Signal Processing and Information Technology. Second International Joint Conference, SPIT 2012, Dubai, UAE, September 20-21, 2012, Revised Selected Papers

Research Article

A SVD-Chaos Digital Image Watermarking Scheme Based on Multiple Chaotic System

Download113 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-11629-7_2,
        author={Niaz Khorrami and Peyman Ayubi and Sohrab Behnia and Jila Ayubi},
        title={A SVD-Chaos Digital Image Watermarking Scheme Based on Multiple Chaotic System},
        proceedings={Signal Processing and Information Technology. Second International Joint Conference, SPIT 2012, Dubai, UAE, September 20-21, 2012, Revised Selected Papers},
        proceedings_a={SPIT},
        year={2014},
        month={11},
        keywords={Blind Digital Image Watermarking Chaos Singular Value Decomposition Chaotic Map},
        doi={10.1007/978-3-319-11629-7_2}
    }
    
  • Niaz Khorrami
    Peyman Ayubi
    Sohrab Behnia
    Jila Ayubi
    Year: 2014
    A SVD-Chaos Digital Image Watermarking Scheme Based on Multiple Chaotic System
    SPIT
    Springer
    DOI: 10.1007/978-3-319-11629-7_2
Niaz Khorrami1,*, Peyman Ayubi1,*, Sohrab Behnia2, Jila Ayubi3
  • 1: Islamic Azad University
  • 2: UrmiaUniversity of Technology
  • 3: Sistan and Baluchestan University
*Contact email: n.khorrami@iausalmas.ac.ir, p.ayubi@iaurmia.ac.ir

Abstract

In this letter a new watermarking scheme for Gray scale image is proposed based on a family of the chaotic maps and Singular Value Decomposition. Jacobian elliptic map is used to encrypt the watermark logo to improve the security of watermarked image. Quantum map is also used to determine the location of image’s block for the watermark embedding. To test the robustness and effectiveness of our proposed method, several attacks are applied to the watermarked image and the best results have been reported. The purpose of this algorithm is to improve the shortcoming of watermarking such as small key space and low security. The experimental results demonstrate that the key space is large enough to resist the attack and the distribution of grey values of the encrypted image has a random-like behavior, which makes it a potential candidate for encryption of multimedia data such as images, audios and even videos.