2022
DOI: 10.1109/access.2022.3166475
|View full text |Cite
|
Sign up to set email alerts
|

Digital Watermarking Technology Based on LDPC Code and Chaotic Sequence

Abstract: The number of ways to obtain information has increased by 5th Generation Mobile Communication Technology commercial. But easier access to information also means more security issues. Digital watermarking is an effective method to solve the security problem of information. Aiming at the problems of one-dimensional single chaotic image encryption algorithm, such as simple structure, small key space, and the invisibility and robustness of traditional information hiding technology cannot be well reconciled. The im… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…A secret key technique was used to control the watermark extraction to improve the security of the watermarking system; the authors proposed an additional step during the neural network training by adding noise to the generated image to resist attacks and improve robustness. Wang et al [23] proposed an improved encryption algorithm based on the Low-Density Prity Check Code (LDPC) by expanding the key space aiming to reduce the bit error rate and improve the security of the system. The proposed model shows that even if the encryption of the carrier image is illegally cracked, copyright protection still functions by extracting the watermark.…”
Section: Related Workmentioning
confidence: 99%
“…A secret key technique was used to control the watermark extraction to improve the security of the watermarking system; the authors proposed an additional step during the neural network training by adding noise to the generated image to resist attacks and improve robustness. Wang et al [23] proposed an improved encryption algorithm based on the Low-Density Prity Check Code (LDPC) by expanding the key space aiming to reduce the bit error rate and improve the security of the system. The proposed model shows that even if the encryption of the carrier image is illegally cracked, copyright protection still functions by extracting the watermark.…”
Section: Related Workmentioning
confidence: 99%
“…Among these techniques, CSIbased symmetric key cryptography is known to be effective in 5G IoT networks where key distribution and management are difficult [21]. Furthermore, chaos theory is highly compatible with symmetric key cryptography because of its initial value sensitivities, and is an important way to realize PLS [22,23]. We also proposed chaos modulation, which encrypts a modulated signal by utilizing a shared key between legitimate users (Alice and Bob) and the initial value sensitivities [24].…”
Section: Introductionmentioning
confidence: 99%
“…As an important medium of information exchange, the image has become an important research object of scholars. Many methods are proposed to protect images [1][2][3][4], such as image hiding technology, zerowatermarking technology, and image encryption technology [5][6][7][8][9]. Image encryption technology is to convert plaintext into noise image; it is the most commonly used technology.…”
Section: Introductionmentioning
confidence: 99%