33
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A Robust Watermarking Scheme for Online Multimedia Copyright Protection Using New Chaotic Map

      1 , 2 , 3 , 4
      Security and Communication Networks
      Hindawi Limited

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The protection of copyrights of digital media uploaded to the Internet is a growing problem. In this paper, first, we present a unified framework for embedding and detecting watermark in digital data. Second, a new robust watermarking scheme is proposed considering this concern. The proposed work incorporates three chaotic maps which specify the location for embedding the watermark. Third, a new chaotic map, the Extended Logistic map, is proposed in this work. The proposed map has a bigger range than logistic and cubic maps. It has shown good results in a bifurcation, sensitivity to initial conditions, and randomness tests. Furthermore, with the detailed analysis of initial parameters, it is justified that Extended Logistic map can be used in secure communication, particularly watermarking. Fourth, to check the robustness of proposed watermarking scheme, we have done a series of analyses and standard attacks. The results confirm that the proposed watermarking scheme is robust against visual and statistical analysis and can resist the standard attacks.

          Related collections

          Most cited references24

          • Record: found
          • Abstract: not found
          • Article: not found

          Synchronization in chaotic systems

            Bookmark
            • Record: found
            • Abstract: found
            • Article: not found

            Secure spread spectrum watermarking for multimedia.

            This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data. We advocate that a watermark should be constructed as an independent and identically distributed (i.i.d.) Gaussian random vector that is imperceptibly inserted in a spread-spectrum-like fashion into the perceptually most significant spectral components of the data. We argue that insertion of a watermark under this regime makes the watermark robust to signal processing operations (such as lossy compression, filtering, digital-analog and analog-digital conversion, requantization, etc.), and common geometric transformations (such as cropping, scaling, translation, and rotation) provided that the original image is available and that it can be successfully registered against the transformed watermarked image. In these cases, the watermark detector unambiguously identifies the owner. Further, the use of Gaussian noise, ensures strong resilience to multiple-document, or collusional, attacks. Experimental results are provided to support these claims, along with an exposition of pending open problems.
              Bookmark
              • Record: found
              • Abstract: not found
              • Book: not found

              The Design of Rijndael

                Bookmark

                Author and article information

                Journal
                Security and Communication Networks
                Security and Communication Networks
                Hindawi Limited
                1939-0114
                1939-0122
                June 28 2018
                June 28 2018
                : 2018
                : 1-20
                Affiliations
                [1 ]Department of Electrical Engineering, HITEC University, Pakistan
                [2 ]Department of Mathematics, College of Science, King Khalid University, Abha, Saudi Arabia
                [3 ]College of Computer Science, King Khalid University, Abha, Saudi Arabia
                [4 ]Department of Mathematics, Quaid-i-Azam University, Islamabad, Pakistan
                Article
                10.1155/2018/1840207
                1ad3e35b-3d0d-467d-a55c-046c202ffa40
                © 2018

                http://creativecommons.org/licenses/by/4.0/

                History

                Comments

                Comment on this article