Open Access   Article Go Back

Hybrid Technique for Improving the Watermarking and Encryption Scheme for Online Multimedia Copyright Protection to using Chaotic Maps Cryptography

J. Udayakumar1 , G. Prabakaran2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-11 , Page no. 482-490, Nov-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i11.482490

Online published on Nov 30, 2018

Copyright © J. Udayakumar, G. Prabakaran . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: J. Udayakumar, G. Prabakaran, “Hybrid Technique for Improving the Watermarking and Encryption Scheme for Online Multimedia Copyright Protection to using Chaotic Maps Cryptography,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.482-490, 2018.

MLA Style Citation: J. Udayakumar, G. Prabakaran "Hybrid Technique for Improving the Watermarking and Encryption Scheme for Online Multimedia Copyright Protection to using Chaotic Maps Cryptography." International Journal of Computer Sciences and Engineering 6.11 (2018): 482-490.

APA Style Citation: J. Udayakumar, G. Prabakaran, (2018). Hybrid Technique for Improving the Watermarking and Encryption Scheme for Online Multimedia Copyright Protection to using Chaotic Maps Cryptography. International Journal of Computer Sciences and Engineering, 6(11), 482-490.

BibTex Style Citation:
@article{Udayakumar_2018,
author = {J. Udayakumar, G. Prabakaran},
title = {Hybrid Technique for Improving the Watermarking and Encryption Scheme for Online Multimedia Copyright Protection to using Chaotic Maps Cryptography},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {6},
Issue = {11},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {482-490},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3193},
doi = {https://doi.org/10.26438/ijcse/v6i11.482490}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i11.482490}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3193
TI - Hybrid Technique for Improving the Watermarking and Encryption Scheme for Online Multimedia Copyright Protection to using Chaotic Maps Cryptography
T2 - International Journal of Computer Sciences and Engineering
AU - J. Udayakumar, G. Prabakaran
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 482-490
IS - 11
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
381 279 downloads 105 downloads
  
  
           

Abstract

Encryption and watermarking are two innovative techniques that are used for protecting the traditional multimedia files. In this research paper, a proposed hybrid encryption-watermarking algorithm for content copyright protection is proposed. The watermarking steps of this proposed algorithm is based on combining the three techniques like Discrete Wavelet Transform (DWT), the Discrete Cosine Transform (DCT), and the Singular Value Decomposition(SVD), while the encryption phase is based on using different chaotic maps with different dimensions to improve the performance of algorithms efficiency. The proposed watermarking scheme uses a new PN-codes for embedding strategy of the watermark into the cover image. This scheme allows to decreasing the embedding strength factor of the scheme to a value that maximizes imperceptibility performance, while maintaining acceptable robustness and imperceptibility measures of the watermarking scheme. The performance of the proposed watermarking scheme is implemented individually based on the metrics like robustness and the imperceptibility measures. This scheme is compared with some very recent existing algorithms and experimental results show the improvements of the proposed algorithm over other important algorithms. On the other hand, the proposed chaos-based encryption algorithms used different chaotic maps of different dimensions to improve the performance of algorithms efficiency. The proposed encryption algorithm is tested using different set of experiments. The experimental results demonstrate that the proposed encryption algorithm research shows advantages of large key space, high resistance against differential attacks and high security analysis such as (i)Statistical analysis, and (ii)Sensitivity analysis. Compared to some traditional and recent encryption algorithms, our proposed encryption algorithm is much more secure. Finally experimental test demonstrate that the proposed hybrid encryption-watermarking algorithm introduces high degree of efficiency, robustness, and security as compared to previously developed techniques/algorithms.

Key-Words / Index Term

Chaotic maps, Encryption, Digital Watermarking, Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), Singular Value Decomposition (SVD)

References

[1] Dongyan Wang, Fanfan Yang, and Heng Zhang, "Blind Color Image Watermarking Based on DWT and LU Decomposition ," Journal of Information Processing Systems, vol. 12, no. 4, pp. 765~778, 2016.
[2] Y.-M. Chu, N.-F.Huang, and S.-H. Lin, “Quality of service provision in cloud-based storage system for multimedia delivery,” IEEE Systems Journal, vol. 8, no. 1, pp. 292–303, 2014.
[3] I. Hussain, T. Shah, M. A. Gondal, and H. Mahmood, “An efficient approach for the construction of LFT S-boxes using chaotic logistic map,” Nonlinear Dynamics, vol. 71, no. 1-2, pp. 133–140, 2013.
[4] I. Hussain, A. Anees, M. Aslam, R. Ahmed, and N. Siddiqui, “A noise resistant symmetric key cryptosystem based on S-Boxes and chaotic maps,” The European Physical Journal Plus, vol. 133, no. 4, 2018.
[5] I. Hussain, A. Anees, A. H. AlKhaldi, A. Algarni, and M. Aslam, “Construction of chaotic quantum magnets and matrix Lorenz systems S-boxes and their applications,” Chinese Journal of Physics, 2018.
[6] I. Hussain, A. Anees, and A. Algarni, “A novel algorithm for thermal image encryption,” Journal of integrative neuroscience, pp. 1–15, 2018.
[7] A. Anees, A.M. Siddiqui, and F. Ahmed, “Chaotic substitution for highly autocorrelated data in encryption algorithm,” Communications in Nonlinear Science andNumerical Simulation, vol. 19, no. 9, pp. 3106–3118, 2014.
[8] T. T. Mapoka, S. J. Shepherd, and R. A. Abd-Alhameed, “A new multiple service key management scheme for secure wireless mobile multicast,” IEEE Transactions onMobile Computing, vol. 14, no. 8, pp. 1545–1559, 2015.
[9] A. Anees, W. A. Khan, M. A. Gondal, and I. Hussain, “Application of mean of absolute deviation method for the selection of best nonlinear component based on video encryption,”Zeitschrift fur Naturforschung - Section A Journal of Physical Sciences, vol. 68, no. 6-7, pp. 479–482, 2013.
[10] H. Liu and X. Wang, “Color image encryption based on onetime keys and robust chaotic maps,” Computers & Mathematics with Applications. An International Journal, vol. 59, no. 10, pp. 3320–3327, 2010.
[11] A. Anees and Z. Ahmed, “A Technique for Designing Substitution Box Based on Van der Pol Oscillator,” Wireless Personal Communications, vol. 82, no. 3, pp. 1497–1503, 2015.
[12] J. Daemen and V. Rijmen, The Design of Rijndael: AES-The Advanced Encryption Standard, Springer, Berlin, Germany, 2002.
[13] A. Anees andM. A. Gondal, “Construction of Nonlinear Component for Block Cipher Based on One-Dimensional Chaotic Map,” 3D Research, vol. 6, no. 2, 2015.
[14] A. Anees and A. M. Siddiqui, “A technique for digital watermarking in combined spatial and transform domains using chaotic maps,” in Proceedings of the 2013 2nd National Conference on Information Assurance, NCIA 2013, pp. 119–124, pak, December 2013.
[15] S. S. Jamal, M. U. Khan, and T. Shah, “A Watermarking Technique with Chaotic Fractional S-Box Transformation,” Wireless Personal Communications, vol. 90, no. 4, pp. 2033–2049, 2016.
[16] S. S. Jamal, T. Shah, and I. Hussain, “An efficient scheme for digital watermarking using chaotic map,” Nonlinear Dynamics, vol. 73, no. 3, pp. 1469–1474, 2013.
[17] X. Wang and D. Chen, “A parallel encryption algorithm based on piecewise linear chaotic map,” Mathematical Problems in Engineering, vol. 2013, 2013.
[18] A. Anees, A. M. Siddiqui, J. Ahmed, and I. Hussain, “A technique for digital steganography using chaotic maps,” Nonlinear Dynamics, vol. 75, no. 4, pp. 807–816, 2014.
[19] F. Ahmed, A. Anees, V. U. Abbas, and M. Y. Siyal, “A noisy channel tolerant image encryption scheme,” Wireless Personal Communications, vol. 77, no. 4, pp. 2771–2791, 2014.
[20] F. Ahmed and A. Anees, “Hash-Based Authentication of Digital Images in Noisy Channels,” Robust Image Authentication in the Presence of Noise, pp. 1–42, 2015.
[21] Wang XY, Zhang HL. A color image encryption with heterogeneous bit- permutation and correlated chaos. Opt Commun2015; 342:51–60.
[22] Wang XY, Liu LT, Zhang YQ. A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 2015; 66:10–8.
[23] Abuturab MR. an asymmetric single-channel color image encryption based on Hartley transform and gyrator transform. Opt Lasers Eng 2015; 69:49–57.
[24] Xu, Lu, et al. "A novel bit-level image encryption algorithm based on chaotic maps." Optics and Lasers in Engineering 78 (2016): 17-25.
[25] Zhang YQ, Wang XY. Asymmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice.InfSci2014; 273(20):329–51.
[26] Zhenjun Tang, JuanSong, Xianquan Zhang, Ronghai Sun, “Multiple-image encryption with bit-plane decomposition and chaotic maps”, Optics and Lasers in Engineering, Volume 80, May 2016
[27] Benyamin Norouzi, Sattar Mirzakuchaki, “Breaking an Image Encryption Algorithm based on the New Substitution Stage with Chaotic Functions”, Optik - International Journal for Light and Electron Optics 127(14), Volume 127, Issue 14, July 2016
[28] Adrian-Viorel Dianconu, “Circular inter-intra bit-level permutation and chaos-based image encryption”, Information Sciences, Volumes 355–356, Elsevier, August 2016
[29] XiaoweiLi, ChengqingLi, In-Kwon Lee, “Chaotic image encryption using pseudo-random masks and pixel mapping”, European Association for Signal Processing, Volume 125, Elsevier, August 2016
[30] Wenhao Liu, Kehui Sun, Congxu Zhu, “A fast image encryption algorithm based on chaotic map”, Elsevier, 2016
[31] Akram Belazi, Ahmed A. Abd El-Latif, Safya Belghith, “A novel image encryption scheme based on substitution-permutation network and chaos”, European Association for Signal Processing, Elsevier, 2016
[32] Khadijeh Mirzaei Talarposhti, Mehrzad Khaki Jamei, “A secure image encryption method based on dynamic harmony search (DHS) combined with chaotic map”, Optics and Lasers in Engineering, Volume 81, Elsevier, 2016.