Skip to main content
Log in

Two-level security approach combining watermarking and encryption for securing critical colored images

  • Published:
Optical and Quantum Electronics Aims and scope Submit manuscript

Abstract

With the widespread of the Internet and the rapid growth of technologies, several challenges face data hiding process. Although watermarking is widely used to hide/embed critical data into a cover image, the watermarked image may be attacked/hacked and the embedded data may be extracted or damaged. This paper presents an efficient two-level security approach to protect colored watermark images. In the first level, the color image is embedded into a grayscale image using a multi-level Discrete Wavelet Transform (DWT), Singular Value Decomposition (SVD), and wavelet fusion. In the second level, an additional encryption process on the watermarked image is done by using two-dimensional logistic chaotic map in a case and Advanced Encryption Standard (AES) in another case. The proposed scheme is evaluated by using several images and different hacks on the transmitted image. The experimental results show that the proposed scheme is efficient and can face many attacks such as Gaussian, Blur, Wrap, and Cropping. In addition, the extracted watermarks are recognized even when the marked images suffered from attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  • Abraham, L., Daniel, N.: Secure image encryption algorithms: a review. Int. j. Sci. Technol. Res. 2, 186–189 (2013)

    Google Scholar 

  • Agarwal, C., Mishra, A., Sharma, A., Bedi, P.: Optimized gray-scale image watermarking using DWT—SVD and firefly algorithm. Exp. Syst. Appl. 41, 7858–7867 (2014). https://doi.org/10.1016/j.eswa.2014.06.011

    Article  Google Scholar 

  • Ali, M., Ahn, C.W., Pant, M.: A robust image watermarking technique using SVD and differential evolution in DCT domain. Int. j. Light Elect. Opt. 125, 428–434 (2014). https://doi.org/10.1016/j.ijleo.2013.06.082

    Article  Google Scholar 

  • Al-Mansoori, S., Kunhu, A.: Robust watermarking technique based on DCT to protect the ownership of DubaiSat-1 images against attacks. Int. j. Comput. Sci. Netw. Sec. (IJCSNS). 12, 1–9 (2012)

    Google Scholar 

  • Alshoura, W.H., Zainol, Z., Teh, J.S., Alawida, M.: A New chaotic image watermarking scheme based on SVD and IWT. IEEE Access. 8, 43391–43406 (2020). https://doi.org/10.1109/ACCESS.2020.2978186

    Article  Google Scholar 

  • Avcıbas, I., Memon, N., Sankur, B.: Steganalysis using image quality metrics. IEEE Trans. Image Process. 12, 221–229 (2003)

    Article  ADS  MathSciNet  Google Scholar 

  • Bhatnagar, G., Raman, B.: A new robust reference watermarking scheme based on DWT-SVD. Comput. Stand. Interf. 31, 1002–1013 (2009). https://doi.org/10.1016/j.csi.2008.09.031

    Article  Google Scholar 

  • Chandra, G., Chandra, N., Verma, S.: A review on multiple chaotic maps for image encryption with cryptographic technique. Int. j. Comput. Appl. 121, 6–9 (2015)

    Google Scholar 

  • Chandrasekaran, J., Thiruvengadam, S.J.: A hybrid chaotic and number theoretic approach for securing DICOM images. Sec. Commun. Netw. 2107, 1–12 (2017)

    Google Scholar 

  • Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fract. 21, 749–761 (2004). https://doi.org/10.1016/j.chaos.2003.12.022

    Article  ADS  MathSciNet  MATH  Google Scholar 

  • Cohen, A., Holmgren, J., Nishimaki, R.Y.O., Vaikuntanathan, V., Wichs, D.: watermarking cryptographic capabilities. Soc. Indus. Appl. Math. 47, 2157–2202 (2018)

    MathSciNet  MATH  Google Scholar 

  • Faragallah, O.S.: Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain. Int. j. Electron. Commun. 67, 189–196 (2013). https://doi.org/10.1016/j.aeue.2012.07.010

    Article  Google Scholar 

  • Fkirin, A., Attiya, G., El-Sayed, A.: Steganography literature survey, classification and comparative study. Commun. Appl. Electron. 5, 13–22 (2016). https://doi.org/10.5120/cae2016652384

    Article  Google Scholar 

  • Fkirin, A., Attiya, G., El-Sayed, A.: A new approach for colored watermarking image into gray scale image using wavelet fusion. Opt. Quant. Electron. 49, 284 (2017). https://doi.org/10.1007/s11082-017-1120-6

    Article  Google Scholar 

  • Forouzan, B.: The advanced encryption standard (AES). In: Cryptography and network security, pp. 58–73. McGraw-Hill, Inc. (2007)

  • Fournier-Prunaret, D., Lopez-Ruiz, R.: Basin bifurcations in a two-dimensional logistic map. Iteration Theory 346, 123–136 (2004)

    MathSciNet  MATH  Google Scholar 

  • Ghebleh, M., Kanso, A., Own, H.S.: A blind chaos-based watermarking technique. Sec. Commun. Netw. 4, 800–811 (2014). https://doi.org/10.1002/sec

    Article  Google Scholar 

  • Hemdan, E.E.D., El Fishawy, N., Attiya, G., El-Samie, F.A.: Hybrid digital image watermarking technique for data hiding. In: Proceeding of 30th National Radio Science Conference (NRSC 2013), pp. 220–227 (2013a)

  • Hemdan, E.E.D., El Fishawy, N., Attiya, G., El-Samie, F.A.: An efficient image watermarking approach based on wavelet fusion and singular value decomposition in wavelet domain. In: Proceeding of 3rd International Conference on Advanced Control Circuits And Systems (ACCS’013) (2013b)

  • Hill, P., Canagarajah, N., Bull, D.: Image fusion using complex wavelets. In: Proceeding of the 13th British Machine Vision Conference (BMVC), pp. 487–496 (2002)

  • Jain, Y., Bansal, R., Sharma, G., Kumar, B., Gupta, S.: Image encryption schemes: a complete survey. Int. j. Sig. Process. Image Process. Patt. Recogn. 9, 157–192 (2016)

    Google Scholar 

  • Kamble, S., Maheshkar, V., Agarwal, S., K, V.S.: Dwt-SVD Based secured image watermarking for copyright protection using visual cryptography. In: Proceedings of Computer Science Conference, pp. 143–150 (2012)

  • Kannammal, A., Rani, S.S.: Two level security for medical images using watermarking/encryption algorithms. Int. j. Imaging Syst. Technol. 24, 111–120 (2014). https://doi.org/10.1002/ima.22086

    Article  Google Scholar 

  • Kanso, A., Smaoui, N.: Logistic chaotic maps for binary numbers generations. Chaos Solitons Fract. 40, 2557–2568 (2009). https://doi.org/10.1016/j.chaos.2007.10.049

    Article  ADS  MATH  Google Scholar 

  • Kashyap, N., Sinha, G.R.: Image watermarking using 3-level discrete wavelet transform (DWT). Int. j. Modern Educ. Comput. Sci. 3, 50–56 (2012). https://doi.org/10.5815/ijmecs.2012.03.07

    Article  Google Scholar 

  • Kundur, D., Hatzinakos, D.: A robust digital image watermarking method using wavelet-based fusion. In: Proceeding of International Conference on Image Processing, pp. 544–547 (1997)

  • Lakshmi Sirisha, B.: Image steganography based on SVD and DWT techniques. J. Disc. Math. Sci. Cryptogr. 23, 779–786 (2020). https://doi.org/10.1080/09720529.2019.1698801

    Article  MathSciNet  Google Scholar 

  • Li, S., Mou, X., Cai, Y.: Improving security of a chaotic encryption approach. Phys. Lett. 2, 127–133 (2001)

    Article  MathSciNet  Google Scholar 

  • Liu, N., Li, H., Dai, H., Guo, D., Chen, D.: Robust blind image watermarking based on chaotic mixtures. Nonlinear Dyn. 80, 1329–1355 (2015). https://doi.org/10.1007/s11071-015-1946-z

    Article  Google Scholar 

  • Mohamed, M.A.: Choosing the best digital watermarking techniques for still images. Mediterr. j. Comput. Netw. 6, 101–107 (2010)

    Google Scholar 

  • Mohamed, M.A., El Mohandes, A.M.: Hybrid DCT-DWT watermarking and idea encryption of internet contents. Int. j. Comput. Sci. Issues 9, 394–401 (2012)

    Google Scholar 

  • Mohananthini, N., Yamuna, G.: Image fusion process for multiple watermarking schemes against attacks. J. Netw. Commun. Emerg. Technol. 1, 1–8 (2015)

    Google Scholar 

  • Naidu, A.R., Akhila, K., Mounica, G., Sony, J.: Analysis of robust DWT-svd domain based digital image watermarking technique. Int. j. Appl. Sci. Eng. Manage. 05, 94–97 (2016)

    Google Scholar 

  • Narula, N., Sethi, D., Bhattacharya, P.P.: Comparative analysis of DWT and DWT-SVD watermarking techniques in RGB images. Int. j. Sig. Process. Image Process. Patt. Recogn. 8, 339–348 (2015)

    Google Scholar 

  • Planitz, B., Maeder, A.: Medical image watermarking: a study on image degradation. In: Proceedings of the Workshop on Digital Image Computing: Techniques and Applications, pp. 3–8 (2005)

  • Poonam, S., Arora, S.M.: A DWT-SVD based robust digital watermarking for digital images. Proc. Comput. Sci. 132, 1441–1448 (2018). https://doi.org/10.1016/j.procs.2018.05.076

    Article  Google Scholar 

  • Puech, W., Coatrieux, G.: Hybrid coding : encryption-watermarking-compression for medical information security. In: Compression of Biomedical Images and Signals, pp. 247–276 (2019)

  • Rajput, D.S.K., Konidena, A.: Performance enhancement in image encryption using AES. Int. j. Innov. Adv. Comput. Sci. 4, 16–19 (2015)

    Google Scholar 

  • Rajput, A.S., Sharma, V.: Survey and analysis of chaotic image encryption schemes. Asia Pac. j. Multimed. Serv. Converg. Art Humanit. Sociol. 5, 69–76 (2015)

    Google Scholar 

  • Sankpal, P.R., Vijaya, P.A.: Image encryption using chaotic maps : a survey. In: Proceeding of 2014 Fifth International Conference on Signal and Image, pp. 102–107 (2014)

  • Sethi, N., Sharma, D.: A new cryptology approach for image encryption. In: Proceeding of 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, pp. 905–908 (2012)

  • Singh, V.: Digital watermarking : a tutorial. Multidisc. J. Sci. Technol. J. Selected Areas Telecommun. 10–21 (2011)

  • Singh, S., Jain, A.: Combination of RGB substitution for text to image encryption technique using AES. Spvryan’s Int. j. Eng. Sci. Technol. 2, 1–7 (2015)

    Google Scholar 

  • Singh, D., Singh, S.K.: DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection. Multimed. Tools Appl. 76, 13001–13024 (2017). https://doi.org/10.1007/s11042-016-3706-6

    Article  Google Scholar 

  • Somaraj, S., Hussain, M.A.: Performance and security analysis for image encryption using key image. Indian j. Sci. Technol. 8, 6–9 (2015). https://doi.org/10.17485/ijst/2015/v8i35/73141

    Article  Google Scholar 

  • Strogatz, S.H.: Nonlinear dynamics and chaos: With applications to Physics, Biology, Chemistry, and Engineering (2000)

  • Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI randomness tests for image encryption. J. Select. Areas Telecommun. 4, 31–38 (2011)

    Google Scholar 

  • Wu, Y., Yang, G., Jin, H., Noonan, J.P.: Image encryption using the two-dimensional logistic chaotic map. J. Electron. Imaging 21, 1–29 (2012). https://doi.org/10.1117/1.JEI.21.1.013014

    Article  Google Scholar 

  • Yen, J.C., Guo, J.I.: A new chaotic image encryption algorithm. In: Proceeding of National Symposium on Telecommunications, pp. 358–362 (1998)

  • Yen, J.C., Guo, J.I.: A new chaotic mirror-like image encryption algorithm and its VLSI architecture. Patt. Recogn. Image Anal. 10, 236–247 (2000)

    Google Scholar 

Download references

Acknowledgements

An acknowledgement to the Academy of Scientific Research and Technology for their support and constructive contribution in the completion of this research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alaa Fkirin.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Fkirin, A., Attiya, G. & El-Sayed, A. Two-level security approach combining watermarking and encryption for securing critical colored images. Opt Quant Electron 53, 285 (2021). https://doi.org/10.1007/s11082-021-02875-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11082-021-02875-2

Keywords

Navigation