Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme

被引:0
|
作者
Jan Sher Khan
Sema Koç Kayhan
Saygin Siddiq Ahmed
Jawad Ahmad
Hafza Ayesha Siddiqa
Fawad Ahmed
Baraq Ghaleb
Ahmed Al Dubai
机构
[1] University of Gaziantep,Department of Electrical and Electronics
[2] Technical College of Kirkuk-Northern Technical University,School of Computing
[3] Edinburgh Napier University,Department of Electrical Engineering
[4] Fudan University,Department of Cyber Security, Pakistan Navy Engineering College
[5] NUST,undefined
来源
Wireless Personal Communications | 2022年 / 125卷
关键词
Watermarking; Chaos; PWLCM; LSBs; MSBs; Random numbers;
D O I
暂无
中图分类号
学科分类号
摘要
Due to the increased number of cyberattacks, numerous researchers are motivated towards the design of such schemes that can hide digital information in a signal. Watermarking is one of the promising technologies that can protect digital information. However, traditional watermarking schemes are either slow or less secure. In this paper, a dynamic S-Box based efficient watermarking scheme is presented. The original image was extracted at the receiver’s end without any loss of sensitive information. Firstly, the Secure Hash Algorithm is applied to the original image for the generation of the initial condition. Piece Wise Linear Chaotic Map is then used to generate 16  ×\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\times$$\end{document} 16 dynamic Substitution Box (S-Box). As an additional security feature, the watermark is substituted through dynamic S-Box. Hence, it is hard for the eavesdroppers to attack the proposed scheme due to the dynamic nature of S-Box. Lastly, lifting wavelet transform is applied to the host image and the High Low and High High blocks of host image are replaced with least significant bits and most significant bits of the substituted watermark, respectively. Robustness, efficiency and security of the proposed scheme is verified using Structure Similarity Index, Structure Dissimilarity Index, Structure Content, Mutual Information, energy, entropy, correlation tests and classical attacks analysis.
引用
收藏
页码:513 / 530
页数:17
相关论文
共 50 条
  • [31] Group-Action-Based S-box Generation Technique for Enhanced Block Cipher Security and Robust Image Encryption Scheme
    Baowidan, Souad Ahmad
    Alamer, Ahmed
    Hassan, Mudassir
    Yousaf, Awais
    SYMMETRY-BASEL, 2024, 16 (08):
  • [32] Robust image encryption scheme based on 6D hyper-chaos and DPA-resistant S-box
    Khadem, Behrooz
    Gholamzadeh, Mohammad
    Ahmad, Musheer
    Ansari, Zamir Ahmad
    PHYSICA SCRIPTA, 2025, 100 (03)
  • [33] An image encryption scheme based on a modified AES algorithm by using a variable S-box
    A. Hadj Brahim
    A. Ali Pacha
    N. Hadj Said
    Journal of Optics, 2024, 53 : 1170 - 1185
  • [34] A novel block encryption scheme based on chaos and an S-box for wireless sensor networks
    Tong Xiao-Jun
    Wang Zhu
    Zuo Ke
    CHINESE PHYSICS B, 2012, 21 (02)
  • [35] A novel block encryption scheme based on chaos and an S-box for wireless sensor networks
    佟晓筠
    王翥
    左科
    Chinese Physics B, 2012, (02) : 175 - 186
  • [36] An Efficient Image Encryption Scheme Based on the LSS Chaotic Map and Single S-Box
    Lu, Qing
    Zhu, Congxu
    Deng, Xiaoheng
    IEEE ACCESS, 2020, 8 : 25664 - 25678
  • [37] An image encryption scheme based on a modified AES algorithm by using a variable S-box
    Brahim, A. Hadj
    Pacha, A. Ali
    Said, N. Hadj
    JOURNAL OF OPTICS-INDIA, 2024, 53 (02): : 1170 - 1185
  • [38] Chaos-based color image block encryption scheme using S-box
    Liu, Hongjun
    Kadir, Abdurahman
    Niu, Yujun
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2014, 68 (07) : 676 - 686
  • [39] Selective image encryption scheme based on DWT, AES S-box and chaotic permutation
    Belazi, Akram
    El-Latif, Ahmed A. Abd
    Rhouma, Rhouma
    Belghith, Safya
    2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, : 606 - 610
  • [40] Image encryption algorithm based on total shuffling scheme and chaotic S-box transformation
    Hussain, Iqtadar
    Shah, Tariq
    Gondal, Muhammad Asif
    JOURNAL OF VIBRATION AND CONTROL, 2014, 20 (14) : 2133 - 2136