Protection-Enhanced Watermarking Scheme Combined with Non-linear Systems

Communication of the images over the network calls for an approach to ensure security and ownership protection while exchanging images over the network. This paper proposes an improved blind watermarking scheme capable of offering image authentication, protection, and detachment avoidance between th...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE access 2023-01, Vol.11, p.1-1
Hauptverfasser: Nazir, Hira, Ullah, Muhammad Sami, Qadri, Salman, Arshad, Humaira, Husnain, Mujtaba, Razzaq, Abdul, Nawaz, Syed Ali
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Communication of the images over the network calls for an approach to ensure security and ownership protection while exchanging images over the network. This paper proposes an improved blind watermarking scheme capable of offering image authentication, protection, and detachment avoidance between the watermark and its corresponding image. The proposed technique is composed of three modules; generator, protector, and resizer. The generator deals with embedding and extracting the watermark from the host image. Protector deals with encryption and decryption using a high dimensional chaotic system. And resizer deals with compressing and decompressing the watermarked image. The novelty related scientific literature is the encryption of Singular Value Decomposition (SVD) components, and watermark in a criss-cross manner using logistic map along with hyperchaotic system to achieve the confidentiality and avoid false positive problem (FPP). Whereas, embedding into RGB (red, green, blue components) is centered on singular value decomposition and level-2 Discrete Wavelet Transform. The joint operation is performed at sender's side and receiver's side, i.e., encryption, embedding, and compression is performed at sender's side whereas decompression and decryption procedures are performed at the receiver's side. Additionally, compressing the data reduces the higher bandwidth requirements. The performance of the proposed scheme is based on subjective and objective evaluation. Experimental results such as PSNR (peak signal-to-noise ratio), NC (normalized correlation), BER (bit error rate), CR (compression ratio), NPCR (number of pixel change rate), and SSIM (structural similarity index) indicate that the proposed technique approaches the standard main level.
ISSN:2169-3536
2169-3536
DOI:10.1109/ACCESS.2023.3263492