IEEE Access (Jan 2021)

A Residual Chaotic System for Image Security and Digital Video Watermarking

  • Guoxiang Tong,
  • Zhehua Liang,
  • Fengjun Xiao,
  • Naixue Xiong

DOI
https://doi.org/10.1109/ACCESS.2021.3108196
Journal volume & issue
Vol. 9
pp. 121154 – 121166

Abstract

Read online

Multimedia data security has become a noticeable problem in the continuous development of multimedia technology. Traditional chaotic systems usually require larger bit-width iterative calculations to affect the generation rate of chaotic systems when generating. To solve this problem, we proposed a general Residual Chaotic System (RCS) for image security in heterogeneous multimedia signal processing environments. Based on the Residue Number System (RNS) commonly used in VLSI, we generate the general chaotic sequences by iterating unary polynomial function through it in Galois Field (GF). Moreover, we make use of the Box-Muller algorithm to generate RCS, which improved the speed of operation by a large margin when doing R/B backward transformation. Experiments show that the key sensitivity and plaintext sensitivity of the proposed encryption system are good, and the system can encrypt pictures efficiently and safely. Then, we proposed a watermark embedding and extraction algorithm with block selection. Based on the proposed new judgment conditions, the $4\times 4$ brightness blocks are divided into five categories, then the appropriate types of blocks are selected accordingly. After testing the performance indexes of cypher-text images, including statistical and sensitivity-related tests, all results indicate that our algorithm has good randomness and security. The invisibility is good, the watermark capacity has been significantly improved, and the video bit-rate growth rate is in a good range. The watermark can resist attacks such as noise and the bit error rate under re-encoding and Gaussian low-pass filtering attacks. Compared with other algorithms, the algorithm that we proposed is faster, much more efficient, and more secure. Therefore, it is a practical alternative scheme for heterogeneous communication environments.

Keywords