Secure and robust digital image watermarking scheme using logistic and RSA encryption

Liu, Yang, Tang, Shanyu ORCID:, Liu, Ran, Zhang, Liping and Ma, Zhao (2018) Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Systems with Applications, 97. pp. 95-105. ISSN 0957-4174

Secure and robust digital image watermarking scheme using logistic and RSA encryption.pdf - Accepted Version
Available under License Creative Commons Attribution Non-commercial No Derivatives.

Download (1MB) | Preview


In the era of big data and networking, it is necessary to develop a secure and robust digital watermarking scheme with high computational efficiency to protect copyrights of digital works. However, most of the existing methods focus on robustness and embedding capacity, losing sight of security or requiring significant computational resources in the encryption process. This paper proposed a new digital image watermarking model based on scrambling algorithm Logistic and RSA asymmetric encryption algorithm to guarantee the security of the hidden data at the foundation of large embedding capacity, good robustness and high computational efficiency. The experiments involved applying the encryption algorithms of Logistic and RSA to the watermark image and performing the hybrid decomposition of Discrete wavelet transform (DWT) and Singular Value Decomposition (SVD) on the host image, and the watermark was embedded into the low-frequency sub-band of the host. The values of PSNR and NCC were measured to estimate the imperceptibility and robustness of the proposed watermarking scheme, and the CPU running time was recorded to measure the complexity of the proposed main algorithm in execution time. Experimental results showed the superiority of the proposed watermarking scheme.

Item Type: Article
Identifier: 10.1016/j.eswa.2017.12.003
Additional Information: © 2017. This manuscript version is made available under the CC-BY-NC-ND 4.0 license
Keywords: Image watermarking; DWT; SVD; Logistic; RSA
Subjects: Computing > Information security > Cyber security
Computing > Information security
Depositing User: Shanyu Tang
Date Deposited: 18 Jan 2018 12:04
Last Modified: 28 Aug 2021 07:24


Downloads per month over past year

Actions (login required)

View Item View Item