×

Watermarking based on discrete wavelet transform and \(q\)-deformed chaotic map. (English) Zbl 1380.94011

Summary: Hierarchy of one-dimensional ergodic chaotic maps with Tsallis type of \(q\)-deformation are studied. We find that in the chaotic region, these maps with \(q\)-deformation are ergodic as the Birkhoff ergodic theorem predicts. \(q\)-deformed maps are defined as ratios of polynomials of degree \(N\). Hence, by using the Stieltjes transform approach (STA), invariant measure is proposed. In addition, considering Sinai-Ruelle-Bowen (SRB) measure, Kolmogorov-Sinai (KS) entropy for \(q\)-deformed maps is calculated analytically. The new \(q\)-deformed scheme have ability to keep previous significant properties such as ergodicity, sensitivity to initial condition. By adding \(q\)-parameter to the hierarchy in order increase the randomness and one-way computation, we present a new scheme for watermarking. The introduced algorithm tries to improve the problem of failure of encryption such as small key space, encryption speed and level of security. To illustrate the effectiveness of the proposed scheme, some security analyses are presented. By considering the obtained results, it can be concluded that, this scheme have a high potential to be adopted for watermarking. It can be concluded that, the proposed novel watermarking scheme for image authentication can be applied for practical applications.

MSC:

94A08 Image processing (compression, reconstruction, etc.) in information and communication theory
65D18 Numerical aspects of computer graphics, image analysis, and computational geometry
94A17 Measures of information, entropy
94A60 Cryptography
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Cox, I.; Miller, M.; Bloom, J.; Fridrich, J.; Kalker, T., Digital watermarking and steganography, Morgan Kaufmann (2007)
[2] Yüzkollar, C.; Kocabıçak, U., Region based interpolation error expansion algorithm for reversible image watermarking, Appl Soft Comput, 33, 127-135 (2015)
[3] Wang, X.-Y.; Miao, E.-N.; Yang, H.-Y., A new SVM-based image watermarking using Gaussian-Hermite moments, Appl Soft Comput, 12, 2, 887-903 (2012)
[4] Agilandeeswari, L.; Ganesan, K., An adaptive HVS based video watermarking scheme for multiple watermarks using BAM neural networks and fuzzy inference system, Expert Syst Appl (2016)
[5] Thind, D. K.; Jindal, S., A semi blind DWT-SVD video watermarking, Procedia Comput Sci, 46, 1661-1667 (2015)
[6] Hua, G.; Huang, J.; Shi, Y. Q.; Goh, J.; Thing, V. L., Twenty years of digital audio watermarking a comprehensive review, Signal Process, 128, 222-242 (2016)
[7] Liu, S.-H.; Yao, H.-X.; Gao, W.; Liu, Y.-L., An image fragile watermark scheme based on chaotic image pattern and pixel-pairs, Appl Math Comput, 185, 2, 869-882 (2007) · Zbl 1149.94337
[8] Katzenbeisser, S.; Petitcolas, F., Information hiding techniques for steganography and digital watermarking (2000), Artech House
[9] Lee, Z.-J.; Lin, S.-W.; Su, S.-F.; Lin, C.-Y., A hybrid watermarking technique applied to digital images, Appl Soft Comput, 8, 1, 798-808 (2008)
[10] Arnold, M.; Schmucker, M.; Wolthusen, S. D., Techniques and applications of digital watermarking and content protection, Artech House (2002)
[11] Sathik, M. M.; Sujatha, S., A novel DWT based invisible watermarking technique for digital images., Int Arab J e-Technol, 2, 3, 167-173 (2012)
[12] Mostafa, S. A.; Tolba, A.; Abdelkader, F.; Elhindy, H. M., Video watermarking scheme based on principal component analysis and wavelet transform, Int J Comput SciNetw Secur, 9, 8, 45-52 (2009)
[13] Mondal, M.; Barik, D., Spatial domain robust watermarking scheme for color image, Int J Adv Comput Sci, 2, 1, 24-27 (2012)
[14] Behnia, S.; Teshnehlab, M.; Ayubi, P., Multiple-watermarking scheme based on improved chaotic maps, Commun Nonlinear Sci Numer Simul, 15, 9, 2469-2478 (2010) · Zbl 1222.94007
[15] Behnia, S.; Ahadpour, S.; Ayubi, P., Design and implementation of coupled chaotic maps in watermarking, Appl Soft Comput, 21, 481-490 (2014)
[16] Das, C.; Panigrahi, S.; Sharma, V. K.; Mahapatra, K., A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation, AEU-Int J ElectronCommun, 68, 3, 244-253 (2014)
[17] Huang, F.; Guan, Z.-H., A hybrid SVD-DCT watermarking method based on LPSNR, Pattern Recognit Lett, 25, 15, 1769-1775 (2004)
[18] Ali, M.; Ahn, C. W.; Pant, M.; Siarry, P., An image watermarking scheme in wavelet domain with optimized compensation of singular value decomposition via artificial bee colony, Inf Sci, 301, 44-60 (2015)
[19] Makbol, N. M.; Khoo, B. E., A new robust and secure digital image watermarking scheme based on the integer wavelet transform and singular value decomposition, Digit Signal Process, 33, 134-147 (2014)
[20] Lang, J.; Zhang, Z.-g., Blind digital watermarking method in the fractional fourier transform domain, Opt Lasers Eng, 53, 112-121 (2014)
[21] Rawat, S.; Raman, B., A blind watermarking algorithm based on fractional Fourier transform and visual cryptography, Signal Process, 92, 6, 1480-1491 (2012)
[22] Khorrami, N.; Ayubi, P.; Behnia, S.; Ayubi, J., A SSVD-chaos digital image watermarking scheme based on multiple chaotic system, Signal processing and information technology, 9-18 (2014), Springer
[23] Tsai, H.-H.; Jhuang, Y.-J.; Lai, Y.-S., An SVD-based image watermarking in wavelet domain using SVR and PSO, Appl Soft Comput, 12, 8, 2442-2453 (2012)
[24] Vaishnavi, D.; Subashini, T., Image tamper detection based on edge image and chaotic arnold map, Indian J Sci Technol, 8, 6, 548-555 (2015)
[25] Castellani, L.; Wess, J., Quantum groups and their applications in physics, 127 (1996), IOS Press · Zbl 0847.00030
[26] Wess, J., q-deformed Heisenberg algebras, Geometry and quantum physics, 311-382 (2000), Springer · Zbl 1044.81634
[27] Ogievetsky, O.; Schmidke, W.; Wess, J.; Zumino, B., q-deformed Poincaré algebra, Commun Math Phys, 150, 3, 495-518 (1992) · Zbl 0849.17011
[28] Jaganathan, R.; Sinha, S., A q-deformed nonlinear map, Phys Lett A, 338, 3, 277-287 (2005) · Zbl 1136.82304
[29] Patidar, V., Co-existence of regular and chaotic motions in the gaussian map, Electron J Theor Phys, EJTP3, 338, 13, 29-40 (2006) · Zbl 1153.37358
[30] Patidar, V.; Sud, K., A comparative study on the co-existing attractors in the gaussian map and its q-deformed version, Commun Nonlinear Sci Numer Simul, 14, 3, 827-838 (2009)
[31] Patidar, V.; Purohit, G.; Sud, K., A numerical exploration of the dynamical behavior of q-deformed nonlinear maps, Chaotic Syst, 257-267 (2010) · Zbl 1262.37036
[32] Shrimali, M. D.; Banerjee, S., Delayed q-deformed logistic map, Commun Nonlinear Sci Numer Simul, 18, 11, 3126-3133 (2013) · Zbl 1329.37041
[33] Chen, L. D.; G., Anticontrol of chaos via feedback, Int J Bifurcat Chaos, 8, 1585-1590 (1998) · Zbl 0941.93522
[34] Starkov, K.; Chen, G., Chaotification of polynomial continuous-time systems and rational normal forms, Chaos, Solitons Fractals, 22, 4, 849-856 (2004) · Zbl 1061.93511
[35] Wang, X. F.; Chen, G.; Yu, X., Anticontrol of chaos in continuous-time systems via time-delay feedback, Chaos, 10, 4, 771-779 (2000) · Zbl 0967.93045
[36] Chen, H.-K.; Lee, C.-I., Anti-control of chaos in rigid body motion, Chaos, Solitons Fractals, 21, 4, 957-965 (2004) · Zbl 1046.70005
[37] Dorfman, J. R., An introduction to chaos in nonequilibrium statistical mechanics, 14 (1999), Cambridge University Press · Zbl 0973.82001
[38] Tefas, A.; Nikolaidis, A.; Nikolaidis, N.; Solachidis, V.; Tsekeridou, S.; Pitas, I., Markov chaotic sequences for correlation based watermarking schemes, Chaos, Solitons Fractals, 17, 2, 567-573 (2003) · Zbl 1065.68049
[39] Nikolaidis A, Pitas I. Comparison of different chaotic maps with application to image watermarking. In: IEEE international symposium on circuits and systems, vol. 1999. IEEE; 2000. P. V-509.; Nikolaidis A, Pitas I. Comparison of different chaotic maps with application to image watermarking. In: IEEE international symposium on circuits and systems, vol. 1999. IEEE; 2000. P. V-509.
[40] Tsekeridou, S.; Solachidis, V.; Nikolaidis, N.; Nikolaidis, A.; Tefas, A.; Pitas, I., Theoretic investigation of the use of watermark signals derived from bernoulli chaotic sequences, Proceedings of the Scandinavian conference on image analysis, 600-607 (2001) · Zbl 1053.62610
[41] Behnia, S.; Ahadpour, S.; Ayubi, P., Design and implementation of coupled chaotic maps in watermarking, Appl Soft Comput, 21, 481-490 (2014)
[42] Ranjbar, S.; Zargari, F.; Ghanbari, M., A highly robust two-stage contourlet-based digital image watermarking method, Signal Process Image Commun, 28, 10, 1526-1536 (2013)
[43] Mohan, B. C.; Kumar, S. S., Robust digital watermarking scheme using contourlet transform, Int J Comput SciNetw Secur, 8, 2, 43-51 (2008)
[44] Lin, W.-H.; Wang, Y.-R.; Horng, S.-J.; Kao, T.-W.; Pan, Y., A blind watermarking method using maximum wavelet coefficient quantization, Expert Syst Appl, 36, 9, 11509-11516 (2009)
[45] Kutter, M.; Petitcolas, F. A., Fair benchmark for image watermarking systems, 226-239 (1999), Electronic Imaging’99, International Society for Optics and Photonics
[46] Pennebaker, W. B.; Mitchell, J. L., JPEG: still image data compression standard, Springer Science & Business Media (1992)
[47] Acharya, T.; Tsai, P.-S., JPEG2000 standard for image compression: concepts, algorithms and VLSI architectures (2005), John Wiley & Sons
[48] Huang, T.; Yang, G.; Tang, G., A fast two-dimensional median filtering algorithm, IEEE Trans Acoust, 27, 1, 13-18 (1979)
[49] Gonzalez, R. C.; Richard, E., Woods, digital image processing (2008), Prentice Hall Press, ISBN 0-201-18075-8
[50] Pratt W.K., et al. Digital image processing. (1978).; Pratt W.K., et al. Digital image processing. (1978). · Zbl 0728.68142
[51] Lee, P.; Chenb, Y.; Pei, S.; Chena, Y., Reply to the comment keystream cryptanalysis of a chaotic cryptographic method, Comput Phys Commun, 160, 208-214 (2004)
[52] Poynton, C., Digital video and HD: algorithms and interfaces (2012), Elsevier
[53] Schneier B.. Applied cryptography: protocols, algorithms, and source code in C. 1996. 2, 216-222; Schneier B.. Applied cryptography: protocols, algorithms, and source code in C. 1996. 2, 216-222 · Zbl 0853.94001
[54] Ecrypt ii yearly report on algorithms and keysizes. 2010. http://www.ecrypt.eu.org/documents/D.SPA.13.pdf; Ecrypt ii yearly report on algorithms and keysizes. 2010. http://www.ecrypt.eu.org/documents/D.SPA.13.pdf
[55] National institute of standard and technology statistical test (nist).http://www.nist.gov/; National institute of standard and technology statistical test (nist).http://www.nist.gov/
[56] Jafarizadeh, M.; Behnia, S.; Khorram, S.; Nagshara, H., Hierarchy of chaotic maps with an invariant measure, J Stat Phys, 104, 5-6, 1013-1028 (2001) · Zbl 1143.82308
[57] Behnia, S.; Yahyavi, M., Characterization of intermittency in hierarchy of chaotic maps with invariant measure, J Phys Soc Jpn, 81, 12, 124008-124016 (2012)
[58] Cornfeld, I. P.; Fomin, S. V.; Sinai, Y. G., Ergodic theory, 245 (2012), Springer Science & Business Media
[59] Keller, G., Equilibrium states in ergodic theory, 42 (1998), Cambridge university press · Zbl 0896.28006
[60] Behnia, S.; Ahadpour, S.; Faizi, E., A novel moment approach for calculation of the perron-frobenius spectrum, Int J Theor Phys, 46, 11, 2836-2842 (2007) · Zbl 1126.37022
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.