Wuhan University Journal of Natural Sciences

, Volume 11, Issue 6, pp 1675–1678 | Cite as

Chaos-based multipurpose image watermarking algorithm

Information Hiding


To achieve the goal of image content authentication and copyright protection simultaneously, this paper presents a novel image dual watermarking method based on chaotic map. Firstly, the host image was split into many nonoverlapping small blocks, and the block-wise discrete cosine transform (DCT) is computed. Secondly, the robust watermarks, shuffled by the chaotic sequences, are embedded in the DC coefficients of blocks to achieve the goal of copyright protection. The semi-fragile watermarks, generated by chaotic map, are embedded in the AC coefficients of blocks to obtain the aim of image authentication. Both of them can be extracted without the original image. Simulation results demonstrate the effectiveness of our algorithm in terms of robustness and fragility.

Key words

copyright protection image authentication multipurpose watermarking chaos theory 

CLC number

TP 391.9 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    O'Ruanaidh J J K, Dowling W J, Boland F M. Watermarking Digital Images for Copyright Protection[J].IEE Proceedings—Vision, Image and Signal Processing, 1996,143 (4):250–256.CrossRefGoogle Scholar
  2. [2]
    Pereira S, Pun T. An Iterative Template Matching Algorithm Using the Chirp-Z Transform for Digital Image Watermarking[J].Pattern Recognition, 2000,33(1):173–175.CrossRefGoogle Scholar
  3. [3]
    Wang Y, Doherty J F, Van D R E. A Wavelet-Based Watermarking Algorithm for Ownership Verification of Digital Images[J].IEEE Trans Image Processing, 2002,11(2):77–88.CrossRefGoogle Scholar
  4. [4]
    Celik M U, Sharma G, Saber E,et al. Hierarchical Watermarking for Secure Image Authentication with Localization [J].IEEE Trans Image Processing, 2002,11(6):585–595.CrossRefGoogle Scholar
  5. [5]
    Kundur D, Hatzinakos D. Digital Watermarking for Telltale Tamper Proofing and Authentication[J].Proc IEEE, 1999,87(7):1167–1180.CrossRefGoogle Scholar
  6. [6]
    Ding K, He C, Jiang L G,et al. Wavelet-Based Semi-Fragile Watermarking with Tamper Detection[J].Ieice Trans Fundamentals, 2005,E88-A(3):787–790.CrossRefGoogle Scholar
  7. [7]
    Lu C S, Liao H Y M. Multipurpose Watermarking for Image Authentication and Protection[J].IEEE Trans Image Processing, 2001,10(10):1579–1592.MATHCrossRefGoogle Scholar
  8. [8]
    Lu C S, Liao H Y M, Chen L H. Multipurpose Audio Watermarking[C]15th International Conference on Pattern Recognition (ICPR-2000). Barcelona: IEEE Comput Soc Press, 2000:282–285.Google Scholar
  9. [9]
    Lu Z M, Zheng W M, Pan J S,et al. Multipurpose Image Watermarking Method Based on Mean-Removed Vector Quantization[J].Journal of Information Assurance and Security, 2006,1(1):33–42.Google Scholar
  10. [10]
    Lu Z M, Xu D G, Sun S H. Multipurpose Image Watermarking Algorithm Based on Multistage Vector Quantization [J].IEEE Trans Image Processing, 2005,14(6):822–831.CrossRefGoogle Scholar

Copyright information

© Springer 2006

Authors and Affiliations

  1. 1.School of Information Science and EngineeringCentral South UniversityChangsha, HunanChina

Personalised recommendations