Optoelectronics Letters, Volume. 20, Issue 10, 614(2024)
Double random number encryption blind watermarking technique based on DWT-DCT domain
[1] [1] LI X Y. Research on high-capacity information hiding method for digital images[D]. Zhengzhou: Strategic Support Forces Information Engineering University,2021. (in Chinese)
[2] [2] LIU F. Research on digital watermarking algorithm of encrypted image in transform domain[D]. Jinan: Shandong Normal University, 2009. (in Chinese)
[3] [3] DING Y Y, LIU Z. Analysis and comparison of three frequency domain digital watermarking algorithms[J]. Packaging engineering, 2011, 32(05): 103-107. (in Chinese)
[4] [4] COX I J, KILIAN J, LEIGHTON F T, et al. Secure spread spectrum watermarking for multimedia[J]. IEEE transactions on image processing, 1997, 6(12): 1673-1687.
[5] [5] SU P, KUO C J, WANG H M. Blind digital watermarking for cartoon and map images[J]. Security and watermarking of multimedia contents, 1999, 3657: 296-306.
[6] [6] WANG H Y, ZHANG X T, CHEN S Y, et al. A blind watermarking algorithm based on specific component quantization in DHT domain[J]. Optik, 2023, 281:170792.
[7] [7] TANG Z W, CHAI X L, LU Y, et al. An end-to-end screen shooting resilient blind watermarking scheme for medical images[J]. Journal of information security and applications, 2023, 76: 103547.
[8] [8] ROY M, THOUNAOJAM D M, PAL S. A perceptual hash based blind-watermarking scheme for image authentication[J]. Expert systems with applications, 2023,227: 120237.
[9] [9] QU L F, HE H J, CHEN F, et al. Security analysis of image encryption algorithm based on block modulationscrambling[J]. Computer research and development,2021, 58(04): 849-861.
[10] [10] ZHANG R R, CAO C J, ZHOU J. Image encryption algorithm based on random diffusion and bit-level block disambiguation[J]. Digital printing, 2021, 215(06): 38-44+72. (in Chinese)
[11] [11] QU L F, CHEN F, HONG J, et al. Security analysis of image encryption algorithm based on bit plane-block disruption[J]. Journal of applied science, 2019, 37(05):631-642.
[12] [12] YE G. A novel Logistic-based image encryption scheme[J]. ICIC express letters, 2010, 4(3): 979-984.
[13] [13] LIU G Z, WU Q, WANG G Y, et al. An improved Logistic chaotic map and its application in image encryption and hiding[J]. Journal of electronics and information technology, 2022, 44: 1-8.
[14] [14] XU C B, LI J L, XU H N. A multi scroll system and its application for image encryption based on Logistic level pulse[J]. Journal of electronics and information technology,2022, 44(12): 4328-4336.
[15] [15] ZHANG Z, WANG C, ZHOU X. Image watermarking scheme based on Arnold transform and DWT-DCTSVD[C]//2016 IEEE 13th International Conference on Signal Processing (ICSP), November 6-10, 2016, Chengdu, China. New York: IEEE, 2016: 805-810.
[16] [16] GUO X F, LI H H, WEI J Y. Image encryption scheme based on Fibonacci transform and improved Logistic- Tent chaotic map[J]. Journal of Jilin University (engineering edition), 2023, 53(07): 2115-2120. (in Chinese)
[17] [17] LI Z Y, ZHANG H, LIU X L, et al. Blind and safetyenhanced dual watermarking algorithm with chaotic system encryption based on RHFM and DWT-DCT[J].Digital signal processing, 2021, 115: 103062.
[18] [18] SUNDARAM G, PANNA B, JHA R K, et al. Image encryption based on fractional discrete cosine transform and DWT with interplane arrangements in dost domain[J]. IET image processing, 2022, 17(4): 1195-1207.
[19] [19] NAYAK D, RAY K, KAR T, et al. Walsh-Hadamard kernel feature-based image compression using DCT with bi-level quantization[J]. Computers, 2022, 11(7):100.
[20] [20] DING Y, DUAN Z K, LI S. 2D arcsine and sine combined Logistic map for image encryption[J]. The visual computer, 2022, 39(4): 1517-1532.
[21] [21] KONG L J, NIE P. A holographic watermarking technique based on DWT-DCT transform domain[J]. Journal of optoelectronics·laser, 2016, 27(02): 198-202. (inChinese)
[22] [22] FENG Q B, ZHANG X, ZHENG C, et al. CNN-based method for dual-layer liquid crystal displays[J]. Acta photonica sinica, 2023, 52(8): 146-155.
[23] [23] TAN X D, ZHAO Q, WEN M Z, et al. Hybrid image watermarking algorithm based on BEMD, DCT and SVD[J]. Journal of Zhejiang University (science edition),2023, 50(04): 442-454.
Get Citation
Copy Citation Text
WANG Chenglong, MA Yi, WANG Xia. Double random number encryption blind watermarking technique based on DWT-DCT domain[J]. Optoelectronics Letters, 2024, 20(10): 614
Received: Sep. 22, 2023
Accepted: May. 6, 2024
Published Online: Sep. 20, 2024
The Author Email: Chenglong WANG (clwang@lzjtu.edu.cn)