Abstract
With the widespread of the Internet and the rapid growth of technologies, several challenges face data hiding process. Although watermarking is widely used to hide/embed critical data into a cover image, the watermarked image may be attacked/hacked and the embedded data may be extracted or damaged. This paper presents an efficient two-level security approach to protect colored watermark images. In the first level, the color image is embedded into a grayscale image using a multi-level Discrete Wavelet Transform (DWT), Singular Value Decomposition (SVD), and wavelet fusion. In the second level, an additional encryption process on the watermarked image is done by using two-dimensional logistic chaotic map in a case and Advanced Encryption Standard (AES) in another case. The proposed scheme is evaluated by using several images and different hacks on the transmitted image. The experimental results show that the proposed scheme is efficient and can face many attacks such as Gaussian, Blur, Wrap, and Cropping. In addition, the extracted watermarks are recognized even when the marked images suffered from attacks.
Similar content being viewed by others
References
Abraham, L., Daniel, N.: Secure image encryption algorithms: a review. Int. j. Sci. Technol. Res. 2, 186–189 (2013)
Agarwal, C., Mishra, A., Sharma, A., Bedi, P.: Optimized gray-scale image watermarking using DWT—SVD and firefly algorithm. Exp. Syst. Appl. 41, 7858–7867 (2014). https://doi.org/10.1016/j.eswa.2014.06.011
Ali, M., Ahn, C.W., Pant, M.: A robust image watermarking technique using SVD and differential evolution in DCT domain. Int. j. Light Elect. Opt. 125, 428–434 (2014). https://doi.org/10.1016/j.ijleo.2013.06.082
Al-Mansoori, S., Kunhu, A.: Robust watermarking technique based on DCT to protect the ownership of DubaiSat-1 images against attacks. Int. j. Comput. Sci. Netw. Sec. (IJCSNS). 12, 1–9 (2012)
Alshoura, W.H., Zainol, Z., Teh, J.S., Alawida, M.: A New chaotic image watermarking scheme based on SVD and IWT. IEEE Access. 8, 43391–43406 (2020). https://doi.org/10.1109/ACCESS.2020.2978186
Avcıbas, I., Memon, N., Sankur, B.: Steganalysis using image quality metrics. IEEE Trans. Image Process. 12, 221–229 (2003)
Bhatnagar, G., Raman, B.: A new robust reference watermarking scheme based on DWT-SVD. Comput. Stand. Interf. 31, 1002–1013 (2009). https://doi.org/10.1016/j.csi.2008.09.031
Chandra, G., Chandra, N., Verma, S.: A review on multiple chaotic maps for image encryption with cryptographic technique. Int. j. Comput. Appl. 121, 6–9 (2015)
Chandrasekaran, J., Thiruvengadam, S.J.: A hybrid chaotic and number theoretic approach for securing DICOM images. Sec. Commun. Netw. 2107, 1–12 (2017)
Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fract. 21, 749–761 (2004). https://doi.org/10.1016/j.chaos.2003.12.022
Cohen, A., Holmgren, J., Nishimaki, R.Y.O., Vaikuntanathan, V., Wichs, D.: watermarking cryptographic capabilities. Soc. Indus. Appl. Math. 47, 2157–2202 (2018)
Faragallah, O.S.: Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain. Int. j. Electron. Commun. 67, 189–196 (2013). https://doi.org/10.1016/j.aeue.2012.07.010
Fkirin, A., Attiya, G., El-Sayed, A.: Steganography literature survey, classification and comparative study. Commun. Appl. Electron. 5, 13–22 (2016). https://doi.org/10.5120/cae2016652384
Fkirin, A., Attiya, G., El-Sayed, A.: A new approach for colored watermarking image into gray scale image using wavelet fusion. Opt. Quant. Electron. 49, 284 (2017). https://doi.org/10.1007/s11082-017-1120-6
Forouzan, B.: The advanced encryption standard (AES). In: Cryptography and network security, pp. 58–73. McGraw-Hill, Inc. (2007)
Fournier-Prunaret, D., Lopez-Ruiz, R.: Basin bifurcations in a two-dimensional logistic map. Iteration Theory 346, 123–136 (2004)
Ghebleh, M., Kanso, A., Own, H.S.: A blind chaos-based watermarking technique. Sec. Commun. Netw. 4, 800–811 (2014). https://doi.org/10.1002/sec
Hemdan, E.E.D., El Fishawy, N., Attiya, G., El-Samie, F.A.: Hybrid digital image watermarking technique for data hiding. In: Proceeding of 30th National Radio Science Conference (NRSC 2013), pp. 220–227 (2013a)
Hemdan, E.E.D., El Fishawy, N., Attiya, G., El-Samie, F.A.: An efficient image watermarking approach based on wavelet fusion and singular value decomposition in wavelet domain. In: Proceeding of 3rd International Conference on Advanced Control Circuits And Systems (ACCS’013) (2013b)
Hill, P., Canagarajah, N., Bull, D.: Image fusion using complex wavelets. In: Proceeding of the 13th British Machine Vision Conference (BMVC), pp. 487–496 (2002)
Jain, Y., Bansal, R., Sharma, G., Kumar, B., Gupta, S.: Image encryption schemes: a complete survey. Int. j. Sig. Process. Image Process. Patt. Recogn. 9, 157–192 (2016)
Kamble, S., Maheshkar, V., Agarwal, S., K, V.S.: Dwt-SVD Based secured image watermarking for copyright protection using visual cryptography. In: Proceedings of Computer Science Conference, pp. 143–150 (2012)
Kannammal, A., Rani, S.S.: Two level security for medical images using watermarking/encryption algorithms. Int. j. Imaging Syst. Technol. 24, 111–120 (2014). https://doi.org/10.1002/ima.22086
Kanso, A., Smaoui, N.: Logistic chaotic maps for binary numbers generations. Chaos Solitons Fract. 40, 2557–2568 (2009). https://doi.org/10.1016/j.chaos.2007.10.049
Kashyap, N., Sinha, G.R.: Image watermarking using 3-level discrete wavelet transform (DWT). Int. j. Modern Educ. Comput. Sci. 3, 50–56 (2012). https://doi.org/10.5815/ijmecs.2012.03.07
Kundur, D., Hatzinakos, D.: A robust digital image watermarking method using wavelet-based fusion. In: Proceeding of International Conference on Image Processing, pp. 544–547 (1997)
Lakshmi Sirisha, B.: Image steganography based on SVD and DWT techniques. J. Disc. Math. Sci. Cryptogr. 23, 779–786 (2020). https://doi.org/10.1080/09720529.2019.1698801
Li, S., Mou, X., Cai, Y.: Improving security of a chaotic encryption approach. Phys. Lett. 2, 127–133 (2001)
Liu, N., Li, H., Dai, H., Guo, D., Chen, D.: Robust blind image watermarking based on chaotic mixtures. Nonlinear Dyn. 80, 1329–1355 (2015). https://doi.org/10.1007/s11071-015-1946-z
Mohamed, M.A.: Choosing the best digital watermarking techniques for still images. Mediterr. j. Comput. Netw. 6, 101–107 (2010)
Mohamed, M.A., El Mohandes, A.M.: Hybrid DCT-DWT watermarking and idea encryption of internet contents. Int. j. Comput. Sci. Issues 9, 394–401 (2012)
Mohananthini, N., Yamuna, G.: Image fusion process for multiple watermarking schemes against attacks. J. Netw. Commun. Emerg. Technol. 1, 1–8 (2015)
Naidu, A.R., Akhila, K., Mounica, G., Sony, J.: Analysis of robust DWT-svd domain based digital image watermarking technique. Int. j. Appl. Sci. Eng. Manage. 05, 94–97 (2016)
Narula, N., Sethi, D., Bhattacharya, P.P.: Comparative analysis of DWT and DWT-SVD watermarking techniques in RGB images. Int. j. Sig. Process. Image Process. Patt. Recogn. 8, 339–348 (2015)
Planitz, B., Maeder, A.: Medical image watermarking: a study on image degradation. In: Proceedings of the Workshop on Digital Image Computing: Techniques and Applications, pp. 3–8 (2005)
Poonam, S., Arora, S.M.: A DWT-SVD based robust digital watermarking for digital images. Proc. Comput. Sci. 132, 1441–1448 (2018). https://doi.org/10.1016/j.procs.2018.05.076
Puech, W., Coatrieux, G.: Hybrid coding : encryption-watermarking-compression for medical information security. In: Compression of Biomedical Images and Signals, pp. 247–276 (2019)
Rajput, D.S.K., Konidena, A.: Performance enhancement in image encryption using AES. Int. j. Innov. Adv. Comput. Sci. 4, 16–19 (2015)
Rajput, A.S., Sharma, V.: Survey and analysis of chaotic image encryption schemes. Asia Pac. j. Multimed. Serv. Converg. Art Humanit. Sociol. 5, 69–76 (2015)
Sankpal, P.R., Vijaya, P.A.: Image encryption using chaotic maps : a survey. In: Proceeding of 2014 Fifth International Conference on Signal and Image, pp. 102–107 (2014)
Sethi, N., Sharma, D.: A new cryptology approach for image encryption. In: Proceeding of 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, pp. 905–908 (2012)
Singh, V.: Digital watermarking : a tutorial. Multidisc. J. Sci. Technol. J. Selected Areas Telecommun. 10–21 (2011)
Singh, S., Jain, A.: Combination of RGB substitution for text to image encryption technique using AES. Spvryan’s Int. j. Eng. Sci. Technol. 2, 1–7 (2015)
Singh, D., Singh, S.K.: DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection. Multimed. Tools Appl. 76, 13001–13024 (2017). https://doi.org/10.1007/s11042-016-3706-6
Somaraj, S., Hussain, M.A.: Performance and security analysis for image encryption using key image. Indian j. Sci. Technol. 8, 6–9 (2015). https://doi.org/10.17485/ijst/2015/v8i35/73141
Strogatz, S.H.: Nonlinear dynamics and chaos: With applications to Physics, Biology, Chemistry, and Engineering (2000)
Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI randomness tests for image encryption. J. Select. Areas Telecommun. 4, 31–38 (2011)
Wu, Y., Yang, G., Jin, H., Noonan, J.P.: Image encryption using the two-dimensional logistic chaotic map. J. Electron. Imaging 21, 1–29 (2012). https://doi.org/10.1117/1.JEI.21.1.013014
Yen, J.C., Guo, J.I.: A new chaotic image encryption algorithm. In: Proceeding of National Symposium on Telecommunications, pp. 358–362 (1998)
Yen, J.C., Guo, J.I.: A new chaotic mirror-like image encryption algorithm and its VLSI architecture. Patt. Recogn. Image Anal. 10, 236–247 (2000)
Acknowledgements
An acknowledgement to the Academy of Scientific Research and Technology for their support and constructive contribution in the completion of this research work.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Fkirin, A., Attiya, G. & El-Sayed, A. Two-level security approach combining watermarking and encryption for securing critical colored images. Opt Quant Electron 53, 285 (2021). https://doi.org/10.1007/s11082-021-02875-2
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11082-021-02875-2