A Competent Hybrid Digital Image Watermarking Technique Based on Daubechies Wavelet and Block Bitmap Modification
DOI:
https://doi.org/10.47839/ijc.21.3.2685Keywords:
Hybrid Digital Image Watermarking, Daubechies Wavelet (DW), Block Bitmap Modification (BBM), Logistic Mapping, Lorenz MappingAbstract
Over many years, in order to provide powerful techniques for protecting digital copyrights, digital watermarking techniques have been developed. This research focuses on proposing an efficient blind hybrid digital image watermarking technique based on the transformation of Daubechies wavelet (DW) and Block Bitmap modification (BBM). DW represents an effective multi-determination frequency domain for including the watermarks. The BBM is used to afford an enhanced capability of embedding and minimize distortion. Two layers of security have been added to the proposed technique for protecting digital images from theft by using the logistic chaotic mapping to select the position of the blocks for the embedding process and Lorenz chaotic mapping for scrambling the watermark image. In the experiments, high values of peak signal to noise ratio (PSNR) and structural similarity index (SSIM) are obtained, and all the obtained results illustrate that the presented technique is highly imperceptible, secure, and robust.
References
D. Rayburn, Streaming and Digital Media: Understanding the Business and Technology, CRC Press, London, 2012. https://doi.org/10.4324/9780080476339.
S. M. Arora, “A DWT-SVD based robust digital watermarking for digital images,” Procedia Computer Science, no. 132, pp. 1441-1448, 2018. https://doi.org/10.1016/j.procs.2018.05.076.
M. Begum, M. S. Uddin, “Digital image watermarking techniques: a review,” Information, vol. 11, issue 2, 110, 2020. https://doi.org/10.3390/info11020110.
E. H. M. El-Shazly, Digital Image Watermarking in Transform Domains, Egypt, 2004.
H.-J. Ko, C.-T. Huang, G. Horng, S.-J. Wang, “Robust and blind image watermarking in DCT domain using inter-block coefficient correlation,” Information Sciences, vol. 517, pp. 128-147, 2020. https://doi.org/10.1016/j.ins.2019.11.005.
M. I. Khan, M. Rahman, M. Sarker, I. Hasan, “Digital watermarking for image authentication based on combined DCT, DWT and SVD transformation,” arXiv preprint arXiv:1307 6328, 2013.
J. Waleed, D. Huang, S. Hameed, “An optimized digital image watermarking technique based on cuckoo search (CS),” ICIC Express Letters. Part B, Applications: An International Journal of Research and Surveys, vol. 6, issue 10, pp. 2629-2634, 2015.
N. Al Bassam, V. Ramachandran, S. E. Parameswaran, Wavelet Theory and Application in Communication and Signal Processing, Open Access Peer-Reviewed Chapter, IntechOpen, 2021. https://doi.org/10.5772/intechopen.95047.
T. K. Araghi, A. A. Manaf, “An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD,” Future Generation Computer Systems, vol. 101, pp. 1223-1246, 2019. https://doi.org/10.1016/j.future.2019.07.064.
O. Jane, E. Elbaşi, “Hybrid non-blind watermarking based on DWT and SVD,” Journal of Applied Research and Technology, vol. 12, issue 4, pp. 750-761, 2014. https://doi.org/10.1016/S1665-6423(14)70091-4.
R. K. Arya, S. Singh, R. Saharan, “A secure non-blind block based digital image watermarking technique using DWT and DCT,” Proceedings of the 2015 IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2015, pp. 2042-2048. https://doi.org/10.1109/ICACCI.2015.7275917.
P. Saravanan, M. Sreekara, K. Manikantan, “Digital image watermarking using Daubechies wavelets,” Proceedings of the 2016 3rd IEEE International Conference on Signal Processing and Integrated Networks (SPIN), 2016, pp. 57-62. https://doi.org/10.1109/SPIN.2016.7566662.
T. K. Al-Shayea, C. X. Mavromoustakis, G. Mastorakis, J. M. Batalla, E. K. Markakis, E. Pallis, “On the efficiency evaluation of a novel scheme based on Daubechies wavelet for watermarking in 5G,” Proceedings of the 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2018, pp. 1-6. https://doi.org/10.1109/CAMAD.2018.8514968.
U. A. Waqas, M. Khan, S.I. Batool, “A new watermarking scheme based on Daubechies wavelet and chaotic map for quick response code images,” Multimedia Tools and Applications, vol. 79, pp. 6891-6914, 2019. https://doi.org/10.1007/s11042-019-08570-5.
J. Wang, Z. Du, “A method of processing color image watermarking based on the Haar wavelet,” Journal of Visual Communication and Image Representation, vol. 64, article 102627, 2019. https://doi.org/10.1016/j.jvcir.2019.102627.
A. Mohanarathinam, S. Kamalraj, G. P. Venkatesan, R. V. Ravi, C. S. Manikandababu, “Digital watermarking techniques for image security: a review,” Journal of Ambient Intelligence and Humanized Computing, pp. 1-9, 2019. https://doi.org/10.1007/s12652-019-01500-1.
Y. Liu, S. Tang, R. Liu, L. Zhang, Z. Ma, “Secure and robust digital image watermarking scheme using logistic and RSA encryption,” Expert Systems with Applications, vol. 97, pp. 95-105, 2018. https://doi.org/10.1016/j.eswa.2017.12.003.
V. S. Verma, and R. K. Jha, “An overview of robust digital image watermarking,” IETE Technical review, vol. 32, issue 6, pp. 479-496, 2015. https://doi.org/10.1080/02564602.2015.1042927.
R. M. May, “Simple mathematical models with very complicated dynamics,” In: Hunt, B.R., Li, TY., Kennedy, J.A., Nusse, H.E. (eds) The Theory of Chaotic Attractors. Springer, New York, NY, 2004, pp. 85–93. https://doi.org/10.1007/978-0-387-21830-4_7.
M. Alawida, A. Samsudin, W. H. Alshoura, “Enhancing one-dimensional chaotic map based on bitstream dividing model,” Proceedings of the 2019 8th International Conference on Software and Computer Applications, 2019, pp. 130-134. https://doi.org/10.1145/3316615.3316657.
J. Zheng, R. Lu, L. Sun, S. Zhuang, “Low-noise multiple watermarks technology based on complex double random phase encoding method,” Proceedings of the Information Optics and Optical Data Storage, SPIE. Digital library, 2010, vol. 7851, paper 78511E. https://doi.org/10.1117/12.881230.
O. M. Al-Hazaimeh, M. F. Al-Jamal, N. Alhindawi, A. Omari, “Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys,” Neural Computing and Applications, vol. 31, pp. 2395-2405, 2017. https://doi.org/10.1007/s00521-017-3195-1.
J. Abraham, V. Paul, “An imperceptible spatial domain color image watermarking scheme,” Journal of King Saud University – Computer and Information Sciences, vol. 31, issue 1, pp. 125-133, 2019. https://doi.org/10.1016/j.jksuci.2016.12.004.
J. S. Teh, and A. Samsudin, “A chaos-based authenticated cipher with associated data,” Security and Communication Networks, 2017. https://doi.org/10.1155/2017/9040518.
J. S. Teh, A. Samsudin, and A. Akhavan, “Parallel chaotic hash function based on the shuffle-exchange network,” Nonlinear Dynamics, vol. 81, issue 3, pp. 1067-1079, 2015. https://doi.org/10.1007/s11071-015-2049-6.
H. Zhang, Z. Li, X. Liu, C. Wang, X. Wang, “Robust image watermarking algorithm based on QWT and QSVD using 2D Chebyshev-Logistic map,” Journal of the Franklin Institute, vol. 359, issue 2, pp. 1755-1781, 2022. https://doi.org/10.1016/j.jfranklin.2021.11.027.
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.