2022
DOI: 10.1007/s11277-022-09562-9
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme

Abstract: Due to the increased number of cyberattacks, numerous researchers are motivated towards the design of such schemes that can hide digital information in a signal. Watermarking is one of the promising technologies that can protect digital information. However, traditional watermarking schemes are either slow or less secure. In this paper, a dynamic S-Box based efficient watermarking scheme is presented. The original image was extracted at the receiver’s end without any loss of sensitive information. Firstly, the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 39 publications
(29 reference statements)
0
5
0
Order By: Relevance
“…After some algebraic manipulations, it turns out that the five dimensional nonlinear system (shown in equation (8)) is characterized by five equilibria defined by equation (10).…”
Section: Performance Analysis Of Novel 5d Memristive Hyperchaotic Sys...mentioning
confidence: 99%
See 1 more Smart Citation
“…After some algebraic manipulations, it turns out that the five dimensional nonlinear system (shown in equation (8)) is characterized by five equilibria defined by equation (10).…”
Section: Performance Analysis Of Novel 5d Memristive Hyperchaotic Sys...mentioning
confidence: 99%
“…After that, the authorized user is capable of reconstructing the private information carried by cipher image via the secret keys delivered in the secure channel, while the interceptor cannot recover the plain image without the correct keys. In addition, many privacy image protection schemes have been designed by virtue of the nonlinearity of chaotic system [3][4][5], neural network [6,7], cellular automata (CA) [8,9], substitution box [10][11][12] and optical transform [13,14]. For instance, in [15], Hua and his cooperators devised a novel two-dimensional Logistic Sine chaotic map with broader chaotic scope and better ergodic property, called as the 2D-LSM, which is employed in the confusion phase to confuse the positions of pixels with assistance of three-dimensional orthogonal Latin squares (3D-OLS).…”
Section: Introductionmentioning
confidence: 99%
“…Evaluation of test outcomes attests that the proposed image encryption algorithm excels in both security and speed for diverse image encryption applications. Furthermore, Khan et al introduced a dynamic S-box-based watermarking scheme in [27]. A piecewise linear chaotic map generates a 16 × 16 dynamic substitution box (S-box), enabling the extraction of the original image at the recipient's end without compromising sensitive information.…”
Section: Related Workmentioning
confidence: 99%
“…In symmetric key cryptography, substitution is a nonlinear bijective function. Generally, m bits are given as an input to substitution box (S-Box), and as a result, n bit output is produced [ 27 , 28 ]. In case of digital images, the bijective function F : I ⟶ S maps each image pixel I to a unique value S as shown in Figure 2 .…”
Section: Preliminariesmentioning
confidence: 99%