A chaotic map based DCT-SVD watermarking scheme for rightful ownership verification

A chaotic map-based hybrid watermarking scheme incorporating the concepts of the Discrete Cosine Transform (DCT) and exploiting the stability of the singular values has been proposed here. Homogeneity Analysis of the cover image has been done to chalk out appropriates sites for embedding and thereafter, a reference image has been obtained from it. The singular values of the reference image has been modified for embedding the secret information. The Chaotic map based scrambling enhances the security of the algorithm as only the rightful owner possessing the secret key, could retrieve the actual image. Comprehensive set of attacks has been applied and robustness tested with the Normalized Cross Correlation (NCC) and Peak Signal to Noise Ratio (PSNR) metric values. High values of these metrics signify the appropriateness of the proposed methodology.

[1]  Gregory K. Wallace,et al.  The JPEG still picture compression standard , 1992 .

[2]  W. C. Chu,et al.  DCT-based image watermarking using subsampling , 2003, IEEE Trans. Multim..

[3]  Jagdish Chandra Patra,et al.  A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression , 2010, Digit. Signal Process..

[4]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[5]  J. Maxwell A Treatise on Electricity and Magnetism , 1873, Nature.

[6]  B. Chandra Mohan,et al.  A Robust Image Watermarking Scheme using Singular Value Decomposition , 2008, J. Multim..

[7]  Ioannis Pitas,et al.  Robust image watermarking in the spatial domain , 1998, Signal Process..

[8]  Mauro Barni,et al.  A M.A.P. identification criterion for DCT-based watermarking , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[9]  Mauro Barni,et al.  A DCT-domain system for robust image watermarking , 1998, Signal Process..

[10]  Tieniu Tan,et al.  An SVD-based watermarking scheme for protecting rightful ownership , 2002, IEEE Trans. Multim..

[11]  Balasubramanian Raman,et al.  A publicly verifiable lossless watermarking scheme for copyright protection and ownership assertion , 2012 .

[12]  V. Groza,et al.  Hardware support of JPEG , 2005, Canadian Conference on Electrical and Computer Engineering, 2005..

[13]  Ja-Ling Wu,et al.  Hidden digital watermarks in images , 1999, IEEE Trans. Image Process..

[14]  Ioannis Pitas,et al.  A method for signature casting on digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[15]  Wu-Chih Hu,et al.  DCT-Based Watermarking By Quotient-Embedding Algorithm , 2008, 2008 3rd International Conference on Innovative Computing Information and Control.

[16]  Jiying Zhao,et al.  Human visual system based adaptive digital image watermarking , 2008, Signal Process..

[17]  Fernando Pérez-González,et al.  DCT-domain watermarking techniques for still images: detector performance analysis and a new structure , 2000, IEEE Trans. Image Process..

[18]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[19]  Mohammad S. Obaidat,et al.  Digital watermarking-based DCT and JPEG model , 2003, IEEE Trans. Instrum. Meas..

[20]  Shinfeng D. Lin,et al.  A robust DCT-based watermarking for copyright protection , 2000, 2000 Digest of Technical Papers. International Conference on Consumer Electronics. Nineteenth in the Series (Cat. No.00CH37102).