Abstract

In the past decade, a number of chaos-based watermarking schemes have been proposed. Generally, it is widely accepted that the introduction of chaos effectively enhances the security of digital watermarking. Yet, taking a representative algorithm as an example, this paper reveals vulnerabilities of the chaos-based watermarking schemes against various attacks under Kerckhoff’s principle, and the watermark can be successfully removed and decrypted. To achieve higher security, a sub key generation mechanism based on the feature codes of images (SKGM-FCI) is designed. The obtained watermarking key is related to the original images, such that individual sub keys are obtained for different host images. Benefiting from the SKGM-FCI, a blind watermarking scheme based on Discrete Cosine Transform domain of the scrambled image is further proposed and investigated. The theoretical analysis and simulation results validate the effectiveness and the high security level of the proposed scheme.

Highlights

  • With the rapid development of multimedia technology and network technology, multimedia data have been growth massive

  • This paper focuses on the security of chaos-based watermarking algorithms from the perspective of cryptography

  • Taking Liu et al’s scheme as an example, the security of algorithm is studied and analyzed, both the theoretical analysis and experimental result reveal its vulnerability against various attacks in Watermark only attack (WOA) or Known message attack (KMA) scenario

Read more

Summary

INTRODUCTION

With the rapid development of multimedia technology and network technology, multimedia data have been growth massive. It is important and necessary to further analyze and study the security of chaos-based watermarking algorithms This is the primary motivation of this paper. In [13], Liu et al proposed a blind image watermarking scheme based on chaotic mixtures, the logo watermark is firstly scrambled by Logistic maps and embedded into the 2-level DWT domain of the original image. It belongs to the second type of chaos-based watermarking mentioned above, which is a representative algorithm whose watermark signal is encrypted by chaotic system.

CRYPTANALYSIS OF WATERMARKING SCHEMES
EFFECTIVENESS ANALYSIS AND SIMULATION
EXPERIMENTAL SETUP AND EVALUATION METRIC
EFFECTIVENESS ANALYSIS OF THE SKGM-FCI
ROBUSTNESS EVALUATION
CONCLUSIONS
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.