scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

A new watermarking method based on chaotic maps

30 Jun 2004-Vol. 2, pp 939-942
TL;DR: Simulation results show that the proposed digital watermarking system is feasible and robust to common signal processing procedures and exhibits better protection than water marking systems using only one chaotic map.
Abstract: This paper presents a new digital watermarking method based on chaotic maps. Different from most of the existing chaotic watermarking methods, two chaotic maps are incorporated into the watermarking system to resolve the finite word length effect and to improve the system's resistance to attacks. One map is used for watermark generation, another as the private key. Simulation results show that the proposed digital watermarking system is feasible and robust to common signal processing procedures. In addition, it performs better than existing watermarking schemes and exhibits better protection than watermarking systems using only one chaotic map
Citations
More filters
Journal ArticleDOI
TL;DR: A novel chaotic secure content-based hidden transmission scheme of biometric data to improve the security and secrecy of the transmitted templates and is comparable with other methods found in the current literature.
Abstract: The large-scale proliferation of biometric verification systems creates a demand for effective and reliable security and privacy of its data. Like passwords and PIN codes, biometric data is also not secret and if it is compromised, the integrity of the whole verification system could be at high risk. To address these issues, this paper presents a novel chaotic secure content-based hidden transmission scheme of biometric data. Encryption and data hiding techniques are used to improve the security and secrecy of the transmitted templates. Secret keys are generated by the biometric image and used as the parameter value and initial condition of the chaotic map, and each transaction session has different secret keys to protect from the attacks. Two chaotic maps are incorporated for the encryption to resolve the finite word length effect and to improve the system’s resistance against attacks. Encryption is applied on the biometric templates before hiding into the cover/host images to make them secure, and then templates are hidden into the cover image. Experimental results show that the security, performance, and accuracy of the presented scheme are encouraging comparable with other methods found in the current literature.

66 citations

Book ChapterDOI
13 Dec 2004
TL;DR: A new chaotic watermarking and steganography method to protect biometric data, which is sent over the networks for personal identification, which can provide high accuracy of extracted watermarked data even under different noises and distortions.
Abstract: This paper presents a new chaotic watermarking and steganography method to protect biometric data, which is sent over the networks for personal identification Unlike other methods, we utilized two keys, one for encrypting the biometric template before embedding, which makes our method more secure and another for watermark embedding that makes our method more robust The proposed method does not require original biometric image for the extraction of watermarked data, and can provide high accuracy of extracted watermarked data even under different noises and distortions Experimental results show that the performance of the proposed method is encouraging comparable with other methods found in the current literature and can be used in a practical system.

35 citations


Cites methods from "A new watermarking method based on ..."

  • ...We utilized Logistic chaotic map to generate a sequence of real numbers [ 7 ]:...

    [...]

  • ...In recent years, chaotic maps have been used for digital watermarking, to increase the security [ 7 ]....

    [...]

Journal ArticleDOI
TL;DR: A novel semi-fragile and self-recoverable watermarking algorithm based on a group quantization and double authentication method that improves the image localization accuracy and randomly permuting coefficients among a group and image robustness.
Abstract: Semi-fragile self-recoverable watermarking algorithms are important to meet various requirements such as security, robustness, localization, and image recovery. However, current approaches are not adequate for this importance. Thus, we propose a novel semi-fragile and self-recoverable watermarking algorithm based on a group quantization and double authentication method. In the proposed algorithm, a target image is first split into 16 ×16 image blocks. For each image block, a five-bit authentication watermark is generated from the first-order statistical moment of the block and then is embedded into the mid-frequency band of another image block by a novel group-based wavelet quantization method. With the generated watermarks, image security is enhanced by randomly permuting coefficients among a group and image robustness is improved by embedding the watermark in the largest coefficient inside a sub-group by significant difference parity quantization. The proposed double authentication ring structure effectively improves the image localization accuracy. Recovered image is a better approximate to the original image. Experimental comparisons of ours with other algorithms shows the effectiveness of the proposed self-recoverable and semi-fragile watermarking algorithm.

31 citations

Journal ArticleDOI
TL;DR: A wavelet quantization based watermarking approach is proposed to adaptively distribute watermark energy on significant DWT coefficients of fingerprint images to guarantee the robustness and capacity of watermark while preserving the discriminating features of host fingerprints.
Abstract: As malicious attacks greatly threaten the security and reliability of biometric systems, ensuring the authenticity of biometric data is becoming increasingly important In this paper we propose a watermarking-based two-stage authentication framework to address this problem During data collection, face features are embedded into a fingerprint image of the same individual as data credibility token and secondary authentication source At the first stage of authentication, the credibility of input data is established by checking the validness of extracted patterns Due to the specific characteristics of face watermarks, the face detection based classification strategies are introduced for reliable watermark verification instead of conventional correlation based watermark detection If authentic, the face patterns can further serve as supplemental identity information to facilitate subsequential biometric authentication In this framework, one critical issue is to guarantee the robustness and capacity of watermark while preserving the discriminating features of host fingerprints Hence a wavelet quantization based watermarking approach is proposed to adaptively distribute watermark energy on significant DWT coefficients of fingerprint images Experimental results which evaluate both watermarking and biometric authentication performance demonstrate the effectiveness of this work

28 citations

Book ChapterDOI
03 Jun 2007
TL;DR: Simulation results show that the proposed digital watermarking scheme is effective and robust to commonly used image processing operations.
Abstract: This paper presents a novel spatial domain watermarking scheme based on chaotic maps. Two chaotic maps are employed in our scheme, which is different from most of the existing chaotic watermarking methods, 1-D Logistic map is used to encrypt the watermark signal, and generalized 2-D Arnold cat map is used to encrypt the embedding position of the host image. Simulation results show that the proposed digital watermarking scheme is effective and robust to commonly used image processing operations.

28 citations


Cites background from "A new watermarking method based on ..."

  • ...Many different watermarking schemes are proposed in recent years [ 1-4 ], which can be classified into two categories: the spatial domain [5] and the frequency domain [6-9] watermarking....

    [...]

References
More filters
Journal ArticleDOI
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Abstract: This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data. We advocate that a watermark should be constructed as an independent and identically distributed (i.i.d.) Gaussian random vector that is imperceptibly inserted in a spread-spectrum-like fashion into the perceptually most significant spectral components of the data. We argue that insertion of a watermark under this regime makes the watermark robust to signal processing operations (such as lossy compression, filtering, digital-analog and analog-digital conversion, requantization, etc.), and common geometric transformations (such as cropping, scaling, translation, and rotation) provided that the original image is available and that it can be successfully registered against the transformed watermarked image. In these cases, the watermark detector unambiguously identifies the owner. Further, the use of Gaussian noise, ensures strong resilience to multiple-document, or collusional, attacks. Experimental results are provided to support these claims, along with an exposition of pending open problems.

6,194 citations


"A new watermarking method based on ..." refers methods in this paper

  • ...3 by the RST-invariant watermarking scheme reported in [8]....

    [...]

Book
24 Oct 2001
TL;DR: Digital Watermarking covers the crucial research findings in the field and explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.
Abstract: Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital Watermarking covers the crucial research findings in the field: it explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied. As a result, additional groundwork is laid for future developments in this field, helping the reader understand and anticipate new approaches and applications.

2,849 citations

Journal ArticleDOI

322 citations

Journal ArticleDOI
TL;DR: It is argued that more robustness can be achieved if watermarks are embedded in dc components since dc components have much larger perceptual capacity than any ac components and a new embedding strategy for watermarking is proposed based on a quantitative analysis on the magnitudes of DCT components of host images.
Abstract: Both watermark structure and embedding strategy affect robustness of image watermarks. Where should watermarks be embedded in the discrete cosine transform (DCT) domain in order for the invisible image watermarks to be robust? Though many papers in the literature agree that watermarks should be embedded in perceptually significant components, dc components are explicitly excluded from watermark embedding. In this letter, a new embedding strategy for watermarking is proposed based on a quantitative analysis on the magnitudes of DCT components of host images. We argue that more robustness can be achieved if watermarks are embedded in dc components since dc components have much larger perceptual capacity than any ac components. Based on this idea, an adaptive watermarking algorithm is presented. We incorporate the feature of texture masking and luminance masking of the human visual system into watermarking. Experimental results demonstrate that the invisible watermarks embedded with the proposed watermark algorithm are very robust.

281 citations

Journal ArticleDOI
TL;DR: Based on log-polar mapping (LPM) and phase correlation, the paper presents a novel digital image watermarking scheme that is invariant to rotation, scaling, and translation (RST).
Abstract: Based on log-polar mapping (LPM) and phase correlation, the paper presents a novel digital image watermarking scheme that is invariant to rotation, scaling, and translation (RST). We embed a watermark in the LPMs of the Fourier magnitude spectrum of an original image, and use the phase correlation between the LPM of the original image and the LPM of the watermarked image to calculate the displacement of watermark positions in the LPM domain. The scheme preserves the image quality by avoiding computing the inverse log-polar mapping (ILPM), and produces smaller correlation coefficients for unwatermarked images by using phase correlation to avoid exhaustive search. The evaluations demonstrate that the scheme is invariant to rotation and translation, invariant to scaling when the scale is in a reasonable range, and very robust to JPEG compression.

182 citations