IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 6 - Issue 6, June 2017 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



The Secure Watermarking Of Digital Color Images By Using A Combination Of Chaotic Mapping

[Full Text]

 

AUTHOR(S)

Arezoo Nouri Heydarlo, Amin Babazadeh Sangar, Sajjad Aghania

 

KEYWORDS

Watermarking, chaos mapping, digital images, Logistics.

 

ABSTRACT

With the development of computer networks and data editing programs, the possibility of transferring or investigating digital data identity has encountered some difficulties. In this paper, some information is placed within images by using watermarking to verify the identity of images that will be destroyed by editing any of this information. Additionally, the slightest change watermarking methods that use chaotic maps are provided to enhance the sensitivity of these data. Then, a new method is proposed to insert one or two logo in a cover image and finally the necessary tests will apply on images. The proposed test and comparing the proposed approach with other methods show the high sensitivity and successful application of this method in images.

 

REFERENCES

[1]. Lei, B., Tan, E.-L., Chen, S., Ni, D., Wang, T., & Lei, H. (2014). Reversible watermarking scheme for medical image based on differential evolution. Expert Systems with Applications, 41(7), 3178-3188.

[2]. Bansal, N., Deolia, V. K., Bansal, A., & Pathak, P. (2014). Digital Image Watermarking Using Least Significant Bit Technique in Different Bit Positions. Paper presented at the Computational Intelligence and Communication Networks (CICN), 2014 International Conference on.

[3]. Moniruzzaman, M., Hawlader, M. A. K., & Hossain, M. F. (2014, May). An image fragile watermarking scheme based on chaotic system for image tamper detection. In Informatics, Electronics & Vision (ICIEV), 2014 International Conference on (pp. 1-6). IEEE.

[4]. Munir, R. (2015, May). A chaos-based fragile watermarking method in spatial domain for image authentication. In Intelligent Technology and Its Applications (ISITIA), 2015 International Seminar on (pp. 227-232). IEEE.

[5]. Tong, X., Liu, Y., Zhang, M., & Chen, Y. (2013). A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Processing: Image Communication, 28(3), 301-308.

[6]. Gao, G. (2013). Composite chaos-based lossless image authentication and tamper localization. Multimedia tools and applications, 63(3), 947-964.

[7]. May, R. M. (1976). Simple mathematical models with very complicated dynamics. Nature, 261(5560), 459-467.

[8]. Peitgen, H.-O., Richter, P. H., & Schultens, H. (1986). The beauty of fractals: images of complex dynamical systems: Springer-Verlag Berlin.

[9]. Caragata, D., El Assad, S., & Luduena, M. (2015). An improved fragile watermarking algorithm for JPEG images. AEU-International Journal of Electronics and Communications, 69(12), 1783-1794.

[10]. Teng, L., Wang, X., & Wang, X. (2013). Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme. AEU-International Journal of Electronics and Communications, 67(6), 540-547.

[11]. Xiao, D., & Shih, F. Y. (2012). An improved hierarchical fragile watermarking scheme using chaotic sequence sorting and subblock post-processing. Optics Communications, 285(10), 2596-2606.

[12]. Chang, C.-C., Chen, K.-N., Lee, C.-F., & Liu, L.-J. (2011). A secure fragile watermarking scheme based on chaos-and-hamming code. Journal of Systems and Software, 84(9), 1462-1470.

[13]. Wu, X., & Guan, Z.-H. (2007). A novel digital watermark algorithm based on chaotic maps. Physics Letters A, 365(5), 403-406.