2021
DOI: 10.3390/e23121650
|View full text |Cite
|
Sign up to set email alerts
|

Blind and Secured Adaptive Digital Image Watermarking Approach for High Imperceptibility and Robustness

Abstract: In the past decade, rapid development in digital communication has led to prevalent use of digital images. More importantly, confidentiality issues have also come up recently due to the increase in digital image transmission across the Internet. Therefore, it is necessary to provide high imperceptibility and security to digitally transmitted images. In this paper, a novel blind digital image watermarking scheme is introduced tackling secured transmission of digital images, which provides a higher quality regar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 35 publications
0
5
0
Order By: Relevance
“…However, the limitations of this algorithm include the inability to encrypt color images directly and the unsuitability for real-time confidential communications. We will extend our approach based on the ideas of the block and nature-inspired optimization techniques from the literature [ 60 ] to address these shortcomings in future research. Considering the excellent properties of hyperchaotic systems, we try to design a 2D hyperchaotic system for image encryption.…”
Section: Discussionmentioning
confidence: 99%
“…However, the limitations of this algorithm include the inability to encrypt color images directly and the unsuitability for real-time confidential communications. We will extend our approach based on the ideas of the block and nature-inspired optimization techniques from the literature [ 60 ] to address these shortcomings in future research. Considering the excellent properties of hyperchaotic systems, we try to design a 2D hyperchaotic system for image encryption.…”
Section: Discussionmentioning
confidence: 99%
“…Finally, for the permuted image, a cipher key is generated and by using a hybrid chaotic orbit, diffusion of the permuted image is performed. Thus, the output obtained at the diffusion stage is cipher image 𝑐(𝑖) which is shown in (5).…”
Section: Encryption and Decryption Using Proposed Hybrid Chaotic Mapp...mentioning
confidence: 99%
“…Security is one of the most vital parameters required for successfully transmitting information via the network, but is greatly impacted by increase in illegal activities pertaining to information misuse such as copying, editing [3]. The watermarking method is used for converting the image information to keep it confidential, hence making it difficult to be recognized by unauthorized persons [4], [5]. The watermarking method is known for its capability in retrieving the actual information without losing the significant data in it [6], [7].…”
Section: Introductionmentioning
confidence: 99%
“…In general, there is a conflicting relationship between these properties and it is difficult to obtain improvements at the same time, but it is an important goal to improve these properties through continuous research to make watermarking algorithms better for copyright protection. Watermarking algorithms can be divided into spatial-domain watermarking [5][6][7][8] and frequency-domain watermarking [9][10][11][12][13][14][15][16][17][18] depending on the embedding domain. The former modifies the spatial-domain pixel values to embed watermark information, which is computationally simple and efficient, but its robustness is mediocre because the image attack will distort the pixels directly.…”
Section: Introductionmentioning
confidence: 99%
“…For example, Rakhmawati et al [17] proposed a method for JPEG images by quantifying discrete Cosine transform (DCT) coefficients and adaptively selecting the quantization strength and coefficients to minimize total distortion caused by the embedded watermark on the host image. And Singh et al [18] proposed a method by using the initial scaling factor (ISF), the ISF is first adaptively determined by the image range characteristics of the host image and is helpful for improving the invisibility, and then is optimized by the nature inspired optimization (NIO) technique to maximize the invisibility and robustness.…”
Section: Introductionmentioning
confidence: 99%