Double random number encryption blind watermarking technique based on DWT-DCT domain

Chenglong Wang, Yi Ma, Xia Wang

Optoelectronics Letters ›› 2024, Vol. 20 ›› Issue (10) : 614-622. DOI: 10.1007/s11801-024-3203-5
Article

Double random number encryption blind watermarking technique based on DWT-DCT domain

Author information +
History +

Abstract

Blind watermarking plays a significant role in copyright protection and information hiding. To enhance the security of watermark image information, a dual encryption method is proposed, which combines block shuffling with Logistic chaos encryption using two sets of random numbers as keys. This dual encryption technique is applied to blind watermark images, utilizing a combination of discrete wavelet transform (DWT) and discrete cosine transform (DCT) as the embedding method. First, the watermark image is divided into small blocks, which are shuffled and rearranged using one set of random numbers as the key, while recording the shuffling sequence of block positions. Subsequently, the shuffled blocks are reassembled into an image, and another set of random numbers is used as the key for Logistic chaos encryption, rendering the watermark image chaotically invisible. Then, a double DWT is applied to the carrier image, followed by a DCT, allowing the encrypted watermark image to be embedded. This achieves the concealment of the blind watermark. Experimental results demonstrate that this method exhibits robustness, excellent invisibility, and secrecy.

Cite this article

Download citation ▾
Chenglong Wang, Yi Ma, Xia Wang. Double random number encryption blind watermarking technique based on DWT-DCT domain. Optoelectronics Letters, 2024, 20(10): 614‒622 https://doi.org/10.1007/s11801-024-3203-5

References

[[1]]
Li X Y. . Research on high-capacity information hiding method for digital images, 2021 Zhengzhou Strategic Support Forces Information Engineering University [D]
[[2]]
Liu F. . Research on digital watermarking algorithm of encrypted image in transform domain, 2009 Jinan Shandong Normal University [D]
[[3]]
Ding Y Y, Liu Z. Analysis and comparison of three frequency domain digital watermarking algorithms. Packaging engineering, 2011, 32(05): 103-107 [J]
[[4]]
Cox I J, Kilian J, Leighton F T, et al.. Secure spread spectrum watermarking for multimedia. IEEE transactions on image processing, 1997, 6(12): 1673-1687, J]
CrossRef Google scholar
[[5]]
Su P, Kuo C J, Wang H M. Blind digital watermarking for cartoon and map images. Security and watermarking of multimedia contents, 1999, 3657: 296-306, J]
CrossRef Google scholar
[[6]]
Wang H Y, Zhang X T, Chen S Y, et al.. A blind watermarking algorithm based on specific component quantization in DHT domain. Optik, 2023, 281: 170792, J]
CrossRef Google scholar
[[7]]
Tang Z W, Chai X L, Lu Y, et al.. An end-to-end screen shooting resilient blind watermarking scheme for medical images. Journal of information security and applications, 2023, 76: 103547, J]
CrossRef Google scholar
[[8]]
Roy M, Thounaojam D M, Pal S. A perceptual hash based blind-watermarking scheme for image authentication. Expert systems with applications, 2023, 227: 120237, J]
CrossRef Google scholar
[[9]]
Qu L F, He H J, Chen F, et al.. Security analysis of image encryption algorithm based on block modulation-scrambling. Computer research and development, 2021, 58(04): 849-861 [J]
[[10]]
Zhang R R, Cao C J, Zhou J. Image encryption algorithm based on random diffusion and bit-level block disambiguation. Digital printing, 2021, 215(06): 38-44 [J]
[[11]]
Qu L F, Chen F, Hong J, et al.. Security analysis of image encryption algorithm based on bit plane-block disruption. Journal of applied science, 2019, 37(05): 631-642 [J]
[[12]]
Ye G. A novel Logistic-based image encryption scheme. ICIC express letters, 2010, 4(3): 979-984 [J]
[[13]]
Liu G Z, Wu Q, Wang G Y, et al.. An improved Logistic chaotic map and its application in image encryption and hiding. Journal of electronics and information technology, 2022, 44: 1-8 [J]
[[14]]
Xu C B, Li J L, Xu H N. A multi scroll system and its application for image encryption based on Logistic level pulse. Journal of electronics and information technology, 2022, 44(12): 4328-4336 [J]
[[15]]
Zhang Z, Wang C, Zhou X. Image watermarking scheme based on Arnold transform and DWT-DCT-SVD. 2016 IEEE 13th International Conference on Signal Processing (ICSP), November 6–10, 2016, Chengdu, China, 2016 New York IEEE 805-810 [C]
[[16]]
Guo X F, Li H H, Wei J Y. Image encryption scheme based on Fibonacci transform and improved Logistic-Tent chaotic map. Journal of Jilin University (engineering edition), 2023, 53(07): 2115-2120 [J]
[[17]]
Li Z Y, Zhang H, Liu X L, et al.. Blind and safety-enhanced dual watermarking algorithm with chaotic system encryption based on RHFM and DWT-DCT. Digital signal processing, 2021, 115: 103062, J]
CrossRef Google scholar
[[18]]
Sundaram G, Panna B, Jha R K, et al.. Image encryption based on fractional discrete cosine transform and DWT with interplane arrangements in dost domain. IET image processing, 2022, 17(4): 1195-1207, J]
CrossRef Google scholar
[[19]]
Nayak D, Ray K, Kar T, et al.. Walsh-Hadamard kernel feature-based image compression using DCT with bi-level quantization. Computers, 2022, 11(7): 100, J]
CrossRef Google scholar
[[20]]
Ding Y, Duan Z K, Li S. 2D arcsine and sine combined Logistic map for image encryption. The visual computer, 2022, 39(4): 1517-1532 [J]
[[21]]
Kong L J, Nie P. A holographic watermarking technique based on DWT-DCT transform domain. Journal of optoelectronics·laser, 2016, 27(02): 198-202 [J]
[[22]]
Feng Q B, Zhang X, Zheng C, et al.. CNN-based method for dual-layer liquid crystal displays. Acta photonica sinica, 2023, 52(8): 146-155 [J]
[[23]]
Tan X D, Zhao Q, Wen M Z, et al.. Hybrid image watermarking algorithm based on BEMD, DCT and SVD. Journal of Zhejiang University (science edition), 2023, 50(04): 442-454 [J]

Accesses

Citations

Detail

Sections
Recommended

/