A Novel Hybrid Watermarking scheme with Image authentication based on frequency domain, 2- Level SVD using chaotic map
DOI:
https://doi.org/10.4108/eai.13-7-2018.165512Keywords:
DCT, DWT, SVD, SHA-1, RSA, Arnold transform, Chaotic Map, Secret KeyAbstract
INTRODUCTION: In order to protect the owner’s visual multimedia data, various watermarking methods have introduced in the last few years. In image watermarking techniques, a secret watermark image inserted into another image. OBJECTIVES: The main aim of this paper is to implement an image watermarking technique having high security from stealing the information hidden in image and make the resultant image more robust against various attacks. METHODS: In this paper, frequency domain based techniques like DWT, DCT has used with 2 Level SVD and a new 3D discrete hyper chaotic map. The digital signature and other image parameters have appends in the watermark image to ensure the security and copyright protection of the original image using RSA, Arnold transforms, and SHA-1, techniques. At the receiver side, digital signature and information parameters have retrieved from the watermark image and identify to detect whether an unauthorized person attacks the watermark image or not. To verify the originality of image, the extracted information parameter, and the hash value of the extracted watermark have compared with the original value of the parameters and source hash value of the watermark image, respectively. The secret key used in the proposed scheme that makes the system more robust and adds security to the system. It helps to authenticate the originality of the received image. RESULTS: We compare the result with the present scheme proposed by Lin at el. The experiments have conducted to check various standard image processing attacks, and the watermark extraction process generates a high-quality image after different attacks. The primary purpose of the suggested watermarking scheme is to ensure reversibility and high security. CONCLUSION: The experimental outcomes confirmed that not only the recommended scheme attained higher robustness and imperceptibility in comparison to our earlier scheme. The Watermark image also recovered successfully with the known secret key.
Downloads
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 EAI Endorsed Transactions on Energy Web
This work is licensed under a Creative Commons Attribution 3.0 Unported License.
This is an open-access article distributed under the terms of the Creative Commons Attribution CC BY 3.0 license, which permits unlimited use, distribution, and reproduction in any medium so long as the original work is properly cited.