Double random number encryption blind watermarking technique based on DWT-DCT domain

Chenglong Wang , Yi Ma , Xia Wang

Optoelectronics Letters ›› 2024, Vol. 20 ›› Issue (10) : 614 -622.

PDF
Optoelectronics Letters ›› 2024, Vol. 20 ›› Issue (10) : 614 -622. DOI: 10.1007/s11801-024-3203-5
Article

Double random number encryption blind watermarking technique based on DWT-DCT domain

Author information +
History +
PDF

Abstract

Blind watermarking plays a significant role in copyright protection and information hiding. To enhance the security of watermark image information, a dual encryption method is proposed, which combines block shuffling with Logistic chaos encryption using two sets of random numbers as keys. This dual encryption technique is applied to blind watermark images, utilizing a combination of discrete wavelet transform (DWT) and discrete cosine transform (DCT) as the embedding method. First, the watermark image is divided into small blocks, which are shuffled and rearranged using one set of random numbers as the key, while recording the shuffling sequence of block positions. Subsequently, the shuffled blocks are reassembled into an image, and another set of random numbers is used as the key for Logistic chaos encryption, rendering the watermark image chaotically invisible. Then, a double DWT is applied to the carrier image, followed by a DCT, allowing the encrypted watermark image to be embedded. This achieves the concealment of the blind watermark. Experimental results demonstrate that this method exhibits robustness, excellent invisibility, and secrecy.

Cite this article

Download citation ▾
Chenglong Wang, Yi Ma, Xia Wang. Double random number encryption blind watermarking technique based on DWT-DCT domain. Optoelectronics Letters, 2024, 20(10): 614-622 DOI:10.1007/s11801-024-3203-5

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

LiX Y. Research on high-capacity information hiding method for digital images, 2021, Zhengzhou, Strategic Support Forces Information Engineering University[D]

[2]

LiuF. Research on digital watermarking algorithm of encrypted image in transform domain, 2009, Jinan, Shandong Normal University[D]

[3]

DingY Y, LiuZ. Analysis and comparison of three frequency domain digital watermarking algorithms. Packaging engineering, 2011, 32(05):103-107[J]

[4]

CoxI J, KilianJ, LeightonF T, et al.. Secure spread spectrum watermarking for multimedia. IEEE transactions on image processing, 1997, 6(12):1673-1687 J]

[5]

SuP, KuoC J, WangH M. Blind digital watermarking for cartoon and map images. Security and watermarking of multimedia contents, 1999, 3657: 296-306 J]

[6]

WangH Y, ZhangX T, ChenS Y, et al.. A blind watermarking algorithm based on specific component quantization in DHT domain. Optik, 2023, 281: 170792 J]

[7]

TangZ W, ChaiX L, LuY, et al.. An end-to-end screen shooting resilient blind watermarking scheme for medical images. Journal of information security and applications, 2023, 76: 103547 J]

[8]

RoyM, ThounaojamD M, PalS. A perceptual hash based blind-watermarking scheme for image authentication. Expert systems with applications, 2023, 227: 120237 J]

[9]

QuL F, HeH J, ChenF, et al.. Security analysis of image encryption algorithm based on block modulation-scrambling. Computer research and development, 2021, 58(04):849-861[J]

[10]

ZhangR R, CaoC J, ZhouJ. Image encryption algorithm based on random diffusion and bit-level block disambiguation. Digital printing, 2021, 215(06):38-44[J]

[11]

QuL F, ChenF, HongJ, et al.. Security analysis of image encryption algorithm based on bit plane-block disruption. Journal of applied science, 2019, 37(05):631-642[J]

[12]

YeG. A novel Logistic-based image encryption scheme. ICIC express letters, 2010, 4(3):979-984[J]

[13]

LiuG Z, WuQ, WangG Y, et al.. An improved Logistic chaotic map and its application in image encryption and hiding. Journal of electronics and information technology, 2022, 44: 1-8[J]

[14]

XuC B, LiJ L, XuH N. A multi scroll system and its application for image encryption based on Logistic level pulse. Journal of electronics and information technology, 2022, 44(12):4328-4336[J]

[15]

ZhangZ, WangC, ZhouX. Image watermarking scheme based on Arnold transform and DWT-DCT-SVD. 2016 IEEE 13th International Conference on Signal Processing (ICSP), November 6–10, 2016, Chengdu, China, 2016, New York, IEEE: 805-810[C]

[16]

GuoX F, LiH H, WeiJ Y. Image encryption scheme based on Fibonacci transform and improved Logistic-Tent chaotic map. Journal of Jilin University (engineering edition), 2023, 53(07):2115-2120[J]

[17]

LiZ Y, ZhangH, LiuX L, et al.. Blind and safety-enhanced dual watermarking algorithm with chaotic system encryption based on RHFM and DWT-DCT. Digital signal processing, 2021, 115: 103062 J]

[18]

SundaramG, PannaB, JhaR K, et al.. Image encryption based on fractional discrete cosine transform and DWT with interplane arrangements in dost domain. IET image processing, 2022, 17(4):1195-1207 J]

[19]

NayakD, RayK, KarT, et al.. Walsh-Hadamard kernel feature-based image compression using DCT with bi-level quantization. Computers, 2022, 11(7):100 J]

[20]

DingY, DuanZ K, LiS. 2D arcsine and sine combined Logistic map for image encryption. The visual computer, 2022, 39(4): 1517-1532[J]

[21]

KongL J, NieP. A holographic watermarking technique based on DWT-DCT transform domain. Journal of optoelectronics·laser, 2016, 27(02):198-202[J]

[22]

FengQ B, ZhangX, ZhengC, et al.. CNN-based method for dual-layer liquid crystal displays. Acta photonica sinica, 2023, 52(8):146-155[J]

[23]

TanX D, ZhaoQ, WenM Z, et al.. Hybrid image watermarking algorithm based on BEMD, DCT and SVD. Journal of Zhejiang University (science edition), 2023, 50(04):442-454[J]

AI Summary AI Mindmap
PDF

172

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/