Video Watermarking and Encryption Scheme for Online Multimedia Copyright Protection to Using Chaotic Maps CryptographyAuthor : J. Udayakumar, G. Prabakaran and R. Madhan Mohan
Volume 7 No.1 Special Issue:November 2018 pp 73-77
Nowadays, there is an explosive growth in the digital multimedia creation, capturing, processing and distribution. Protecting the multimedia contents from copyright in fingerprint has become a major concern. Encryption and watermarking are two complementary techniques that are used for protecting the multimedia data. In this paper, a proposed hybrid encryption-watermarking algorithm for copyright protection is proposed. The watermarking phase of this proposed algorithm is based on, the discrete cosine transform (DCT), while the encryption phase is based on using four chaotic maps with different dimensions. The proposed watermarking scheme uses a new PN-codes embedding strategy of the watermark into the cover image. This strategy allows decreasing the embedding strength factor of the scheme to a value that maximizes imperceptibility performance while maintaining acceptable robustness of the watermarking scheme. On the other hand, the proposed chaos-based encryption algorithm used four chaotic maps of different dimensions and it has two diffusion stages rather than one to improve the algorithm efficiency. The proposed encryption algorithm is tested using different experiments. The experimental results demonstrate that the proposed encryption algorithm shows advantages of large key space, high resistance against differential attacks and high security analysis such as statistical analysis, and sensitivity analysis.
Chaotic Maps, Encryption, Digital Watermarking, Discrete Cosine Transform (DCT)
 Dongyan Wang, Fanfan Yang, and Heng Zhang, “Blind Color Image Watermarking Based on DWT and LU Decomposition”, Journal of Information Processing Systems, Vol. 12, No. 4, pp. 765-778, 2016.
 Y. M. Chu, N. F. Huang, and S. H. Lin, “Quality of service provision in cloud-based storage system for multimedia delivery”, IEEE Systems Journal, Vol. 8, No.1, pp. 292–303, 2014.
 Hussain, T. Shah, M. A. Gondal, and H. Mahmood, “An efficient approach for the construction of LFT S-boxes using chaotic logistic map”, Nonlinear Dynamics, Vol. 71, No. 1-2, pp. 133–140, 2013.
 Hussain, A.Anees, M.Aslam, R.Ahmed and N. Siddiqui, “A noise resistant symmetric key cryptosystem based on S-Boxes and chaotic maps”, The European Physical Journal Plus, Vol. 133, No. 4, 2018.
 Hussain, A. Anees, A.H. AlKhaldi, A. Algarni, and M. Aslam, “Construction of chaotic quantum magnets and matrix Lorenz systems S-boxes and their applications”, Chinese Journal of Physics, 2018.
 I. Hussain, A. Anees, and A. Algarni, “A novel algorithm for thermal image encryption”, Journal of Integrative Neuroscience, pp. 1–15, 2018.
 Anees, A.M. Siddiqui, and F. Ahmed, “Chaotic substitution for highly auto correlated data in encryption algorithm”, Communications in Nonlinear Science and Numerical Simulation, Vol. 19, No. 9, pp. 3106–3118, 2014.
 T.T. Mapoka, S.J. Shepherd, and R.A. Abd-Alhameed, “A new multiple service key management scheme for secure wireless mobile multicast”, IEEE Transactions on Mobile Computing, Vol. 14, No. 8, pp. 1545–1559, 2015.
 Anees, W.A. Khan, M.A. Gondal, and I. Hussain, “Application of mean of absolute deviation method for the selection of best nonlinear component based on video encryption”, A Journal of Physical Sciences, Vol.68, No.6-7, pp. 479–482, 2013.
 H. Liu and X. Wang, “Color image encryption based on onetime keys and robust chaotic maps”, Computers & Mathematics with Applications. An International Journal, Vol. 59, No.10, pp. 3320–3327, 2010.
 A. Aneesand, and Z. Ahmed, “A Technique for Designing Substitution Box Based on Vander Pol Oscillator”, Wireless Personal Communications, Vol. 82, No. 3, pp. 1497–1503, 2015.
 J. Daemen and V. Rijmen, “The Design of Rijndael: AES-The Advanced Encryption Standard”, Springer, Berlin, Germany, 2002.
 Anees and M.A. Gondal, “Construction of Nonlinear Component for Block Cipher Based on One-Dimensional Chaotic Map”, 3D Research, Vol. 6, No. 2, 2015.
 A. Aneesand and A.M. Siddiqui, “A technique for digital watermarking in combined spatial and transform domains using chaotic maps”, In Proceedings of the 2013 2nd National Conference on Information Assurance, NCIA2013, pp.119–124, pak, December 2013.
 S.S. Jamal, M.U. Khan, and T. Shah, “A Watermarking Technique with Chaotic Fractional S-Box Transformation”, Wireless Personal Communications, Vol. 90, No. 4, pp. 2033–2049, 2016.
 S.S. Jamal, T. Shah, and I. Hussain, “An efficient scheme for digital watermarking using chaotic map”, Nonlinear Dynamics, Vol. 73, No. 3, pp. 1469–1474, 2013.
 X. Wang and D. Chen, “A parallel encryption algorithm based on piecewise linear chaotic map”, Mathematical Problems in Engineering, Vol. 2013, 2013.
 A. Anees, A.M. Siddiqui, J. Ahmed, and I. Hussain, “A technique for digital steganography using chaotic maps”, Nonlinear Dynamics, Vol. 75, No. 4, pp. 807–816, 2014.
 F. Ahmed, A. Anees, V.U. Abbas, and M.Y. Siyal, “A noisy channel tolerant image encryption scheme”, Wireless Personal Communications, Vol. 77, No. 4, pp. 2771–2791, 2014.
 F. Ahmed and A. Anees, “Hash-Based Authentication of Digital Images in Noisy Channels”, Robust Image Authentication in the Presence of Noise, pp. 1–42, 2015.
 X.Y. Wang, and H.L. Zhang, “A color image encryption with heterogeneous bit- permutation and correlated chaos”, Opt. Communication Vol. 342, pp. 51–60, 2015
 X.Y. Wang, L.T. Liu, Y.Q. Zhang, “A novel chaotic block image encryption algorithm based on dynamic random growth technique”. Opt. Lasers Eng Vol. 66, pp. 10–8, 2015
 MR. Abuturab, “An asymmetric single-channel color image encryption based on Hartley transform and gyrator transform”. Opt. Lasers Eng Vol. 69, pp.49–57, 2015
 Xu, Lu, et al, “A novel bit-level image encryption algorithm based on chaotic maps”, Optics and Lasers in Engineering Vol. 78 pp.17-25, 2016.