Abstract
Sharing digital image across networks is a common means of multimedia communication. However, these images are subject to all sorts of different attacks, like chosen plaintext attack, noise attack and, geometrical attacks. In order to resist these attacks, encryption and watermarking schemes are designed. This paper compares and analyzes the different encryption and watermarking methods.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Deng, Z., Zhong, S.: A digital image encryption algorithm based on chaotic mapping. J. Algorithms Comput. Technol. (2019)
Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcat. Chaos 16(8), 2129–2151 (2006)
Tao, H., et al.: Robust image watermarking theories and techniques: a review. J. Appl. Res. Technology 12(1), 122–138 (2014)
Li, C., et al.: Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access 6, 75834–75842 (2018)
Boyat, A.K., Joshi, B.K.: A review paper: noise models in digital image processing. arXiv preprint arXiv:1505.03489 (2015)
Licks, V., Jordan, R.: Geometric attacks on image watermarking systems. IEEE Multimed. 3, 68–78 (2005)
Dong, P., et al.: Digital watermarking robust to geometric distortions. IEEE Trans. Image Process. 14(12), 2140–2150 (2005)
Luo, Y., et al.: A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimed. Tools Appl. 1–21 (2019)
Zahmoul, R., Ejbali, R., Zaied, M.: Image encryption based on new Beta chaotic maps. Opt. Lasers Eng. 96, 39–49 (2017)
Li, C., et al.: An image encryption scheme based on chaotic tent map. Nonlinear Dyn. 87(1), 127–133 (2017)
Ma, S., Zhang, Y., Yang, Z., Hu, J., Lei, X.: A new plaintext-related image encryption scheme based on chaotic sequence. IEEE Access 7, 30344–30360 (2019)
Hua, Z., Zhou, Y.: Image encryption using 2D logistic-adjusted-sine map. Inf. Sci. 339, 237–253 (2016)
Liu, Y., et al.: Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Syst. Appl. 97, 95–105 (2018)
Praveena, A., Smys, S.: Efficient cryptographic approach for data security in wireless sensor networks using MES VU. In: 2016 10th International Conference on Intelligent Systems and Control (ISCO), pp. 1–6. IEEE (2016)
Ernawan, F., Kabir, M.N.: A robust image watermarking technique with an optimal DCT-psychovisual threshold. IEEE Access 6, 20464–20480 (2018)
Abu, N.A., Ernawan, F.: A novel psychovisual threshold on large DCT for image compression. Sci. World J. 2015, 11 (2015)
Zhou, X., Zhang, H., Wang, C.: A robust image watermarking technique based on DWT, APDCBT, and SVD. Symmetry 10(3), 77 (2018)
Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. (JSAT) 1(2), 31–38 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Vemuri, S., Mathew, R. (2020). A Comparison Between Robust Image Encryption and Watermarking Methods for Digital Image Protection. In: Pandian, A., Palanisamy, R., Ntalianis, K. (eds) Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019). ICCBI 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 49. Springer, Cham. https://doi.org/10.1007/978-3-030-43192-1_14
Download citation
DOI: https://doi.org/10.1007/978-3-030-43192-1_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-43191-4
Online ISBN: 978-3-030-43192-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)