Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32586
Optimized and Secured Digital Watermarking Using Entropy, Chaotic Grid Map and Its Performance Analysis

Authors: R. Rama Kishore, Sunesh


This paper presents an optimized, robust, and secured watermarking technique. The methodology used in this work is the combination of entropy and chaotic grid map. The proposed methodology incorporates Discrete Cosine Transform (DCT) on the host image. To improve the imperceptibility of the method, the host image DCT blocks, where the watermark is to be embedded, are further optimized by considering the entropy of the blocks. Chaotic grid is used as a key to reorder the DCT blocks so that it will further increase security while selecting the watermark embedding locations and its sequence. Without a key, one cannot reveal the exact watermark from the watermarked image. The proposed method is implemented on four different images. It is concluded that the proposed method is giving better results in terms of imperceptibility measured through PSNR and found to be above 50. In order to prove the effectiveness of the method, the performance analysis is done after implementing different attacks on the watermarked images. It is found that the methodology is very strong against JPEG compression attack even with the quality parameter up to 15. The experimental results are confirming that the combination of entropy and chaotic grid map method is strong and secured to different image processing attacks.

Keywords: Digital watermarking, discrete cosine transform, chaotic grid map, entropy.

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 611


[1] B. R. Sanjay Rawat, "A blind Watermarking Algorithm based on fractional fourier transform and visual cryptography," Signal Processing, Elsevier, pp. 1480-1491, 2011.
[2] W. H. a. Y. s. Yanyan Han, "DWT- domain Dual watermarking algorithm of color image based on visual cryptography," in IEEE, 2013.
[3] C. W. A. M. P. Musrrat Ali, "A robust image watermarking technique using SVD and differential evolution in DCT domain.," Optik-International Journal for Light and Electron Optics,Elsevier, vol. 125, no. 1, pp. 428-34., 2014.
[4] S.-C. S. J. G. Shinfeng D. Lin, "Improving the robustness of DCT-based image watermarking against JPEG compression," Computer Standards & Interfaces, vol. 32, no. 1-2, pp. 54-60, 2010.
[5] F. M. Z. Zhang, "A Blind Watermarking Thchnology Based on DCT Domain," in International Conference on Computer Science and Service System, 2012.
[6] Y. H.-l. C.-d. W. S.-m. WANG Huai-bin, "A New Watermarking Algorithm Based on DCT and DWT Fusion," in International Conference on Electrical and Control Engineering, 2010.
[7] N. G. Gurwinder Singh, "Entropy Based Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition," in 2016 IEEE International Conference on Computing for Sustainable Global Development, New Delhi, 2016.
[8] H.-N. H.-J. C.-K. T.-Y. T. Sho-Tsung Chenn, "Adaptive Audio Watermarking Via Optimization Point of View On The Wavelet-Based Entropy," Digital Signal Processing, vol. 23, pp. 971-980, 2013.
[9] A. D. Sanjay kumar, "A novel Spatial domain Technique for Digital Image Watermarking using Block Entropy," in IEEE Conference on Recent Trends in Information Technology (ICRTIT), 2016.
[10] E. H. R. R. I. M. S. Christy Atika Sari, "Robust and imperceptible image watermarking by DC coefficients using singular value decomposition," in 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), Yogyakarta, Indonesia, 2017.
[11] Mehta R, Rajpal N, Viswakarma VP,” Adaptive image watermarking Scheme Using fuzzy Entropy and GA ELM Hybridization in DCT domain for copyright protection”, J Signal process Syst 84,2016,265-281.
[12] Pooja Kulkarni, “Review of Digital watermarking techniques”, International journal of computer applications, Vol 109, No 16, 2015
[13] Zhi-Hong Guan,” Chaos based image encryption algorithm”, Physics letters A, 2005,153-157.
[14] Rama Kishore, “Digital watermarking based on Visual cryptography and histogram”, International journal of computer, Electrical, Automation, control and information engineering”, Vol10, 2016.
[15] Pravin M, “DCT based Digital image watermarking, De watermarking and Authentication”, International journal of latest trends in Engineering and technology, vol2, 2013.
[16] Rafael C Gonzalez, “Digital image processing using MATLAB”, Mc Graw Hill Education, 2010,
[17] Rajesh Metha, ”LWT-QR decomposition based robust and efficient image watermarking scheme using lagrangian SVR”, Multimedia tools and application, Springer,2015.