watermarking scheme based on multiple chaotic maps
نویسندگان
چکیده
a watermarking scheme for grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. jacobian elliptic mapis employed to encrypt ofwatermarked logo. piecewise nonlinear chaotic map is also usedto determine the location of dct coefficients for the watermarkembedding. the purpose of this algorithm is to improve theshortcoming of watermarking such as small key space and lowsecurity. therefore the size of key space for initial conditions andcontrol parameters is computed about and this keyspace is large enough to resist the attacks. toevaluate therobustness and effectiveness of proposed method, several attacksare applied to the
منابع مشابه
Watermarking Scheme Based on Multiple Chaotic Maps
a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
Watermarking schemebased on Multiple Chaotic Maps
a watermarking scheme for Grayscale image is proposed based on a family of the chaotic maps and discrete cosine transform. Jacobian Elliptic mapis employed to encrypt of watermarked logo. Piecewise nonlinear chaotic map is also used to determine the location of DCT coefficients for the watermark embedding. The purpose of this algorithm is to improve the shortcoming of watermarking such as small...
متن کاملBlind Image Watermarking Based on Chaotic Maps
Security of a watermark refers to its resistance to unauthorized detecting and decoding, while watermark robustness refers to the watermark’s resistance against common processing. Many watermarking schemes emphasize robustness more than security. However, a robust watermark is not enough to accomplish protection because the range of hostile attacks is not limited to common processing and distor...
متن کاملChaotic Cryptographic Scheme Based on Composition Maps
In recent years, a growing number of cryptosystems based on chaos have been proposed. But most of them encountered more problems such as small key space and weak security. Based on such a fact, in the present report, a new kind of chaotic cryptosystem based on Composition of Trigonometric Chaotic Maps (CTCMs) is proposed. In the new scheme employs the composition map to shuffle the positions of...
متن کاملHybrid Watermarking Scheme for Copyright Protection using Chaotic Maps Cryptography
Nowadays, there is an explosive growth in the digital multimedia creation, capturing, processing and distribution. Protecting the multimedia contents from copyright infringement has become a major concern. Encryption and watermarking are two complementary techniques that are used for protecting the multimedia data. In this paper, a proposed hybrid encryption-watermarking algorithm for copyright...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
international journal of communications and information technologyناشر: university of sistan and baluchestan
ISSN 2322-4606
دوره 1
شماره 2 2011
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023