EAI Endorsed Transactions on Energy Web (Jan 2021)

A Novel Hybrid Watermarking scheme with Image authentication based on frequency domain, 2- Level SVD using chaotic map

  • Shahzad Alam,
  • Tanvir Ahmad,
  • M. Doja

DOI
https://doi.org/10.4108/eai.13-7-2018.165512
Journal volume & issue
Vol. 8, no. 31

Abstract

Read online

INTRODUCTION: In order to protect the owner’s visual multimedia data, various watermarking methods have introducedin the last few years. In image watermarking techniques, a secret watermark image inserted into another image.OBJECTIVES: The main aim of this paper is to implement an image watermarking technique having high security fromstealing the information hidden in image and make the resultant image more robust against various attacks.METHODS: In this paper, frequency domain based techniques like DWT, DCT has used with 2 Level SVD and a new 3Ddiscrete hyper chaotic map. The digital signature and other image parameters have appends in the watermark image toensure the security and copyright protection of the original image using RSA, Arnold transforms, and SHA-1, techniques.At the receiver side, digital signature and information parameters have retrieved from the watermark image and identify todetect whether an unauthorized person attacks the watermark image or not. To verify the originality of image, the extractedinformation parameter, and the hash value of the extracted watermark have compared with the original value of theparameters and source hash value of the watermark image, respectively. The secret key used in the proposed scheme thatmakes the system more robust and adds security to the system. It helps to authenticate the originality of the receivedimage.RESULTS: We compare the result with the present scheme proposed by Lin at el. The experiments have conducted tocheck various standard image processing attacks, and the watermark extraction process generates a high-quality imageafter different attacks. The primary purpose of the suggested watermarking scheme is to ensure reversibility and highsecurity.CONCLUSION: The experimental outcomes confirmed that not only the recommended scheme attained higher robustnessand imperceptibility in comparison to our earlier scheme. The Watermark image also recovered successfully with theknown secret key.

Keywords