Journal ArticleDOI
An efficient scheme for digital watermarking using chaotic map
TLDR
Simulation results reveal that the proposed technique is feasible and watermarks are indiscernible, and illustrate that mean of energy, correlation, contrast, and homogeneity analyses of the proposed algorithm are quite optimal.Abstract:
This paper presents the new digital watermarking algorithm based on the chaotic map. Data can easily be hidden in images by using the least significant bits. In the anticipated algorithm, the logistic map is employed for locating embedding positions of chaotic watermark generation and a novel watermarking scheme is proposed. Simulation results reveal that the proposed technique is feasible and watermarks are indiscernible. The results illustrate that mean of energy, correlation, contrast, and homogeneity analyses of the proposed algorithm are quite optimal.read more
Citations
More filters
Journal ArticleDOI
Novel image encryption algorithm based on cycle shift and chaotic system
TL;DR: The simulation experiments and theoretical analyses indicate that the proposed scheme is superior and able to resist exhaustive attack and statistical attack.
Journal ArticleDOI
A novel scheme for image encryption using substitution box and chaotic system
TL;DR: This article uses chaotic system along with substitution box for image encryption to demonstrate resistance against image processing attacks and shows relatively improved results.
Journal ArticleDOI
An efficient technique for the construction of substitution box with chaotic partial differential equation
TL;DR: A novel formation of the nonlinear component of block cipher by merging two different structures namely the Kuramoto–Sivashinsky equation as a chaotic system and the Galois field as an algebraic structure is proposed.
Journal ArticleDOI
Robust blind image watermarking using crisscross inter-block prediction in the DCT domain
Ling-Yuan Hsu,Hwai-Tsu Hu +1 more
TL;DR: The proposed algorithm exceeds the performance of the seven other schemes in providing robust resistance to variety of attacks, particularly those associated with Gaussian noise and speckle noise.
Journal ArticleDOI
Construction of Cryptographic S-Boxes Based on Mobius Transformation and Chaotic Tent-Sine System
TL;DR: The chaotic behavior of the improved Tent-Sine map is conferred and ultimately a new method to construct substitution-boxes is proposed, which explores the features of chaos through TSS map and algebraic Mobius transformation to generate strong S-boxes.
References
More filters
Journal ArticleDOI
Secure spread spectrum watermarking for multimedia
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Book
Digital Watermarking
TL;DR: Digital Watermarking covers the crucial research findings in the field and explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.
Journal ArticleDOI
DCT-domain watermarking techniques for still images: detector performance analysis and a new structure
TL;DR: Analysis of a spread-spectrum-like discrete cosine transform (DCT) domain watermarking technique for copyright protection of still digital images is analyzed and analytical expressions for performance measures are derived and contrasted with experimental results.
Journal ArticleDOI
Selective image encryption using a spatiotemporal chaotic system.
TL;DR: A universal selective image encryption algorithm, in which the spatiotemporal chaotic system is utilized, is proposed to encrypt gray-level images and is extended to encrypt RGB color images, showing high security and efficiency.
Journal ArticleDOI
A novel digital watermark algorithm based on chaotic maps
TL;DR: Simulation results demonstrate that the watermark generated with the proposed algorithm is invisible and theWatermarking scheme is robust against common image processing operations, such as JPEG compression, filtering, Gaussian noise pollution, cropping and rotation and so on.