Skip to main content

A Comparison Between Robust Image Encryption and Watermarking Methods for Digital Image Protection

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 49))

Abstract

Sharing digital image across networks is a common means of multimedia communication. However, these images are subject to all sorts of different attacks, like chosen plaintext attack, noise attack and, geometrical attacks. In order to resist these attacks, encryption and watermarking schemes are designed. This paper compares and analyzes the different encryption and watermarking methods.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Deng, Z., Zhong, S.: A digital image encryption algorithm based on chaotic mapping. J. Algorithms Comput. Technol. (2019)

    Google Scholar 

  2. Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcat. Chaos 16(8), 2129–2151 (2006)

    Article  MathSciNet  Google Scholar 

  3. Tao, H., et al.: Robust image watermarking theories and techniques: a review. J. Appl. Res. Technology 12(1), 122–138 (2014)

    Article  Google Scholar 

  4. Li, C., et al.: Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access 6, 75834–75842 (2018)

    Article  Google Scholar 

  5. Boyat, A.K., Joshi, B.K.: A review paper: noise models in digital image processing. arXiv preprint arXiv:1505.03489 (2015)

  6. Licks, V., Jordan, R.: Geometric attacks on image watermarking systems. IEEE Multimed. 3, 68–78 (2005)

    Article  Google Scholar 

  7. Dong, P., et al.: Digital watermarking robust to geometric distortions. IEEE Trans. Image Process. 14(12), 2140–2150 (2005)

    Article  Google Scholar 

  8. Luo, Y., et al.: A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimed. Tools Appl. 1–21 (2019)

    Google Scholar 

  9. Zahmoul, R., Ejbali, R., Zaied, M.: Image encryption based on new Beta chaotic maps. Opt. Lasers Eng. 96, 39–49 (2017)

    Article  Google Scholar 

  10. Li, C., et al.: An image encryption scheme based on chaotic tent map. Nonlinear Dyn. 87(1), 127–133 (2017)

    Article  Google Scholar 

  11. Ma, S., Zhang, Y., Yang, Z., Hu, J., Lei, X.: A new plaintext-related image encryption scheme based on chaotic sequence. IEEE Access 7, 30344–30360 (2019)

    Article  Google Scholar 

  12. Hua, Z., Zhou, Y.: Image encryption using 2D logistic-adjusted-sine map. Inf. Sci. 339, 237–253 (2016)

    Article  Google Scholar 

  13. Liu, Y., et al.: Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Syst. Appl. 97, 95–105 (2018)

    Article  Google Scholar 

  14. Praveena, A., Smys, S.: Efficient cryptographic approach for data security in wireless sensor networks using MES VU. In: 2016 10th International Conference on Intelligent Systems and Control (ISCO), pp. 1–6. IEEE (2016)

    Google Scholar 

  15. Ernawan, F., Kabir, M.N.: A robust image watermarking technique with an optimal DCT-psychovisual threshold. IEEE Access 6, 20464–20480 (2018)

    Article  Google Scholar 

  16. Abu, N.A., Ernawan, F.: A novel psychovisual threshold on large DCT for image compression. Sci. World J. 2015, 11 (2015)

    Article  Google Scholar 

  17. Zhou, X., Zhang, H., Wang, C.: A robust image watermarking technique based on DWT, APDCBT, and SVD. Symmetry 10(3), 77 (2018)

    Article  Google Scholar 

  18. Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. (JSAT) 1(2), 31–38 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sreya Vemuri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Vemuri, S., Mathew, R. (2020). A Comparison Between Robust Image Encryption and Watermarking Methods for Digital Image Protection. In: Pandian, A., Palanisamy, R., Ntalianis, K. (eds) Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019). ICCBI 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 49. Springer, Cham. https://doi.org/10.1007/978-3-030-43192-1_14

Download citation

Publish with us

Policies and ethics