A Comparison Between Robust Image Encryption and Watermarking Methods for Digital Image Protection

  • Sreya VemuriEmail author
  • Rejo Mathew
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 49)


Sharing digital image across networks is a common means of multimedia communication. However, these images are subject to all sorts of different attacks, like chosen plaintext attack, noise attack and, geometrical attacks. In order to resist these attacks, encryption and watermarking schemes are designed. This paper compares and analyzes the different encryption and watermarking methods.


Image Encryption Watermarking Noise Robust Chaotic mapping Chosen plaintext attack Geometrical attack Salt and Pepper noise Impulse Valued Noise 


  1. 1.
    Deng, Z., Zhong, S.: A digital image encryption algorithm based on chaotic mapping. J. Algorithms Comput. Technol. (2019)Google Scholar
  2. 2.
    Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcat. Chaos 16(8), 2129–2151 (2006)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Tao, H., et al.: Robust image watermarking theories and techniques: a review. J. Appl. Res. Technology 12(1), 122–138 (2014)CrossRefGoogle Scholar
  4. 4.
    Li, C., et al.: Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access 6, 75834–75842 (2018)CrossRefGoogle Scholar
  5. 5.
    Boyat, A.K., Joshi, B.K.: A review paper: noise models in digital image processing. arXiv preprint arXiv:1505.03489 (2015)
  6. 6.
    Licks, V., Jordan, R.: Geometric attacks on image watermarking systems. IEEE Multimed. 3, 68–78 (2005)CrossRefGoogle Scholar
  7. 7.
    Dong, P., et al.: Digital watermarking robust to geometric distortions. IEEE Trans. Image Process. 14(12), 2140–2150 (2005)CrossRefGoogle Scholar
  8. 8.
    Luo, Y., et al.: A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimed. Tools Appl. 1–21 (2019)Google Scholar
  9. 9.
    Zahmoul, R., Ejbali, R., Zaied, M.: Image encryption based on new Beta chaotic maps. Opt. Lasers Eng. 96, 39–49 (2017)CrossRefGoogle Scholar
  10. 10.
    Li, C., et al.: An image encryption scheme based on chaotic tent map. Nonlinear Dyn. 87(1), 127–133 (2017)CrossRefGoogle Scholar
  11. 11.
    Ma, S., Zhang, Y., Yang, Z., Hu, J., Lei, X.: A new plaintext-related image encryption scheme based on chaotic sequence. IEEE Access 7, 30344–30360 (2019)CrossRefGoogle Scholar
  12. 12.
    Hua, Z., Zhou, Y.: Image encryption using 2D logistic-adjusted-sine map. Inf. Sci. 339, 237–253 (2016)CrossRefGoogle Scholar
  13. 13.
    Liu, Y., et al.: Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Syst. Appl. 97, 95–105 (2018)CrossRefGoogle Scholar
  14. 14.
    Praveena, A., Smys, S.: Efficient cryptographic approach for data security in wireless sensor networks using MES VU. In: 2016 10th International Conference on Intelligent Systems and Control (ISCO), pp. 1–6. IEEE (2016)Google Scholar
  15. 15.
    Ernawan, F., Kabir, M.N.: A robust image watermarking technique with an optimal DCT-psychovisual threshold. IEEE Access 6, 20464–20480 (2018)CrossRefGoogle Scholar
  16. 16.
    Abu, N.A., Ernawan, F.: A novel psychovisual threshold on large DCT for image compression. Sci. World J. 2015, 11 (2015)CrossRefGoogle Scholar
  17. 17.
    Zhou, X., Zhang, H., Wang, C.: A robust image watermarking technique based on DWT, APDCBT, and SVD. Symmetry 10(3), 77 (2018)CrossRefGoogle Scholar
  18. 18.
    Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. (JSAT) 1(2), 31–38 (2011)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Information TechnologyMukesh Patel School of Technology Management and Engineering, NMIMS (Deemed-to-be) UniversityMumbaiIndia

Personalised recommendations