is then transformed based on the chaotic matrix before being directly embedded into the singular value of the host image by using the CMSF. The extracted secret key is unique to the host and the watermark images, which improves security and overcomes FPP issues. Experimental results show that the proposed scheme fulfils all watermarking requirements in terms of robustness, imperceptibility, security, and payload. Furthermore, it achieves high robustness with different scaling factors, and outperforms several existing schemes.

Highlights

  • With the widespread growth of digital applications and improved network technology services, the demand for enhanced data protection methods have greatly increased due to illegal copying, editing, distribution, and integrity problems

  • EXPERIMENTAL RESULTS AND ANALYSIS For all experiments, five grayscale images Lena, Peppers, Baboon, Couple and Boat of size 512 are used as the host images, whereas the 256 × 256 Cameraman image is used as the watermark image

  • A new chaos-based singular value decomposition (SVD) image watermarking scheme in the frequency domain was proposed in this paper

Read more

Summary

INTRODUCTION

With the widespread growth of digital applications and improved network technology services, the demand for enhanced data protection methods have greatly increased due to illegal copying, editing, distribution, and integrity problems. A secret key is extracted from the host image and the watermark image to generate initial conditions and control parameters for the chaotic maps. Based on these properties, we have employed the enhanced logistic and sine maps in the proposed watermarking scheme. The key generation phase involves extracting information from the host and watermark images, hashing them to generate the secret key of the proposed scheme This secret key is used to generate initial conditions and system parameters of the chaotic maps, which are iterated to produce a matrix that will be used to transform the watermark prior to the embedding process. 5) The inverse IWT is applied by using LLmodified and the remaining detail sub-bands (LH , HL, HH ) to obtain the watermarked image, I W . 6) β1,β2, and SLnLew are used as the side information extraction in addition to keybits as the secret key

WATERMARK EXTRACTION
EXPERIMENTAL RESULTS AND ANALYSIS
IMPERCEPTIBILITY AND ROBUSTNESS ANALYSIS
Result
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.