2018
DOI: 10.1016/j.eswa.2017.12.003
|View full text |Cite
|
Sign up to set email alerts
|

Secure and robust digital image watermarking scheme using logistic and RSA encryption

Abstract: In the era of big data and networking, it is necessary to develop a secure and robust digital watermarking scheme with high computational efficiency to protect copyrights of digital works. However, most of the existing methods focus on robustness and embedding capacity, losing sight of security or requiring significant computational resources in the encryption process. This paper proposed a new digital image watermarking model based on scrambling algorithm Logistic and RSA asymmetric encryption algorithm to gu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
64
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 142 publications
(65 citation statements)
references
References 18 publications
0
64
1
Order By: Relevance
“…Utilizing an encryption key [30] the encode and the decode function can be explained in the following two equations.…”
Section: Encryptionmentioning
confidence: 99%
“…Utilizing an encryption key [30] the encode and the decode function can be explained in the following two equations.…”
Section: Encryptionmentioning
confidence: 99%
“…Y. Liu, S. Tang, R. Liu, L. Zhang, and Z. Ma, [13] proposed a new digital image watermarking methodology: RSA and logistic asymmetric encryption methodology for robust embedding capacity and high computational efficiency. Generally, the scrambling parameters were stolen, when the information was converted on a public network, but the developed asymmetric encryption system effectively protects the parameters from attackers and hackers.…”
Section: Literature Reviewmentioning
confidence: 99%
“…e original image encryption algorithms were based on the "confusion-di usion" encryption framework proposed by Fridrich. With the continuous development of hardware technology and cryptanalysis technology, most of the current image encryption algorithms are designed by integrating various technologies, such as DNA coding [1], optical technology [2], cellular automata [3,4], and asymmetric cryptosystems [5], which guarantees the security of image transmission and storage on some resource sharing platforms. However, with the rapid development of communication networks, the increasing demand for real-time transmission, and increasing image sizes, ensuring the security and real-time performance of the transmission of massive images in bandwidth-constrained networks has become an urgent problem that needs to be solved.…”
Section: Introductionmentioning
confidence: 99%