A novel intelligent approach for color image privacy preservation
Currently, specialists and researchers are focusing their efforts on information security, while frequently exchanged data is increasingly vulnerable to cyberattacks and threats. They use cryptography and watermarking methods to ensure copyright ownership protection, authenticity and integrity by hi...
Saved in:
| Published in | Multimedia tools and applications Vol. 83; no. 33; pp. 79481 - 79502 |
|---|---|
| Main Authors | , , |
| Format | Journal Article |
| Language | English |
| Published |
New York
Springer US
01.10.2024
Springer Nature B.V |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1573-7721 1380-7501 1573-7721 |
| DOI | 10.1007/s11042-024-19402-6 |
Cover
| Summary: | Currently, specialists and researchers are focusing their efforts on information security, while frequently exchanged data is increasingly vulnerable to cyberattacks and threats. They use cryptography and watermarking methods to ensure copyright ownership protection, authenticity and integrity by hiding secret data within encrypted images. Most existing watermarking schemes are unable to ensure a good balance between imperceptibility, robustness, time processing, blindness and security. To address these problems, we propose a novel blind watermarking scheme for color images based on chaotic sequence, A-start algorithm and DCT. First, we apply DCT transform on the host image to produce DCT weights. The image block sequences are then slightly updated and scrambled from the obtained DCT weights using A-start algorithm and Arnold chaotic map. Finally, the embedded bits are extracted using the same embedding steps. Optimized image block sequences result in imperceptible, secure and robust watermark bits while reducing processing time. Experimental results show that the proposed approach outperforms other similar works when it comes to imperceptibility exceeding 74 dB and execution time less than 1.5 s for both watermark embedding and extraction. It has exceptional robustness to filtering, rotation and JPEG compression attacks with normalized correlations exceeding 0.8. |
|---|---|
| Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ISSN: | 1573-7721 1380-7501 1573-7721 |
| DOI: | 10.1007/s11042-024-19402-6 |