Advertisement

Wireless Networks

, Volume 25, Issue 4, pp 1491–1503 | Cite as

A new technique of frequency domain watermarking based on a local ring

  • Sajjad Shaukat JamalEmail author
  • Tariq Shah
  • Shabieh Farwa
  • Muhammad Usman Khan
Article

Abstract

This paper presents a new and comparatively secure watermarking technique, in the frequency domain. Our scheme deploys a local ring-based substitution box (S-box). The algebraic algorithm used to synthesize S-box basically exploits one–one correspondence between the multiplicative group of units of the local ring \({\mathbb{Z}}_{512}\) and the Galois field \(\varvec{F}_{256}\). This S-box has high confusion creating capability due to the structural properties of the local ring and fulfills the necessary requirements to be reliably used in multimedia applications. We use this S-box in a watermarking scheme to make our technique more confusing and secure to provide more support in copyrights protection strategies. The proposed non-blind digital watermarking technique deals with the application of discrete cosine transform (DCT) in the frequency domain which is comparatively more robust than spatial domain techniques. In the proposed scheme, first the watermark image is substituted through the S-box, and the scrambled watermark is then embedded in the DCT-transformed host image.‘ To measure the strength of the proposed technique, simulation results and statistical analyses are made. Most significant analyses techniques including measures of homogeneity, contrast, energy, entropy, correlation, mean squared error and peak signal to noise ratio are applied which show coherent results. To determine the robustness of our is effectively strong.

Keywords

Local ring Galois field S-box Digital watermarking Discrete cosine transform 

List of symbols

\(\varvec{F}_{{2^{n} }}\)

Galois field of order 2n

DCT

Discrete cosine transform

H

The host image

W

The watermark image

References

  1. 1.
    Mukherjee, D. P., Maitra, S., & Acton, S. T. (2004). Spatial domain digital watermarking of multimedia objects for buyer authentication. IEEE Transactions on Multimedia, 6(1), 1–15.CrossRefGoogle Scholar
  2. 2.
    Lin, S. D., & Chen, C. F. (2000). A robust DCT-based watermarking for copyright protection. IEEE Transactions on Consumer Electronics, 46, 415–421.CrossRefGoogle Scholar
  3. 3.
    Caronni, G. (1995). Assuring ownership rights for digital images. In Proceedings of reliable IT systems (pp. 251–263).Google Scholar
  4. 4.
    Vasudev, R. (2016). A review on digital image watermarking and its techniques. Journal of Image and Graphics, 4(2), 150–153.CrossRefGoogle Scholar
  5. 5.
    Kitamytra, I., Kanai, S., Kanai, T., & Kishinami, T. (2001). Copyright protection of vector map using digital watermarking method based on discrete Fourier transform. In Proceedings of IEEE international symposium on geosciences and remote sensing (pp. 1191–1193).Google Scholar
  6. 6.
    Hong, W. D., Ming, L. D., Jun, Y., & Xiong, C. F. (2007). An improved chirp typed blind watermarking algorithm based on wavelet and fractional Fourier transform. In Proceedings of IEEE international conference on images and graphics (pp. 291–296).Google Scholar
  7. 7.
    Lai, C. C., & Tsai, C. C. (2008). Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Transaction on Instrumentation and Measurement, 59(11), 3060–3063.CrossRefGoogle Scholar
  8. 8.
    Safabakhsh, R., Zaboli, S., & Tabibiazar, A. (2004). Digital watermarking on still images using wavelet transform. In Proceedings of international conference on information technology: coding and computing-ITCC.Google Scholar
  9. 9.
    Kang, X., Huang, J., Shi, Y. Q., & Lin, Y. (2003). A DWTDFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Transactions on Circuits and Systems for Video Technology, 13(8), 776–786.CrossRefGoogle Scholar
  10. 10.
    Kaur, S., & Sidhu, R. K. (2016). Robust digital image watermarking for copyright protection with SVD–DWT–DCT and Kalman filtering. International Journal Emerging Technologies in Engineering Research, 4(1), 59–63.Google Scholar
  11. 11.
    Wang, G. M., & Hou, Z. F. (2008). Watermarking scheme based on DCT. Computer Engineering and Design, 29(21), 5635–5637.Google Scholar
  12. 12.
    Liu, F., & Yang, F. (2009). An improved blind watermarking algorithm based on DCT. Computer Engineering and Applications, 45(13), 124–126.Google Scholar
  13. 13.
    Zhang, Q., Li, Y., & Wei, X. (2012). An improved robust and adaptive watermarking algorithm based on DCT. Journal of Applied Research and Technology, 10(3), 405–415.Google Scholar
  14. 14.
    Xu, Z. H., Shen, G., & Lin, S. (2011). Image encryption algorithm based on chaos and S-boxes scrambling. Advanced Materials Research, 171172, 299–304.Google Scholar
  15. 15.
    Jamal, S. S., Shah, T., & Khan, M. U. (2016). A watermarking technique with chaotic fractional S-box transformation. Wireless Personal Communications, 90(4), 2033–2049.CrossRefGoogle Scholar
  16. 16.
    Farwa, S., Shah, T., & Idrees, L. (2016). A highly nonlinear S-box based on a fractional linear transfornation. SpringerPlus, 5(1), 1658.  https://doi.org/10.1186/s40064-016-3298-7.CrossRefGoogle Scholar
  17. 17.
    Benvenuto, C. J. (2012). Galois field in cryptography. Washington: University of Washington.Google Scholar
  18. 18.
    Adams, C., & Tavares, S. (1989). In Advances in cryptology: proceedings of CRYPTO. Lecture notes in computer science (Vol. 89, pp. 612–615).Google Scholar
  19. 19.
    Webster, A. F., & Tavares, S. E. (1986). On the design of S-boxes. In Advances in cryptology: proceedings of CRYPTO’85 (pp. 523–534). Berlin: Springer.Google Scholar
  20. 20.
    Sattar, F., & Mufti, M. (2011) Spectral characterization and analysis of avalanche in cryptographic substitution boxes using Walsh-Hadamard transformations. International journal of Computer Applications, 28(6), 0975–8887.CrossRefGoogle Scholar
  21. 21.
    Wang, Y., Xie, Q., Wu, Y., & Du, B. (2009) A software for S-box performance analysis and test. In International conference on electronic commerce and business intelligence (pp. 125–128).Google Scholar
  22. 22.
    Cox, J., Kilian, J., Leighton, F. T., & Shamoon, T. (1997). Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12), 1673–1687.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  • Sajjad Shaukat Jamal
    • 1
    Email author
  • Tariq Shah
    • 1
  • Shabieh Farwa
    • 2
  • Muhammad Usman Khan
    • 3
  1. 1.Department of MathematicsQuaid-i-Azam University IslamabadIslamabadPakistan
  2. 2.Department of MathematicsCOMSATS Institute of Information Technology, Wah CampusWah Cantt.Pakistan
  3. 3.Department of ElectronicsQuaid-i-Azam University IslamabadIslamabadPakistan

Personalised recommendations