Image Robust Watermarking Method Based on DWT-SVD Transform and Chaotic Map

IF 1.7 4区 工程技术 Q2 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Complexity Pub Date : 2024-05-15 DOI:10.1155/2024/6618382
Weishuai Wu, Yujiao Dong, Guangyi Wang
{"title":"Image Robust Watermarking Method Based on DWT-SVD Transform and Chaotic Map","authors":"Weishuai Wu,&nbsp;Yujiao Dong,&nbsp;Guangyi Wang","doi":"10.1155/2024/6618382","DOIUrl":null,"url":null,"abstract":"<p>The existing watermarking algorithms make it difficult to balance the invisibility and robustness of the watermark. This paper proposes a robust image watermarking method based on discrete wavelet transform (DWT), singular value decomposition (SVD), and chaotic maps. This method is a semiblind watermarking method. First, a chaotic logistic-tent map is introduced, employing an extensive chaotic parameter domain. This map is amalgamated with Arnold’s transformation to encrypt the watermark image, thereby bolstering the security of the watermark information. Subsequently, the frequency domain is obtained by applying DWT to the carrier image. Embedding watermarks in the frequency domain ensures the invisibility of the watermark, with a preference for a high-frequency subband after the DWT of the carrier image for enhanced watermark robustness. SVD is then applied to both the high-frequency subband of the carrier image after DWT and the encrypted watermark image. The final step involves embedding the singular values of the encrypted watermark image into the carrier image’s singular values, thereby completing the watermark information embedding process. In simulation experiments, an invisibility test was conducted on various carrier images, yielding peak signal-to-noise ratio (PSNR) values consistently exceeding 43, and structural similarity (SSIM) close to 1. Robustness testing against various types of attacks resulted in normalized correlation (NC) values consistently surpassing 0.9, with bit error rate (BER) values approaching 0. In conclusion, the proposed algorithm satisfies imperceptibility requirements while demonstrating formidable robustness.</p>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2024 1","pages":""},"PeriodicalIF":1.7000,"publicationDate":"2024-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Complexity","FirstCategoryId":"5","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1155/2024/6618382","RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"MATHEMATICS, INTERDISCIPLINARY APPLICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

The existing watermarking algorithms make it difficult to balance the invisibility and robustness of the watermark. This paper proposes a robust image watermarking method based on discrete wavelet transform (DWT), singular value decomposition (SVD), and chaotic maps. This method is a semiblind watermarking method. First, a chaotic logistic-tent map is introduced, employing an extensive chaotic parameter domain. This map is amalgamated with Arnold’s transformation to encrypt the watermark image, thereby bolstering the security of the watermark information. Subsequently, the frequency domain is obtained by applying DWT to the carrier image. Embedding watermarks in the frequency domain ensures the invisibility of the watermark, with a preference for a high-frequency subband after the DWT of the carrier image for enhanced watermark robustness. SVD is then applied to both the high-frequency subband of the carrier image after DWT and the encrypted watermark image. The final step involves embedding the singular values of the encrypted watermark image into the carrier image’s singular values, thereby completing the watermark information embedding process. In simulation experiments, an invisibility test was conducted on various carrier images, yielding peak signal-to-noise ratio (PSNR) values consistently exceeding 43, and structural similarity (SSIM) close to 1. Robustness testing against various types of attacks resulted in normalized correlation (NC) values consistently surpassing 0.9, with bit error rate (BER) values approaching 0. In conclusion, the proposed algorithm satisfies imperceptibility requirements while demonstrating formidable robustness.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于 DWT-SVD 变换和混沌图的图像鲁棒水印方法
现有的水印算法很难兼顾水印的隐蔽性和鲁棒性。本文提出了一种基于离散小波变换(DWT)、奇异值分解(SVD)和混沌图的鲁棒图像水印方法。该方法是一种半盲式水印方法。首先,利用广泛的混沌参数域引入了混沌逻辑帐篷图。该图与阿诺德变换相结合,对水印图像进行加密,从而提高了水印信息的安全性。随后,通过对载波图像应用 DWT,获得频域。在频域中嵌入水印可确保水印的不可见性,在对载波图像进行 DWT 处理后,优先选择高频子带,以增强水印的鲁棒性。然后将 SVD 应用于 DWT 后载波图像的高频子带和加密水印图像。最后一步是将加密水印图像的奇异值嵌入载波图像的奇异值中,从而完成水印信息嵌入过程。在模拟实验中,对各种载体图像进行了隐形测试,结果显示峰值信噪比(PSNR)一直超过 43,结构相似度(SSIM)接近 1。针对各种类型攻击的鲁棒性测试结果显示,归一化相关性(NC)值始终超过 0.9,误码率(BER)值接近 0。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Complexity
Complexity 综合性期刊-数学跨学科应用
CiteScore
5.80
自引率
4.30%
发文量
595
审稿时长
>12 weeks
期刊介绍: Complexity is a cross-disciplinary journal focusing on the rapidly expanding science of complex adaptive systems. The purpose of the journal is to advance the science of complexity. Articles may deal with such methodological themes as chaos, genetic algorithms, cellular automata, neural networks, and evolutionary game theory. Papers treating applications in any area of natural science or human endeavor are welcome, and especially encouraged are papers integrating conceptual themes and applications that cross traditional disciplinary boundaries. Complexity is not meant to serve as a forum for speculation and vague analogies between words like “chaos,” “self-organization,” and “emergence” that are often used in completely different ways in science and in daily life.
期刊最新文献
Transfer Payments and Regional Total Factor Productivity: Evidence From China Quantification of the Synergistic Inhibitory Effects of an Oncolytic Herpes Virus Plus Paclitaxel on Anaplastic Thyroid Cancer Cells Performance Evaluation of Control Strategies for Autonomous Quadrotors: A Review Chaotic Image Encryption Scheme Based on Improved Z-Order Curve, Modified Josephus Problem, and RNA Operations: An Experimental Li-Fi Approach Finite-Time Boundedness of Conformable Faulty Fuzzy Systems With Time Delay
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1