Multimedia Tools and Applications

, Volume 77, Issue 24, pp 31737–31762 | Cite as

Publicly verifiable watermarking scheme for intellectual property protection using quantum Chaos and bit plane complexity slicing

  • Gaurav SharmaEmail author
  • Shailender Gupta
  • Sangeeta Dhall
  • C. K. Nagpal


Intellectual Property such as music, painting, videos and other similar works being broadcasted on web need to be protected against copyright infringement to ensure the rights of their legitimate owners. Moreover, their users must also be sure of the originality of these artefacts. Both these problems can be solved through proper authentication on behalf of the creator. For this purpose, various publicly verifiable watermarking schemes have been available in literature. Recent proposal, in this domain, is based on chaos theory and Secured Hashing Algorithms SHA-2. Due to tremendous growth in the availability of Intellectual Property on the web and associated breaches it becomes a mandatory requirement to update these authenticating schemes. This paper proposes the usage of some more secure, reliable and efficient components in watermarking schemes than being used at present. Proposed changes include the deployment of encryption scheme based on Quantum Logistic maps instead of current Chaos encryption based on peter de-jong map, in order to optimise randomness, correlation and time complexity. For better security and efficiency in hardware implementation SHA-3 is a better choice than SHA-2. Data embedding can be done in regions where imperceptibility is quite high. The proposed changes can result in the creation of more reliable and efficient system. To test the hypothesis, proposed mechanism has been implemented in MATLAB-16a and various performance metrics such as correlation coefficient, PSNR, UIQI, SSIM have been measured. The results show that proposed scheme outperforms its counterpart in terms of all the performance metrics.


BPCS Chaotic maps Hash Quantum chaotic maps Zero knowledge verification protocol 


  1. 1.
    Adelsbach A, Sadeghi A-R (2001) Zero-knowledge watermark detection and proof of ownership, in Proc. 4th Int. Workshop Inf. Hiding, pp. 273–288CrossRefGoogle Scholar
  2. 2.
    Akhshani A, Akhavan A, Lim S-C, Hassan Z (2012) An image encryption scheme based on quantum logistic map. Communications in Non- linear Science and Numerical Simulation 17(12):4653–4661MathSciNetCrossRefGoogle Scholar
  3. 3.
    Beth T (1988) Efficient zero-knowledged identification scheme for smart cards, in Advances in Cryptology (Lecture Notes in Computer Science), Heidelberg, Germany: Springer-Verlag, vol. 330, pp. 77–84Google Scholar
  4. 4.
    Chang CC, Hu YS, Lu TC (2006) A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn Lett 27(5):439–446CrossRefGoogle Scholar
  5. 5.
    Dworkin MJ (2018) SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions.Federal Inf. Process. Stds. (NIST FIPS) – 202.
  6. 6.
    El-Latifa AAA, Li L, Wang N, Han Q, Niu XM (2013) A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal Processing, Crossref 93:2986–3000CrossRefGoogle Scholar
  7. 7.
    Hanchinamani G, Kulkarni L (2015) An efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher. 3D Res 6(3):1–15CrossRefGoogle Scholar
  8. 8.
    Kawaguchi E, Eason R (1998) Principle and applications of BPCS-Steganography. Proc. SPIE, Multimedia Systems and Applications, Conference Volume 3528, doi:
  9. 9.
    Kumar C, Singh AK, Kumar P (2018) A recent survey on image watermarking techniques and its application in e-governance. Multimedia Tools and Applications 77(3):3597–3622CrossRefGoogle Scholar
  10. 10.
    Lach J, Mangione-Smith WH, Potkonjak M (1999) Robust FPGA intellectual property protection through multiple small watermarks, in Proc. 36th Annu. ACM/IEEE Design Autom. Conf., pp. 831–836Google Scholar
  11. 11.
    Lach J, Mangione-Smith WH, Potkonjak M (2001) Fingerprinting techniques for field-programmable gate array intellectual property protection. IEEE Trans Comput-Aided Des Integr Circuits Syst 20:1253–1261CrossRefGoogle Scholar
  12. 12.
    LeClair, J (2015) Interview by David Weldon. Are your biggest security threats on the inside?. CIO MagazineGoogle Scholar
  13. 13.
    Lemley MA (2005) Property, intellectual property, and free riding. Texas Law Review 83:1031Google Scholar
  14. 14.
    Mohanty SP, Kumara RC, Nayak S (2004) FPGA based implementation of an invisible-robust image watermarking encoder. Lecture Notes in Computer Science (LNCS), CIT, Springer-Verlag 3356:344–353CrossRefGoogle Scholar
  15. 15.
    Phan RCW (2008) Tampering with a watermarking-based image authentication scheme. Pattern Recogn 41:3493–3496CrossRefGoogle Scholar
  16. 16.
    Podilchuk CI, Delp EJ (2001) Digital watermarking: algorithms and applications, Published in: IEEE Signal Processing Magazine, Vol: 18, Issue: 4, pp. 33–46Google Scholar
  17. 17.
    Qu G (2002) Publicly detectable watermarking for intellectual property authentication in VLSI design. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 21:1363–1368CrossRefGoogle Scholar
  18. 18.
    Saha D, Sur-Kolay S (2012) Secure public verification of intellectual property marks in FPGA design through a zero-knowledge protocol. IEEE Trans Very Large Scale Integr (VLSI) Syst 20(10):1749–1757CrossRefGoogle Scholar
  19. 19.
    Schneier B (1995) Chapter 17 – Other Stream Ciphers and Real Random-Sequence Generators. Applied Cryptography: Protocols, Algorithms, and Source Code in C (2nd ed.), Wiley, ISBN 978–0471117094Google Scholar
  20. 20.
    Secure Hash Standard (SHS) (2015) August 2015, Federal Information Processing Standard (FIPS) 180-4.
  21. 21.
    Tehranipoor M, Wang C (2011) Introduction to Hardware Security and Trust. SpringerGoogle Scholar
  22. 22.
    The Intellectual Property Commission Report (2013), published on behalf of The Commission on the Theft of American Intellectual Property by The National Bureau of Asian ResearchGoogle Scholar
  23. 23.
    Wang Z, Bovik AC (2002) A universal image quality index. IEEE Signal Processing Letters 9(3):81–84CrossRefGoogle Scholar
  24. 24.
    Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612CrossRefGoogle Scholar
  25. 25.
    Wang X, Qin Q, Cheng Y. (2012) Design and Implementation of Digital Image Watermark Based on FPGA. Heidelberg: Springer Berlin: Recent Advances in Computer Science and Information Engineering (Lecture Notes in Computer Science), pp. 223–29CrossRefGoogle Scholar
  26. 26.
    Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications 2:31–38Google Scholar
  27. 27.
    Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimedia Tools and Applications 77(4):4863–4882CrossRefGoogle Scholar
  28. 28.
    Zhang J, Liu L (2017) Publicly Verifiable Watermarking for Intellectual Property Protection in FPGA Design, in IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 25, no. 4, pp. 1520–1527CrossRefGoogle Scholar
  29. 29.
    Zhang J, Lin Y, Wu Q, Che W (2012) Watermarking FPGA bitfile for intellectual property protection. Radioengineering 21(2):764–771Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Gaurav Sharma
    • 1
    Email author
  • Shailender Gupta
    • 1
  • Sangeeta Dhall
    • 1
  • C. K. Nagpal
    • 1
  1. 1.YMCA University of Science and TechnologyFaridabadIndia

Personalised recommendations