A novel reversible robust watermarking algorithm based on chaotic system

被引:49
作者
Gu, Qiaolun [2 ]
Gao, Tiegang [1 ]
机构
[1] Nankai Univ, Coll Software, Tianjin 300071, Peoples R China
[2] Tianjin Univ Technol & Educ, Sch Informat Technol Engn, Tianjin 300222, Peoples R China
关键词
Reversible watermarking algorithm; Chaotic system; Integer wavelet transform; Chaos optimization; Robustness; AUTHENTICATION;
D O I
10.1016/j.dsp.2012.07.013
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
080906 [电磁信息功能材料与结构]; 082806 [农业信息与电气工程];
摘要
Reversible watermarking can be applied to the protection for important digital media, such as medical and military image. it allows the watermark to be extracted and the original image to be restored completely, but reversible watermarking with stronger robustness is seldom discussed in existing literature. In this paper, a novel reversible watermarking algorithm based on chaotic system is proposed: chaotic system is not only used to search space of reversibility of the scheme, but also used to randomly select the position of watermarking embedding. Consequently, the proposed scheme achieves larger threshold space of reversibility and better performance of security. For some specific thresholds, the proposed algorithm is not only reversible, but also has stronger robustness against image compression. The experimental results show that the ergodicity and sensitivity to initial values of chaotic system play an important role in reversible watermarking algorithm, and the proposed scheme can achieve balance between reversibility and robustness with the help of chaotic system. (C) 2012 Elsevier Inc. All rights reserved.
引用
收藏
页码:213 / 217
页数:5
相关论文
共 17 条
[1]
Multiple-watermarking scheme based on improved chaotic maps [J].
Behnia, S. ;
Teshnehlab, M. ;
Ayubi, P. .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2010, 15 (09) :2469-2478
[2]
Adaptive watermark mechanism for rightful ownership protection [J].
Chang, Chin-Chen ;
Lin, Pei-Yu .
JOURNAL OF SYSTEMS AND SOFTWARE, 2008, 81 (07) :1118-1129
[3]
Cu Q.L., 2009, P INT C INF ENG COMP, V3, P1676
[4]
Analysis and design of secure watermark-based authentication systems [J].
Fei, Chuhong ;
Kundur, Deepa ;
Kwong, Raymond H. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (01) :43-55
[5]
A new image encryption algorithm based on hyper-chaos [J].
Gao, Tiegang ;
Chen, Zengqiang .
PHYSICS LETTERS A, 2008, 372 (04) :394-400
[6]
A novel image authentication scheme based on hyper-chaotic cell neural network [J].
Gao, Tiegang ;
Gu, Qiaolun ;
Emmanuel, Sabu .
CHAOS SOLITONS & FRACTALS, 2009, 42 (01) :548-553
[7]
HONSINGER C, 1999, Patent No. 6278791
[8]
Jun Xiao, 2008, 2008 International Conference on Computer Science and Software Engineering (CSSE 2008), P579, DOI 10.1109/CSSE.2008.331
[9]
Li B, 1998, CYBERNET SYST, V29, P409, DOI 10.1080/019697298125678
[10]
A novel fast image encryption scheme based on 3D chaotic baker maps [J].
Mao, YB ;
Chen, GR ;
Lian, SG .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2004, 14 (10) :3613-3624