Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme

被引:0
|
作者
Jan Sher Khan
Sema Koç Kayhan
Saygin Siddiq Ahmed
Jawad Ahmad
Hafza Ayesha Siddiqa
Fawad Ahmed
Baraq Ghaleb
Ahmed Al Dubai
机构
[1] University of Gaziantep,Department of Electrical and Electronics
[2] Technical College of Kirkuk-Northern Technical University,School of Computing
[3] Edinburgh Napier University,Department of Electrical Engineering
[4] Fudan University,Department of Cyber Security, Pakistan Navy Engineering College
[5] NUST,undefined
来源
关键词
Watermarking; Chaos; PWLCM; LSBs; MSBs; Random numbers;
D O I
暂无
中图分类号
学科分类号
摘要
Due to the increased number of cyberattacks, numerous researchers are motivated towards the design of such schemes that can hide digital information in a signal. Watermarking is one of the promising technologies that can protect digital information. However, traditional watermarking schemes are either slow or less secure. In this paper, a dynamic S-Box based efficient watermarking scheme is presented. The original image was extracted at the receiver’s end without any loss of sensitive information. Firstly, the Secure Hash Algorithm is applied to the original image for the generation of the initial condition. Piece Wise Linear Chaotic Map is then used to generate 16  ×\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\times$$\end{document} 16 dynamic Substitution Box (S-Box). As an additional security feature, the watermark is substituted through dynamic S-Box. Hence, it is hard for the eavesdroppers to attack the proposed scheme due to the dynamic nature of S-Box. Lastly, lifting wavelet transform is applied to the host image and the High Low and High High blocks of host image are replaced with least significant bits and most significant bits of the substituted watermark, respectively. Robustness, efficiency and security of the proposed scheme is verified using Structure Similarity Index, Structure Dissimilarity Index, Structure Content, Mutual Information, energy, entropy, correlation tests and classical attacks analysis.
引用
收藏
页码:513 / 530
页数:17
相关论文
共 50 条
  • [1] Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme
    Khan, Jan Sher
    Kayhan, Sema Koc
    Ahmed, Saygin Siddiq
    Ahmad, Jawad
    Siddiqa, Hafza Ayesha
    Ahmed, Fawad
    Ghaleb, Baraq
    Al Dubai, Ahmed
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 125 (01) : 513 - 530
  • [2] PWLCM-Based Random Search for Strong Substitution-Box Design
    Ahmad, Musheer
    Rizvi, Danish Raza
    Ahmad, Zishan
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 1, 2016, 379 : 471 - 478
  • [3] Study on watermarking scheme using threshold value and S-Box
    Kang, Jungho
    Kim, Sungsoo
    Jun, Moonseog
    International Journal of Intelligent Information and Database Systems, 2014, 8 (02) : 174 - 187
  • [4] S-Box Construction Method Based on the Combination of Quantum Chaos and PWLCM Chaotic Map
    Peng, Jun
    Jin, Shangzhu
    Pang, Shaoning
    Zhang, Du
    Feng, Lixiao
    Li, Zuojin
    Wang, Yingxu
    INTERNATIONAL JOURNAL OF COGNITIVE INFORMATICS AND NATURAL INTELLIGENCE, 2021, 15 (04)
  • [5] A Dynamic S-Box Construction and Application Scheme of ZUC Based on Chaotic System
    Han Y.
    He Y.
    Liu P.
    Zhang D.
    Wang Z.
    He W.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (10): : 2147 - 2157
  • [6] A novel approach of audio watermarking based on S-box transformation
    Hussain, Iqtadar
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (3-4) : 963 - 969
  • [7] Secure image encryption scheme based on a new robust chaotic map and strong S-box
    Zhu, Shenli
    Deng, Xiaoheng
    Zhang, Wendong
    Zhu, Congxu
    MATHEMATICS AND COMPUTERS IN SIMULATION, 2023, 207 : 322 - 346
  • [8] On Dynamic chaotic S-BOX
    Zaibi, Ghada
    Kachouri, Abdennaceur
    Peyrard, Fabrice
    Fournier-Prunaret, Daniele
    2009 GLOBAL INFORMATION INFRASTRUCTURE SYMPOSIUM (GIIS 2009), 2009, : 51 - +
  • [9] Design and Analysis of Dynamic S-box Based on Feistel
    Du, Zhou-quan
    Xu, Qi-jian
    Zhang, Jie
    Li, Mu
    2015 IEEE ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2015, : 590 - 594
  • [10] A Watermarking Technique with Chaotic Fractional S-Box Transformation
    Jamal, Sajjad Shaukat
    Khan, Muhammad Usman
    Shah, Tariq
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (04) : 2033 - 2049