Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme

被引:0
|
作者
Jan Sher Khan
Sema Koç Kayhan
Saygin Siddiq Ahmed
Jawad Ahmad
Hafza Ayesha Siddiqa
Fawad Ahmed
Baraq Ghaleb
Ahmed Al Dubai
机构
[1] University of Gaziantep,Department of Electrical and Electronics
[2] Technical College of Kirkuk-Northern Technical University,School of Computing
[3] Edinburgh Napier University,Department of Electrical Engineering
[4] Fudan University,Department of Cyber Security, Pakistan Navy Engineering College
[5] NUST,undefined
来源
Wireless Personal Communications | 2022年 / 125卷
关键词
Watermarking; Chaos; PWLCM; LSBs; MSBs; Random numbers;
D O I
暂无
中图分类号
学科分类号
摘要
Due to the increased number of cyberattacks, numerous researchers are motivated towards the design of such schemes that can hide digital information in a signal. Watermarking is one of the promising technologies that can protect digital information. However, traditional watermarking schemes are either slow or less secure. In this paper, a dynamic S-Box based efficient watermarking scheme is presented. The original image was extracted at the receiver’s end without any loss of sensitive information. Firstly, the Secure Hash Algorithm is applied to the original image for the generation of the initial condition. Piece Wise Linear Chaotic Map is then used to generate 16  ×\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\times$$\end{document} 16 dynamic Substitution Box (S-Box). As an additional security feature, the watermark is substituted through dynamic S-Box. Hence, it is hard for the eavesdroppers to attack the proposed scheme due to the dynamic nature of S-Box. Lastly, lifting wavelet transform is applied to the host image and the High Low and High High blocks of host image are replaced with least significant bits and most significant bits of the substituted watermark, respectively. Robustness, efficiency and security of the proposed scheme is verified using Structure Similarity Index, Structure Dissimilarity Index, Structure Content, Mutual Information, energy, entropy, correlation tests and classical attacks analysis.
引用
收藏
页码:513 / 530
页数:17
相关论文
共 50 条
  • [41] Lightweight image encryption scheme for IoT environment and machine learning-driven robust S-box selection
    Shafique, Arslan
    Mehmood, Abid
    Alawida, Moatsum
    Khan, Abdul Nasir
    Shuja, Junaid
    TELECOMMUNICATION SYSTEMS, 2025, 88 (01)
  • [42] Implementation of AES S-Box Based on VHDL
    Yu, Zhichao
    INNOVATIVE COMPUTING AND INFORMATION, ICCIC 2011, PT I, 2011, 231 : 52 - 58
  • [43] A robust watermarking scheme based on mean quantization
    Huang, Song
    Zhang, Wei
    Wei, Pengcheng
    Liu, Zhen
    ICIEA 2008: 3RD IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, PROCEEDINGS, VOLS 1-3, 2008, : 264 - +
  • [44] A Robust Multiple Watermarking Scheme Based on the DWT
    Hana, Ouazzane
    Hela, Mahersia
    Kamel, Hamrouni
    2013 10TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS & DEVICES (SSD), 2013,
  • [45] A Robust Content-based Watermarking Scheme
    Wang, Xiang
    Guo, Zongming
    2009 IEEE INTERNATIONAL WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING (MMSP 2009), 2009, : 239 - 244
  • [46] A Robust Watermarking Scheme Based on Image Normalization
    Singh, Satendra Pal
    Bhatnagar, Gaurav
    2018 IEEE 14TH INTERNATIONAL COLLOQUIUM ON SIGNAL PROCESSING & ITS APPLICATIONS (CSPA 2018), 2018, : 140 - 144
  • [47] Review of Chaotic Based S-Box Structures
    Cengiz, Ayse
    Avci, Derya
    2019 7TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS), 2019,
  • [48] Robust image watermarking scheme based on subsampling
    Fu, YG
    Shen, RM
    Shen, LP
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2005, : 361 - 365
  • [49] A robust video watermarking scheme based on DCT
    Liu, LS
    Li, RH
    Gao, Q
    Proceedings of 2005 International Conference on Machine Learning and Cybernetics, Vols 1-9, 2005, : 5176 - 5180
  • [50] A Robust Mesh Watermarking Scheme Based on PCA
    Yang, Bin
    Li, Xiao-Qiang
    Li, Wei
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON IMAGE AND GRAPHICS (ICIG 2009), 2009, : 778 - 783