A secure blind watermarking scheme based on DCT domain of the scrambled image

This paper investigates a secure blind watermarking scheme. The main idea of the scheme not only protects the watermark information but also the embedding positions. To achieve a higher level of security, we propose a sub key generation mechanism based on the singular value decomposition and hash function, where sub keys depend on both the main key and the feature codes of the original image. The different sub keys ensure that the embedding positions are randomly selected for different original images. Watermark is embedded in the Discrete Cosine Transform (DCT) coefficients of the scrambled original image. Simulation results show that such embedded method resolves well the contradiction of imperceptibility and robustness. Based on good correlation properties of chaotic sequences, we design a detection method, which can accurately compute geometric transformation (rotation and translation transformations) parameters. The security analysis, including key space analysis, key sensitivity analysis, cryptanalysis, and the comparison results demonstrate that the proposed watermarking scheme also achieves high security.

[1]  No Value,et al.  IEEE International Conference on Image Processing , 2003 .

[2]  Javaid A. Sheikh,et al.  Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing , 2016, Digit. Signal Process..

[3]  Ton Kalker,et al.  Considerations on watermarking security , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).

[4]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[5]  S. Behnia,et al.  Multiple-watermarking scheme based on improved chaotic maps , 2010 .

[6]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[7]  Tiegang Gao,et al.  A novel reversible robust watermarking algorithm based on chaotic system , 2013, Digit. Signal Process..

[8]  N. Venkateswaran,et al.  Secured medical image watermarking with DNA codec , 2015, Multimedia Tools and Applications.

[9]  Kwok-Tung Lo,et al.  Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2011, Signal Process..

[10]  Mehdi Khalili,et al.  DCT-Arnold chaotic based watermarking using JPEG-YCbCr , 2015 .

[11]  H. Dai,et al.  Robust blind image watermarking based on chaotic mixtures , 2015 .

[12]  Nikolaos G. Bourbakis,et al.  A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2008, Signal Process. Image Commun..

[13]  Fernando Pérez-González,et al.  Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis , 2005, Information Hiding.

[14]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[15]  Ingemar J. Cox,et al.  Watermarking Is Not Cryptography , 2006, IWDW.

[16]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[17]  Fernando Pérez-González,et al.  Security of Lattice-Based Data Hiding Against the Known Message Attack , 2006, IEEE Transactions on Information Forensics and Security.

[18]  Fernando Pérez-González,et al.  Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack , 2008, IEEE Transactions on Information Forensics and Security.

[19]  Teddy Furon,et al.  A New Measure of Watermarking Security: The Effective Key Length , 2013, IEEE Transactions on Information Forensics and Security.

[20]  Dong Ni,et al.  Optimal image watermarking scheme based on chaotic map and quaternion wavelet transform , 2014 .

[21]  Sajjad Shaukat Jamal,et al.  An efficient scheme for digital watermarking using chaotic map , 2013 .

[22]  Xiaomin Wang,et al.  Secure chaotic system with application to chaotic ciphers , 2013, Inf. Sci..

[23]  François Cayre,et al.  Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding , 2008, IEEE Transactions on Information Forensics and Security.

[24]  C. Fontaine,et al.  Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.

[25]  Sodeif Ahadpour,et al.  Design and implementation of coupled chaotic maps in watermarking , 2014, Appl. Soft Comput..