Skip to main content
Top
Published in: Neural Computing and Applications 7-8/2014

01-12-2014 | Original Article

A color image watermarking scheme based on affine transformation and S 4 permutation

Authors: Syeda Iram Batool, Tariq Shah, Majid Khan

Published in: Neural Computing and Applications | Issue 7-8/2014

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this manuscript, we have proposed a novel methodology for watermarking which is a gigantic exploration territory that is dynamically developing. This scheme is basically based on applying the Galois field GF(24), S 4 permutation and least significant bits. The investigation of these methods prompts systems for assaults and countermeasures which are utilized to discover blames and limitations in applications, empowering the improvement of better ones. Computerized watermarking is distinctive relying upon its strategies and applications. The extent of this examination is invisible computerized image watermarking for color and gray-scale images. The exploratory consequences of the proposed strategies are dissected utilizing entropy, contrast, homogeneity, energy, means square error, root mean square error, mean absolute error, peak signal-to-noise ratio, universal image quality index, mutual information, structural similarity, structural dissimilarity and structure content are used to measure the similarity between the cover image and watermarked image.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T (2008) Digital watermarking and steganography, 2nd edn. Morgan Kaufmann Publisher, San Francisco, CA Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T (2008) Digital watermarking and steganography, 2nd edn. Morgan Kaufmann Publisher, San Francisco, CA
3.
go back to reference Ruanaidh JJKO, Dowling WJ, Boland FM (1996) Watermarking digital images for copyright protection. In: IEEE ProcVis. Image Signal Process, vol 143, No 4, pp 250–254 Ruanaidh JJKO, Dowling WJ, Boland FM (1996) Watermarking digital images for copyright protection. In: IEEE ProcVis. Image Signal Process, vol 143, No 4, pp 250–254
4.
go back to reference Cox IJ, Kilian J, Leighton T, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687CrossRef Cox IJ, Kilian J, Leighton T, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687CrossRef
5.
go back to reference Alghoniemy M, Tewfik AH (2004) Geometric invariance in image watermarking. IEEE Trans Image Process 13(2):145–153CrossRef Alghoniemy M, Tewfik AH (2004) Geometric invariance in image watermarking. IEEE Trans Image Process 13(2):145–153CrossRef
6.
go back to reference Yang Z, Campisi P, Kundur D (2004) Dual domain watermarking for authentication and compression of cultural heritage images. IEEE Trans Image Process 13(3):430–448CrossRef Yang Z, Campisi P, Kundur D (2004) Dual domain watermarking for authentication and compression of cultural heritage images. IEEE Trans Image Process 13(3):430–448CrossRef
7.
go back to reference Ruanaidh JJKO, Pereira S (1998) A secure robust digital image watermark. In: Proceedings of SPIE 3409, Electronic imaging: processing, printing, and publishing in color, 150. doi:10.1117/12.324106 Ruanaidh JJKO, Pereira S (1998) A secure robust digital image watermark. In: Proceedings of SPIE 3409, Electronic imaging: processing, printing, and publishing in color, 150. doi:10.​1117/​12.​324106
8.
go back to reference Venkatesan R, Jakubowski M (2000) Image watermarking with better resilience. In: Proceeds ICIP 2000 Venkatesan R, Jakubowski M (2000) Image watermarking with better resilience. In: Proceeds ICIP 2000
9.
go back to reference Barni M, Bartolini F, Piva A (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10:783–791CrossRefMATH Barni M, Bartolini F, Piva A (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10:783–791CrossRefMATH
10.
go back to reference Tefas A, Nikolaidis A, Nikolaidis N, Solachidis V, Tsekeridou S, Pitas I (2001) Statistical analysis of markov chaotic sequences for watermarking applications. In: Proceedings of IEEE international symposium on circuits and systems (ISCAS2001) Tefas A, Nikolaidis A, Nikolaidis N, Solachidis V, Tsekeridou S, Pitas I (2001) Statistical analysis of markov chaotic sequences for watermarking applications. In: Proceedings of IEEE international symposium on circuits and systems (ISCAS2001)
11.
go back to reference Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. J Pattern Recognit Soc 37:469–474CrossRefMATH Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. J Pattern Recognit Soc 37:469–474CrossRefMATH
12.
go back to reference Bamatraf A, Ibrahim R, Salleh M, Mohd N (2011) A new digital watermarking algorithm using combination of least significant bit (LSB) and inverse bit. J Comput 3:1–8 Bamatraf A, Ibrahim R, Salleh M, Mohd N (2011) A new digital watermarking algorithm using combination of least significant bit (LSB) and inverse bit. J Comput 3:1–8
13.
go back to reference Nikolaidis S, Pitas I (2008) Comparison of different chaotic maps with application to image watermarking. In: Proceedings of IEEE international symposium on circuits and system cryptography based on chaotic random maps with position dependent weighting probabilities Chaos, Solitons & Fractals 35 pp 362–369 Nikolaidis S, Pitas I (2008) Comparison of different chaotic maps with application to image watermarking. In: Proceedings of IEEE international symposium on circuits and system cryptography based on chaotic random maps with position dependent weighting probabilities Chaos, Solitons & Fractals 35 pp 362–369
14.
go back to reference Giovanardi A, Mazzini G (2001) Frequency domain chaotic watermarking. In: Proceedings of IEEE Symposium Circuits and System, Sydney, vol 2, pp 521–524 Giovanardi A, Mazzini G (2001) Frequency domain chaotic watermarking. In: Proceedings of IEEE Symposium Circuits and System, Sydney, vol 2, pp 521–524
15.
go back to reference Sujatha SS, Sathik MM (2012) A novel DWT based blind watermarking for image authentication. Int J Netw Secur 14(4):223–228 Sujatha SS, Sathik MM (2012) A novel DWT based blind watermarking for image authentication. Int J Netw Secur 14(4):223–228
16.
go back to reference Hsu CT, Wu JL (1998) DCT-based watermarking for video. IEEE Trans Consum Electron 44(1):206–216CrossRef Hsu CT, Wu JL (1998) DCT-based watermarking for video. IEEE Trans Consum Electron 44(1):206–216CrossRef
17.
go back to reference Cox IJ, Miller ML, Bloom JA (2001) Digital watermarking, 1st edn. Morgan Kaufmann Publisher, San Fransisco Cox IJ, Miller ML, Bloom JA (2001) Digital watermarking, 1st edn. Morgan Kaufmann Publisher, San Fransisco
18.
go back to reference Kutter M, Jordan F Digital watermarking technology. AlpVision, Switzerland, pp 1–4 Kutter M, Jordan F Digital watermarking technology. AlpVision, Switzerland, pp 1–4
19.
go back to reference Morimoto Norishige (1999) Digital watermarking technology with practical applications. Inf Sci 2:107–111 Morimoto Norishige (1999) Digital watermarking technology with practical applications. Inf Sci 2:107–111
20.
go back to reference Luo H, Chu SH, Lu ZM (2008) Self-embedding watermarking using half toning technique. Circuits Syst Signal Process 27:155–170CrossRefMathSciNet Luo H, Chu SH, Lu ZM (2008) Self-embedding watermarking using half toning technique. Circuits Syst Signal Process 27:155–170CrossRefMathSciNet
21.
go back to reference Lee YK, Bell G, Huang SY, Wang RZ, Shyu SJ (2009) An advanced least-significant-bit embedding scheme for steganographic encoding. Springer, Berlin Lee YK, Bell G, Huang SY, Wang RZ, Shyu SJ (2009) An advanced least-significant-bit embedding scheme for steganographic encoding. Springer, Berlin
22.
go back to reference Chandrasekharappa TGS, Prema KV, Shama K (2011) S-boxes generated using affine transformation giving maximum avalanche effect. Int J Comput Sci Eng 3:3185–3193 Chandrasekharappa TGS, Prema KV, Shama K (2011) S-boxes generated using affine transformation giving maximum avalanche effect. Int J Comput Sci Eng 3:3185–3193
23.
go back to reference Cid Carlos, Murphy Sean, Robshaw Matthew (2006) Algebraic Aspects of the advanced encryption standard. Springer, USMATH Cid Carlos, Murphy Sean, Robshaw Matthew (2006) Algebraic Aspects of the advanced encryption standard. Springer, USMATH
24.
go back to reference Haralick RM, Shanmugam K, Dinstein I (1973) Textural features for Image classification. IEEE Trans Syst Man Cybern 3:610–621CrossRef Haralick RM, Shanmugam K, Dinstein I (1973) Textural features for Image classification. IEEE Trans Syst Man Cybern 3:610–621CrossRef
25.
go back to reference Haralick RM (1979) Statistical and structural approaches to texture. Proc IEEE 67:786–804CrossRef Haralick RM (1979) Statistical and structural approaches to texture. Proc IEEE 67:786–804CrossRef
Metadata
Title
A color image watermarking scheme based on affine transformation and S 4 permutation
Authors
Syeda Iram Batool
Tariq Shah
Majid Khan
Publication date
01-12-2014
Publisher
Springer London
Published in
Neural Computing and Applications / Issue 7-8/2014
Print ISSN: 0941-0643
Electronic ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-014-1691-0

Other articles of this Issue 7-8/2014

Neural Computing and Applications 7-8/2014 Go to the issue

Premium Partner