Abstract
Digital Image Watermarking has recently been used widely to address issues concerning authentication and copyright protection. Chaos is one of the promising techniques implemented in image watermarking schemes. In this paper, a new watermarking algorithm based on chaos along with discrete wavelet transform and z-transformation is proposed. The host image is decomposed into 3-level Discrete Wavelet Transform (DWT). The HH3 and HL3 sub-bands are then converted to z-domain using z-transformation (ZT). Arnold Cat Map (ACM), a chaotic map is applied to the watermark image and it is divided into two equal parts. The sub-bands HH3 and HL3 are chosen for embedding the watermark image. One part of the watermark is embedded in the z-transformed HH3 sub-band, and the other part is embedded in the z-transformed HL3 sub-band. The watermarked image is obtained by taking the inverse of the ZT and the inverse of DWT. The experimental results and the performance analysis show that the proposed method is efficient and can provide practical invisibility with additive robustness.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6, 1673–1687 (1997)
Barni, M., Bartolini, F., Cappellini, V., Piva, A.: A dct-domain system for robust image watermarking. Sig. Process. 66, 357–372 (1998)
Sifuzzaman, M., Islam, M.R., Ali, M.Z.: Application of wavelet transform and its advantages compared to Fourier transform. J. Phys. Sci. 13, 121–134 (2009)
Dawei, Z., Guanrong, C., Wenbo, L.: A chaos based robust wavelet domain watermarking algorithm. Chaos, Solitons Fractals 22(1), 47–54 (2004)
Yang, Q., Cai, Y.: A digital image watermarking algorithm based on discrete wavelet transform and discrete cosine transform. In: 2012 International Symposium on Information Technology in Medicine and Education
Liu, B., Liu, N., Li, J.X., Liand, W.: Research of image encryption algorithm base on chaos theory. In: IEEE 6th International Forum on Strategic Technology (2011)
Wu, X., Guan, Z.H.: A novel digital watermark algorithm based on chaotic maps. Phys. Lett. A 365(5–6), 403–406 (2007)
Rabiner, L.R., Schafer, R.W., Rader, C.M.: The chirp z-transform algorithm and its applications. Bell Syst. Tech. J. 1249–1292 (1969)
Vinod, P., Pareek, N.K., Sud, K.K.: A new substitution-diffusion based image cipher using chaotic standard and logistic maps. Elsevier (2008)
Fei, C., Kwok-Wo, W., Xiaofeng, L., Tao, X.: Period distribution of the generalized discrete arnold cat map for NÂ =Â 2e. IEEE Trans. Inform. Theory 59(5) (2013)
Pisarchik, A.N., Zanin, M.: Chaotic map cryptography and security. In: Encryption: Methods, Software and Security
Zhang, L., Liao, X., Wang, X.: An image encryption approach based on chaotic maps. Chaos, Solitons Fractals 24, 759–765 (2005)
Ho, A.T.S.,, Xunzhan, Z., Jun, S., Pina, M.: Fragile watermarking based on Encoding of the Zeros of the z-Transform. IEEE Trans. Inform. Forensics Secur. 3(3) (2008)
Ho, A.T.S., Xunzhan, Z., Jun, S.: Authentication of biomedical images based on zero location watermarking. In: 8th International Conference on Control, Automation, Robotics and Vision, Kunming, China (2004)
Vich, R.: Z-Transform theory and applications. D. Reidel Publishing Company, Dordrechi (1987)
Stillings, S.A.: A Study of the Chirp Z-Transform Algorithm and its Applications, Technical Report. Kansas State University (1972)
Kolchi, S., Masataka, K., Tomohisa, M.: Applications of image reconstruction by means of Chirp z-Transform. MVA’90, IAPR Workshop on Machine Vision Applications, Tokyo Nov. 28–30 1990
Khan, M.S., Boda, R., Vamshi Bhukaya, V.: A copyright protection scheme and tamper detection using z transform. Int. J. Comput. Electric. Adv. Commun. Eng. 1(1) (2012)
Mary, A., Erbug, Ç., Gholamreza, A.: A watermarking algorithm based on chirp z-transform, discrete wavelet transform, and singular value decomposition. SIViP. Springer-Verlag, London (2014). doi:10.1007/s11760-014-0624-9
Mandal, J.K.: A frequency domain steganography using Z transform (FDSZT). In: International Workshop on Embedded Computing and Communication System (IWECC 2011), Rajagiri School of Engineering & Technology, Kochin 22–23 Dec. 2011
Cox, I.J., Matthew, L.M., Jeffrey, A.B., et al.: Digital watermarking and steganography, 2nd edn. Morgan Kaufmann Publishers (Elsevier), Burlington (2007)
Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Jayashree, N., Bhuvaneswaran, R.S. (2016). Z-Transform Based Digital Image Watermarking Scheme with DWT and Chaos. In: Nagar, A., Mohapatra, D., Chaki, N. (eds) Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics. Smart Innovation, Systems and Technologies, vol 43. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2538-6_30
Download citation
DOI: https://doi.org/10.1007/978-81-322-2538-6_30
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2537-9
Online ISBN: 978-81-322-2538-6
eBook Packages: EngineeringEngineering (R0)