|
|
A joint image encryption and watermarking algorithm based on compressive sensing and chaotic map |
Xiao Di (肖迪), Cai Hong-Kun (蔡洪坤), Zheng Hong-Ying (郑洪英) |
Key Laboratory of Dependable Service Computing in Cyber Physical Society (Chongqing University) of Chinese Ministry of Education, College of Computer Science, Chongqing University, Chongqing 400044, China |
|
|
Abstract In this paper, a compressive sensing (CS) and chaotic map-based joint image encryption and watermarking algorithm is proposed. The transform domain coefficients of the original image are scrambled by Arnold map firstly. Then the watermark is adhered to the scrambled data. By compressive sensing, a set of watermarked measurements is obtained as the watermarked cipher image. In this algorithm, watermark embedding and data compression can be performed without knowing the original image; similarly, watermark extraction will not interfere with decryption. Due to the characteristics of CS, this algorithm features compressible cipher image size, flexible watermark capacity, and lossless watermark extraction from the compressed cipher image as well as robustness against packet loss. Simulation results and analyses show that the algorithm achieves good performance in the sense of security, watermark capacity, extraction accuracy, reconstruction, robustness, etc.
|
Received: 10 December 2014
Revised: 07 January 2015
Accepted manuscript online:
|
PACS:
|
05.45.-a
|
(Nonlinear dynamics and chaos)
|
|
05.45.Gg
|
(Control of chaos, applications of chaos)
|
|
Fund: Project supported by the Open Research Fund of Chongqing Key Laboratory of Emergency Communications, China (Grant No. CQKLEC, 20140504), the National Natural Science Foundation of China (Grant Nos. 61173178, 61302161, and 61472464), and the Fundamental Research Funds for the Central Universities, China (Grant Nos. 106112013CDJZR180005 and 106112014CDJZR185501). |
Corresponding Authors:
Zheng Hong-Ying
E-mail: zhycqu@gmail.com
|
About author: 05.45.-a; 05.45.Gg |
Cite this article:
Xiao Di (肖迪), Cai Hong-Kun (蔡洪坤), Zheng Hong-Ying (郑洪英) A joint image encryption and watermarking algorithm based on compressive sensing and chaotic map 2015 Chin. Phys. B 24 060505
|
[1] |
Cox I J, Doërr G and Furon T 2006 Digital Watermarking (Berlin/Heidelberg: Springer) pp. 1-15
|
[2] |
Wang X Y and Teng L 2012 Chin. Phys. B 21 020504
|
[3] |
Tong X J, Wang Z and Zuo K 2012 Chin. Phys. B 21 020506
|
[4] |
Xiao D and Xie Y J 2013 Acta Phys. Sin. 62 240508 (in Chinese)
|
[5] |
Liu H J and Wang X Y 2010 Comput. Math. Appl. 59 3320
|
[6] |
Liu H J and Wang X Y 2011 Opt. Commun. 284 3895
|
[7] |
Wang X Y, Teng L and Qin X 2012 Signal Processing 92 1101
|
[8] |
Khan M I, Jeoti V, Malik A S and Khan M F 2011 Proceedings of the 17th Asia-Pacific Conference on Communications, October 2-5, 2011, Sabah, Malaysia, p. 816
|
[9] |
Lian S G, Liu Z X, Zhen R and Wang H L 2006 Opt. Eng. 45 080510
|
[10] |
Lian S, Liu Z, Ren Z and Wang H 2007 IEEE T. Circ. Syst. Vid. 17 774
|
[11] |
Cancellaro M, Battisti F, Carli M, Boato G, De Natale F G B and Neri A 2008 Proc. SPIE, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X 6819 68191C
|
[12] |
Taneja N, Bhatnagar G, Raman B and Gupta I 2013 Multimedia Tools Appl. 67 593
|
[13] |
Lian S G 2009 Multimedia Tools Appl. 43 91
|
[14] |
Donoho D L 2006 IEEE Trans. Inf. Theory 52 1289
|
[15] |
Li X, Qin S Y 2011 IET Image Process. 5 141
|
[16] |
Rachbin Y, and Baron D 2008 Proceedings of the 46th Annual Allerton Conference on Communication, Control, and Computing, September 23-26, 2008, UIUC, Illinois, USA, p. 813
|
[17] |
Mayiami M R, Seyfe B and Bafghi H G 2010 arXiv: 1011.3985 [cs.IT]
|
[18] |
Zhang X P, Ren Y L, Feng G R and Qian Z X 2011 Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, October 14-16, 2011, Dalian, China, p. 222
|
[19] |
Liu D H, Shi G M, Gao D H and Gao M 2009 Proceedings of the International Conference on Wireless Communications & Signal Processing, November 13-15, 2009, Nanjing, China, p. 1
|
[20] |
Huang H C, Chang F C, Wu C H and Lai W H 2012 Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, July 18-20, 2012, Piraeus, Greece, p. 223
|
[21] |
Veena V K, Jyothish Lal G, Vishnu Prahu S, Sachin Kumar S and Soman K P 2012 Proceedings of the International Conference on Machine Vision and Image Processing, December 14-15, 2012, Taipei, China, p. 105
|
[22] |
Candés E J and Wakin M B 2008 IEEE Signal Process. Mag. 25 21
|
[23] |
Dai W and Milenkovic O 2009 IEEE Trans. Inf. Theory 55 2230
|
[24] |
Yu L, Barbot J P, Zheng G and Sun H 2010 IEEE Signal Proc. Lett. 17 731
|
[25] |
Gao Z R, Xiong C Y, Zhou C and Wang H X 2011 Proceedings of the International Conference on Multimedia and Signal Processing, May 14-15, 2011, Guilin, China, p. 321
|
[26] |
Gan L 2007 Proceedings of the International Conference on Digital Signal Processing, July 1-4, 2007, Cardiff, UK, p. 403
|
[27] |
Orsdemir A, Altun H O, Sharma G and Bocko M F 2008 Proceedings of the Military Communications Conference, November 16-19, 2008, San Diego, USA, p. 1
|
No Suggested Reading articles found! |
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
Altmetric
|
blogs
Facebook pages
Wikipedia page
Google+ users
|
Online attention
Altmetric calculates a score based on the online attention an article receives. Each coloured thread in the circle represents a different type of online attention. The number in the centre is the Altmetric score. Social media and mainstream news media are the main sources that calculate the score. Reference managers such as Mendeley are also tracked but do not contribute to the score. Older articles often score higher because they have had more time to get noticed. To account for this, Altmetric has included the context data for other articles of a similar age.
View more on Altmetrics
|
|
|