scispace - formally typeset
Search or ask a question
Author

Satendra Pal Singh

Bio: Satendra Pal Singh is an academic researcher from Indian Institute of Technology, Jodhpur. The author has contributed to research in topics: Digital watermarking & Watermark. The author has an hindex of 5, co-authored 13 publications receiving 106 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The experimental results demonstrate that the proposed scheme is imperceptible and robust against a variety of intentional or unintentional attacks.

74 citations

Proceedings ArticleDOI
01 Sep 2017
TL;DR: Experimental evaluations demonstrate that the proposed scheme is providing the better robustness and security of the proposed framework.
Abstract: In this paper, a robust image hashing framework is proposed using image normalization, discrete wavelet transform and singular value decomposition. The stressed motive of the proposed scheme is to obtain a randomize hash sequence which can be used for image authentication and database search. For this purpose, the image is first normalized followed by hash generation in the wavelet domain utilizing the properties of singular value decomposition (SVD). Experimental evaluations demonstrate that the proposed scheme is providing the better robustness and security.

21 citations

Book ChapterDOI
01 Jan 2017
TL;DR: A novel logo watermarking framework is proposed using non-linear chaotic map to generate keys to be used in the embedding process, which reveals the efficiency and robustness of the proposed framework.
Abstract: In this paper, a novel logo watermarking framework is proposed using non-linear chaotic map. The essence of proposed technique is to use chaotic map to generate keys to be used in the embedding process. Therefore, a method for generating keys is first proposed followed by the embedding process. A robust extraction process is then proposed to verify the presence of watermark from the possibly attacked watermarked image. Experimental results and attack analysis reveal the efficiency and robustness of the proposed framework.

11 citations

Journal ArticleDOI
TL;DR: A novel biometric inspired medical encryption technique is proposed based on newly introduced parameterized all phase orthogonal transformation (PR-APBST), singular value, and QR decomposition, which utilizes the biometrics of the patient/owner to generate a key management system to obtain parameters involved in the proposed technique.
Abstract: The protection of sensitive and confidential data become a challenging task in the present scenario as more and more digital data is stored and transmitted between the end users. The privacy is vitally necessary in case of medical data, which contains the important information of the patients. In this article, a novel biometric inspired medical encryption technique is proposed based on newly introduced parameterized all phase orthogonal transformation (PR-APBST), singular value, and QR decomposition. The proposed technique utilizes the biometrics of the patient/owner to generate a key management system to obtain the parameters involved in the proposed technique. The medical image is then encrypted employing PR-APBST, QR and singular value decomposition and is ready for secure transmission or storage. Finally, a reliable decryption process is employed to reconstruct the original medical image from the encrypted image. The validity and feasibility of the proposed framework have been demonstrated using an extensive experiments on various medical images and security analysis.

10 citations

Proceedings ArticleDOI
01 Mar 2018
TL;DR: A novel image encryption technique is proposed based on reference sets with some prime numbers and polar decomposition using a recursive random number generation process, and a reliable decryption process has been presented to reconstruct the original image.
Abstract: In this paper, a novel image encryption technique is proposed based on reference sets with some prime numbers and polar decomposition. In this technique, a primary secret key and reference sets are used in the generation of feature vector using a recursive random number generation (RRNG) process. This feature vector is then used for encryption process. Finally, a reliable decryption process has been presented to reconstruct the original image. The Simulated results demonstrate the efficiency and robustness of the proposed technique.

8 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This is Applied Cryptography Protocols Algorithms And Source Code In C Applied Cryptographic Protocols algorithms and Source Code in C By Schneier Bruce Author Nov 01 1995 the best ebook that you can get right now online.

207 citations

Journal ArticleDOI
TL;DR: Understanding the network structure of a chaotic map’s SMN in digital computers can facilitate counteracting the undesirable degeneration of chaotic dynamics in finite-precision domains, also helping to classify and improve the randomness of pseudo-random number sequences generated by iterating the chaotic maps.
Abstract: Chaotic dynamics is widely used to design pseudo-random number generators and for other applications such as secure communications and encryption. This paper aims to study the dynamics of discrete-time chaotic maps in the digital (i.e., finite-precision) domain. Differing from the traditional approaches treating a digital chaotic map as a black box with different explanations according to the test results of the output, the dynamical properties of such chaotic maps are first explored with a fixed-point arithmetic, using the Logistic map and the Tent map as two representative examples, from a new perspective with the corresponding state-mapping networks (SMNs). In an SMN, every possible value in the digital domain is considered as a node and the mapping relationship between any pair of nodes is a directed edge. The scale-free properties of the Logistic map's SMN are proved. The analytic results are further extended to the scenario of floating-point arithmetic and for other chaotic maps. Understanding the network structure of a chaotic map's SMN in digital computers can facilitate counteracting the undesirable degeneration of chaotic dynamics in finite-precision domains, helping also classify and improve the randomness of pseudo-random number sequences generated by iterating chaotic maps.

153 citations

Journal ArticleDOI
TL;DR: Experimental results show that the proposed method is robust to the linear and nonlinear attacks and the transparency of the watermarked images has been protected.
Abstract: In this paper, a novel robust color image watermarking method based on Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) is proposed. In this method, RGB cover image is divided into red, green and blue components. DCT and DWT are applied to each color components. Grayscale watermark image is scrambled by using Arnold transform. DCT is performed to the scrambled watermark image. Transformed watermark image is then divided into equal smaller parts. DCT coefficients of each watermark parts are embedded into four DWT bands of the color components of the cover image. The robustness of the proposed color image watermarking has been demonstrated by applying various image processing operations such as rotating, resizing, filtering, jpeg compression, and noise adding to the watermarked images. Experimental results show that the proposed method is robust to the linear and nonlinear attacks and the transparency of the watermarked images has been protected.

98 citations

Journal ArticleDOI
TL;DR: The experimental results demonstrate that the proposed scheme is imperceptible and robust against a variety of intentional or unintentional attacks.

74 citations

Journal ArticleDOI
TL;DR: Details of standard water marking system frameworks are given and some standard requirements that are used in designing watermarking techniques for several distinct applications are listed.
Abstract: Digital image authentication is an extremely significant concern for the digital revolution, as it is easy to tamper with any image. In the last few decades, it has been an urgent concern for researchers to ensure the authenticity of digital images. Based on the desired applications, several suitable watermarking techniques have been developed to mitigate this concern. However, it is tough to achieve a watermarking system that is simultaneously robust and secure. This paper gives details of standard watermarking system frameworks and lists some standard requirements that are used in designing watermarking techniques for several distinct applications. The current trends of digital image watermarking techniques are also reviewed in order to find the state-of-the-art methods and their limitations. Some conventional attacks are discussed, and future research directions are given.

72 citations