Skip to main content

Part of the book series: Understanding Complex Systems ((UCS))

  • 1776 Accesses

Abstract

To protect copyrights of multi-media products effectively, we focus on the topic of chaos applications in digital watermarking. Digital watermarking algorithms in digital images or video based on chaos and other techniques were proposed. The experiments results show that the proposed algorithms keep the quality of the image or video well and are robust enough to various attacking. Especially, the security performance of the watermarking algorithms is improved a lot after chaos is employed. This chapter is organized as follows. In Sect. 8.1, we present two chaos-based robust image watermarking schemes. The first one is chaos-based image spatial domain watermarking, and the other is chaos-based image discrete wavelet transform (DWT) domain robust digital watermarking. In these robust image watermarking schemes, discrete chaotic maps are adopted to scramble the watermarks or for selecting watermarks embedding positions. In Sect. 8.2, chaos-based fragile and semi-fragile image watermarking algorithms are presented, respectively. Chaotic maps are used to generate the chaotic fragile watermark image or the semi-fragile binary pseudo-random watermark sequence. The fragile and semi-fragile image watermarking techniques can be used for image authentication or image malicious tamper detection. In Sect. 8.3, a chaos-based multipurpose image watermarking technique is described, which can be applied to image authentication and copyright protection simultaneously. Finally, a digital video watermarking algorithm based on chaos and motion vector is presented in Sect. 8.4, which can be applied to protect video products copyright.

Digital watermarking is a branch of information hiding which is used to hide proprietary information in digital media, such as image, video, text and so on. In some applications, the sensitive digital media related to politics or commerce, such as military maps, medical images or multi-resolution images, should be protected in order to avoid unauthorized users knowing it. A digital watermark is a visible, or preferably invisible, identification code that is permanently embedded in digital media, to prove owner authentication thereby providing a level of document protection.

In recent years, chaotic maps have been used for digital watermarking, to increase the security. The most attractive features of chaos in information hiding are its extreme sensitivity to initial conditions and the outspreading of orbits over the entire space [1]. These special characteristics make chaotic maps excellent candidates for watermarking and encryption, based on the classic Shannon’s requirement of confusion and diffusion [2].

Generally speaking, chaos applications in digital watermarking include: to generate the watermarks, for encrypting watermark images, for selecting the embedding places in image watermarking, for watermark embedding and watermark extraction.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dawei, Z., Guanrong, C., Wenbo, L.: A chaos-based robust wavelet-domain watermarking algorithm [J]. Chaos Solitons Fractals 22(1), 47–54 (2004)

    Article  MATH  Google Scholar 

  2. Schmitz, R.: Use of chaotic dynamical systems in cryptography [J]. J. Franklin. Inst. 338, 429–41 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  3. Shih, F.Y., Wu, S.Y.T.: Combinational image watermarking in the spatial and frequency domains[J]. Pattern Recogn. 36(4), 969–975 (2003)

    Article  Google Scholar 

  4. Hwang, M.S., Chang, C.C., Hwang, K.F.: A watermarking technique based on one-way hash functiojn[J]. IEEE Trans. Consum. Electron. 45(2), 286–294 (1999)

    Article  Google Scholar 

  5. Qi, S., Zhu, G., Rong, T., et al.: A kind of digital watermarking algorithm based on modulo[J]. Acta Electron. Sinica 30(6), 890–892 (2002)

    Google Scholar 

  6. Arnold, V., Avez, A.: Ergodic Problems in Classical Mechanics [M]. Benjamin, New York (1968)

    Google Scholar 

  7. Paquet, A.H., Ward, R.K., Pitas, I.: Wavelet pacets-based digital watermarking for image verifica tion and authentication [J]. Signal Process. 83(10), 2117–2132 (2003)

    Article  MATH  Google Scholar 

  8. Liu, S., Yao, H., Gao, W., et al.: An image fragile watermark scheme based on chaotic image pattern and pixel-pairs [J]. Appl. Math. Comput. 185(2), 869–882 (2007)

    Article  MATH  Google Scholar 

  9. Zhu, B.B., Swanson, M.D., Tewfik, A.H.: When seeing is not believing [J]. IEEE Signal Process. Mag. 21(2), 40–49 (2004)

    Article  Google Scholar 

  10. Yuan, H., Zhang, X.P.: A multiscale fragile watermarking based on the Gaussian mixture model in the wavelet domain. Proceedings of the 2004 International Conference on Acoustics, Speech and Signal Processing, vol. 3, pp. 413–416, Montreal, QC, Canada, May 2004

    Google Scholar 

  11. Ding, K., He, C., Jiang, L.G., Wang, H.X.: Wavelet-based semi-fragile watermarking with tamper detection. Ieice Transactions on Fundamentals, vol. E88–A, no. 3, pp. 787–790, 2005

    Google Scholar 

  12. Lu, Z., Xu, D., Sun, S.: Multipurpose image watermarking algorithm based on multistage vector quantization [J]. IEEE Trans. Image Process. 14(6), 822–831 (2005)

    Article  Google Scholar 

  13. Liu, Y., Zhao, J.: A new video watermarking algorithm based on 1D DFT and Radon transform. Signal Process. 90(2), 626–639 (2010)

    Article  MATH  Google Scholar 

  14. Kim, D.-W., Choi, Y.-G., Kim, H.-S., Yoo, J.-S., Choi, H.-J., Seo, Y.-H.: The problems in digital watermarking into intra-frames of H.264/AVC. Image Vision Comput. 28(8), 1220–1228 (2010)

    Google Scholar 

  15. Yang, G., Li, J., He, Y., Kang, Z.: An information hiding algorithm based on intra-prediction modes and matrix coding for H.264/AVC video stream. Int. J. Electron. Comm. 65(4), 331–337 (2011)

    Google Scholar 

  16. Singh, N., Sinha, A.: A chaotic system based fragile watermarking scheme for image tamper detection [J]. Int. J. Electron. Commun. 65, 840–847 (2011)

    Article  Google Scholar 

  17. Sheng, L., Sun, K., Li, C.: Study of a discrete chaotic system based on tangent-delay for elliptic reflecting cavity and its properties [J]. Acta Phys. Sinica 53(9), 2871–2876 (2004)

    Google Scholar 

  18. Sheng, L., Cao, L., Sun, K., Wen, J.: Pseudo-random number generator based on TD-ERCS chaos and its statistic characteristics analysis[J]. Acta Phys. Sinica 54(9), 4031–4037 (2005)

    Google Scholar 

  19. Sun, K., Tang, G., Sheng, L.: The complexity analysis of TD-ERCS discrete chaotic pseudo-random sequences [J]. Acta Phys. Sinica 57(6), 3359–3366 (2008)

    MathSciNet  MATH  Google Scholar 

  20. Fan, M., Wang, H.: Chaos-based discrete fractional Sine transform domain audio watermarking scheme [J]. Comput. Electr. Eng. 35, 506–516 (2009)

    Article  MATH  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Nature Science Foundation of People’s Republic of China (Grant NO. 61073187), and the SRF for ROCS, SEM. The author Prof. Sun would like to express thanks to his graduate student Mr. Cheng Wei for his experiment research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kehui Sun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Zhu, C., Sun, K. (2012). Chaos Applications in Digital Watermarking. In: Banerjee, S., Rondoni, L., Mitra, M. (eds) Applications of Chaos and Nonlinear Dynamics in Science and Engineering - Vol. 2. Understanding Complex Systems. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29329-0_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29329-0_8

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29328-3

  • Online ISBN: 978-3-642-29329-0

  • eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)

Publish with us

Policies and ethics