Watermarking Scheme Based on Multiple Chaotic Maps
Authors
Abstract:
a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key space and lowsecurity. Therefore the size of key space for initial conditions andcontrol parameters is computed about and this keyspace is large enough to resist the attacks. Toevaluate therobustness and effectiveness of proposed method, several attacksare applied to the
similar resources
watermarking scheme based on multiple chaotic maps
a watermarking scheme for grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. jacobian elliptic mapis employed to encrypt ofwatermarked logo. piecewise nonlinear chaotic map is also usedto determine the location of dct coefficients for the watermarkembedding. the purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...
full textstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
Watermarking schemebased on Multiple Chaotic Maps
a watermarking scheme for Grayscale image is proposed based on a family of the chaotic maps and discrete cosine transform. Jacobian Elliptic mapis employed to encrypt of watermarked logo. Piecewise nonlinear chaotic map is also used to determine the location of DCT coefficients for the watermark embedding. The purpose of this algorithm is to improve the shortcoming of watermarking such as small...
full textBlind Image Watermarking Based on Chaotic Maps
Security of a watermark refers to its resistance to unauthorized detecting and decoding, while watermark robustness refers to the watermark’s resistance against common processing. Many watermarking schemes emphasize robustness more than security. However, a robust watermark is not enough to accomplish protection because the range of hostile attacks is not limited to common processing and distor...
full textChaotic Cryptographic Scheme Based on Composition Maps
In recent years, a growing number of cryptosystems based on chaos have been proposed. But most of them encountered more problems such as small key space and weak security. Based on such a fact, in the present report, a new kind of chaotic cryptosystem based on Composition of Trigonometric Chaotic Maps (CTCMs) is proposed. In the new scheme employs the composition map to shuffle the positions of...
full textHybrid Watermarking Scheme for Copyright Protection using Chaotic Maps Cryptography
Nowadays, there is an explosive growth in the digital multimedia creation, capturing, processing and distribution. Protecting the multimedia contents from copyright infringement has become a major concern. Encryption and watermarking are two complementary techniques that are used for protecting the multimedia data. In this paper, a proposed hybrid encryption-watermarking algorithm for copyright...
full textMy Resources
Journal title
volume 1 issue 2
pages 1- 9
publication date 2011-09-20
By following a journal you will be notified via email when a new issue of this journal is published.
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023