watermarking scheme based on multiple chaotic maps

نویسندگان

j. ayubi

f. mohanna

s. mohanna

m. rezaei

چکیده

a watermarking scheme for grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. jacobian elliptic mapis employed to encrypt ofwatermarked logo. piecewise nonlinear chaotic map is also usedto determine the location of dct coefficients for the watermarkembedding. the purpose of this algorithm is to improve theshortcoming of watermarking such as small key space and lowsecurity. therefore the size of key space for initial conditions andcontrol parameters is computed about and this keyspace is large enough to resist the attacks. toevaluate therobustness and effectiveness of proposed method, several attacksare applied to the

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Watermarking Scheme Based on Multiple Chaotic Maps

a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...

متن کامل

study of hash functions based on chaotic maps

توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...

Watermarking schemebased on Multiple Chaotic Maps

a watermarking scheme for Grayscale image is proposed based on a family of the chaotic maps and discrete cosine transform. Jacobian Elliptic mapis employed to encrypt of watermarked logo. Piecewise nonlinear chaotic map is also used to determine the location of DCT coefficients for the watermark embedding. The purpose of this algorithm is to improve the shortcoming of watermarking such as small...

متن کامل

Blind Image Watermarking Based on Chaotic Maps

Security of a watermark refers to its resistance to unauthorized detecting and decoding, while watermark robustness refers to the watermark’s resistance against common processing. Many watermarking schemes emphasize robustness more than security. However, a robust watermark is not enough to accomplish protection because the range of hostile attacks is not limited to common processing and distor...

متن کامل

Chaotic Cryptographic Scheme Based on Composition Maps

In recent years, a growing number of cryptosystems based on chaos have been proposed. But most of them encountered more problems such as small key space and weak security. Based on such a fact, in the present report, a new kind of chaotic cryptosystem based on Composition of Trigonometric Chaotic Maps (CTCMs) is proposed. In the new scheme employs the composition map to shuffle the positions of...

متن کامل

Hybrid Watermarking Scheme for Copyright Protection using Chaotic Maps Cryptography

Nowadays, there is an explosive growth in the digital multimedia creation, capturing, processing and distribution. Protecting the multimedia contents from copyright infringement has become a major concern. Encryption and watermarking are two complementary techniques that are used for protecting the multimedia data. In this paper, a proposed hybrid encryption-watermarking algorithm for copyright...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید


عنوان ژورنال:
international journal of communications and information technology

ناشر: university of sistan and baluchestan

ISSN 2322-4606

دوره 1

شماره 2 2011

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023