ew 18: e22

Research Article

A Novel Hybrid Watermarking scheme with Image authentication based on frequency domain, 2- Level SVD using chaotic map

Download63 downloads
  • @ARTICLE{10.4108/eai.13-7-2018.165512,
        author={Shahzad Alam and Tanvir Ahmad and M. N. Doja},
        title={A Novel Hybrid Watermarking scheme with Image authentication based on frequency domain, 2- Level SVD using chaotic map},
        journal={EAI Endorsed Transactions on Energy Web: Online First},
        volume={},
        number={},
        publisher={EAI},
        journal_a={EW},
        year={2020},
        month={7},
        keywords={DCT, DWT, SVD, SHA-1, RSA, Arnold transform, Chaotic Map, Secret Key},
        doi={10.4108/eai.13-7-2018.165512}
    }
    
  • Shahzad Alam
    Tanvir Ahmad
    M. N. Doja
    Year: 2020
    A Novel Hybrid Watermarking scheme with Image authentication based on frequency domain, 2- Level SVD using chaotic map
    EW
    EAI
    DOI: 10.4108/eai.13-7-2018.165512
Shahzad Alam1,*, Tanvir Ahmad1, M. N. Doja1
  • 1: Department of Computer Engineering, Faculty of Engineering and Technology, Jamia Millia Islamia, New Delhi-110025, India
*Contact email: shahzad5alam@gmail.com

Abstract

INTRODUCTION: In order to protect the owner’s visual multimedia data, various watermarking methods have introduced in the last few years. In image watermarking techniques, a secret watermark image inserted into another image. OBJECTIVES: The main aim of this paper is to implement an image watermarking technique having high security from stealing the information hidden in image and make the resultant image more robust against various attacks. METHODS: In this paper, frequency domain based techniques like DWT, DCT has used with 2 Level SVD and a new 3D discrete hyper chaotic map. The digital signature and other image parameters have appends in the watermark image to ensure the security and copyright protection of the original image using RSA, Arnold transforms, and SHA-1, techniques. At the receiver side, digital signature and information parameters have retrieved from the watermark image and identify to detect whether an unauthorized person attacks the watermark image or not. To verify the originality of image, the extracted information parameter, and the hash value of the extracted watermark have compared with the original value of the parameters and source hash value of the watermark image, respectively. The secret key used in the proposed scheme that makes the system more robust and adds security to the system. It helps to authenticate the originality of the received image. RESULTS: We compare the result with the present scheme proposed by Lin at el. The experiments have conducted to check various standard image processing attacks, and the watermark extraction process generates a high-quality image after different attacks. The primary purpose of the suggested watermarking scheme is to ensure reversibility and high security. CONCLUSION: The experimental outcomes confirmed that not only the recommended scheme attained higher robustness and imperceptibility in comparison to our earlier scheme. The Watermark image also recovered successfully with the known secret key.