CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Hybrid Security System based on Wavelet Domain Watermarking and Chaotic Map Cryptography

by Majdi Al-qdah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 110 - Number 13
Year of Publication: 2015
Authors: Majdi Al-qdah
10.5120/19373-9190

Majdi Al-qdah . Hybrid Security System based on Wavelet Domain Watermarking and Chaotic Map Cryptography. International Journal of Computer Applications. 110, 13 ( January 2015), 1-6. DOI=10.5120/19373-9190

@article{ 10.5120/19373-9190,
author = { Majdi Al-qdah },
title = { Hybrid Security System based on Wavelet Domain Watermarking and Chaotic Map Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { January 2015 },
volume = { 110 },
number = { 13 },
month = { January },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume110/number13/19373-9190/ },
doi = { 10.5120/19373-9190 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:46:13.768634+05:30
%A Majdi Al-qdah
%T Hybrid Security System based on Wavelet Domain Watermarking and Chaotic Map Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 110
%N 13
%P 1-6
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents a novel hybrid security system that combines wavelet based watermarking with block based chaotic maps cryptography. A watermark is chaotically encrypted before being embedded in the detail coefficients of the wavelet transformed cover image. Using the developed system, the potential of embedding more than one watermark inside one cover image is investigated. The results indicate that combining watermarking and cryptography gives an added layer of security. Also, even though embedding more than one watermark is more robust to attacks it can potentially distort small size cover images.

References
  1. Dachselt, F. Schwartz W, "Chaos and Cryptography", IEEE Transactions on Circuits and Systems, 2001, vol. 48.
  2. T. Habutsu, Y. Nishio, I. Sasase, and S. Mori, "A Secret key cryptosystem by iterating a chaotic map" in Proceeding Advances in Crytology - EUROCRPT 91. Berlin, Germany: Springer-Verlag, 1991.
  3. Jiri Fridrich, "Image Encryption Based On Chaotic Maps", Department of Systems Science and Industrial Engineering & Center for Intelligent Systems SUNY Binghamton, Binghamton, NY 13902-6000, USA, 1997
  4. M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, "Lossless Generalized-LSB Data Embedding", IEEE Transactions on Image Processing, 14(2), pp. 253-266, 2005.
  5. J. Tian. "Reversible Data Embedding Using a Difference Expansion. " IEEE Transactions on Circuits and Systems for Video Technology, 13(8), pp. 890-896, 2003.
  6. W. Hong, T. –S. Chen, Y, -P. Chang, and C. –W. Shiu, "A High Capacity Reversible Data Hiding Scheme Using Orthogonal Projection Error Modification", Signal Processing, 90, pp. 2911-2922, 2010.
  7. C. –C. Chang, C. –C. Lin, Y. Lin, Y. –H. Chen, "Reversible Data Embedding Scheme Using Differences Between Original and Predicted Pixel Values", IET Information Security, 2(2). Pp 35-46, 2008.
  8. Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, "Reversible Data Hiding," IEEE Transactions on Circuits and Systems for Video Technology, 16(3), pp. 354-362, 2006.
  9. M. Cancellaro, F. Battisti, M. Carli, G. Boato, F. G. B. Natale, and A. Neri, "A Commutative Digital Image Watermarking and Encryption Method in the Tree Structured Haar Transform Domain," Signal Processing: Image Communication, 26(1). pp. 1-12, 2011
  10. Weiwei Xiao, Zhen Ji, Jihong Zhang, Weiying Wu, "A watermarking algorithm based on chaotic encryption". Faculty of information engineering, Shenzhen University, Shenzhen, China, Proceeding of IEEE TENCON 2002
  11. Huang-Pei Xiao Guo-Ji Zhang "An Image Encryption Scheme Based On Chaotic Systems", IEEE Proceedings of the Fifth International Conference on Machine Learning and Cybernetics, Dalian, 13-16 August 2006.
  12. Mazleena Salleh Suhariah Ihrahim Ismail Fauzi lsnin, "Enhanced Chaotic Image Encryption Algorithm Based On Baker's Map", Department of Communication and Computer System, Faculty of computer Science and Information System, Universiti Teknologi Malaysia, Skudai 81 300, Johore, Malaysia. IEEE 2003
  13. Harsh Varma, Abhishek Singh, Raman Kumar,"Robsutness of Digital Image Watermarking Technique against brightness and rotation attacks", International Journal of Computer Science and Information Security (IJCSIS), vol. 1, no. 1, 2009.
  14. Zhou Wang1, Eero P. Simoncelli1 and Alan C. Bovik "Multi-Scale Structural Similarity for Image Quality Assessment", Proceeding of the 37th IEEE A silomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, Nov. 9-12, 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Watermarking cryptography chaos Wavelets multi-regions attacks.