Optoelectronics Letters, Volume. 20, Issue 10, 614(2024)

Double random number encryption blind watermarking technique based on DWT-DCT domain

Chenglong WANG1、*, Yi MA2, and Xia WANG2
Author Affiliations
  • 1National Engineering Research Center for Technology and Equipment of Environmental Deposition, Lanzhou Jiaotong University, Lanzhou 730070, China
  • 2Key Laboratory of Opto-Technology and Intelligent Control Ministry of Education, Lanzhou Jiaotong University,Lanzhou 730070, China
  • show less
    References(23)

    [1] [1] LI X Y. Research on high-capacity information hiding method for digital images[D]. Zhengzhou: Strategic Support Forces Information Engineering University,2021. (in Chinese)

    [2] [2] LIU F. Research on digital watermarking algorithm of encrypted image in transform domain[D]. Jinan: Shandong Normal University, 2009. (in Chinese)

    [3] [3] DING Y Y, LIU Z. Analysis and comparison of three frequency domain digital watermarking algorithms[J]. Packaging engineering, 2011, 32(05): 103-107. (in Chinese)

    [4] [4] COX I J, KILIAN J, LEIGHTON F T, et al. Secure spread spectrum watermarking for multimedia[J]. IEEE transactions on image processing, 1997, 6(12): 1673-1687.

    [5] [5] SU P, KUO C J, WANG H M. Blind digital watermarking for cartoon and map images[J]. Security and watermarking of multimedia contents, 1999, 3657: 296-306.

    [6] [6] WANG H Y, ZHANG X T, CHEN S Y, et al. A blind watermarking algorithm based on specific component quantization in DHT domain[J]. Optik, 2023, 281:170792.

    [7] [7] TANG Z W, CHAI X L, LU Y, et al. An end-to-end screen shooting resilient blind watermarking scheme for medical images[J]. Journal of information security and applications, 2023, 76: 103547.

    [8] [8] ROY M, THOUNAOJAM D M, PAL S. A perceptual hash based blind-watermarking scheme for image authentication[J]. Expert systems with applications, 2023,227: 120237.

    [9] [9] QU L F, HE H J, CHEN F, et al. Security analysis of image encryption algorithm based on block modulationscrambling[J]. Computer research and development,2021, 58(04): 849-861.

    [10] [10] ZHANG R R, CAO C J, ZHOU J. Image encryption algorithm based on random diffusion and bit-level block disambiguation[J]. Digital printing, 2021, 215(06): 38-44+72. (in Chinese)

    [11] [11] QU L F, CHEN F, HONG J, et al. Security analysis of image encryption algorithm based on bit plane-block disruption[J]. Journal of applied science, 2019, 37(05):631-642.

    [12] [12] YE G. A novel Logistic-based image encryption scheme[J]. ICIC express letters, 2010, 4(3): 979-984.

    [13] [13] LIU G Z, WU Q, WANG G Y, et al. An improved Logistic chaotic map and its application in image encryption and hiding[J]. Journal of electronics and information technology, 2022, 44: 1-8.

    [14] [14] XU C B, LI J L, XU H N. A multi scroll system and its application for image encryption based on Logistic level pulse[J]. Journal of electronics and information technology,2022, 44(12): 4328-4336.

    [15] [15] ZHANG Z, WANG C, ZHOU X. Image watermarking scheme based on Arnold transform and DWT-DCTSVD[C]//2016 IEEE 13th International Conference on Signal Processing (ICSP), November 6-10, 2016, Chengdu, China. New York: IEEE, 2016: 805-810.

    [16] [16] GUO X F, LI H H, WEI J Y. Image encryption scheme based on Fibonacci transform and improved Logistic- Tent chaotic map[J]. Journal of Jilin University (engineering edition), 2023, 53(07): 2115-2120. (in Chinese)

    [17] [17] LI Z Y, ZHANG H, LIU X L, et al. Blind and safetyenhanced dual watermarking algorithm with chaotic system encryption based on RHFM and DWT-DCT[J].Digital signal processing, 2021, 115: 103062.

    [18] [18] SUNDARAM G, PANNA B, JHA R K, et al. Image encryption based on fractional discrete cosine transform and DWT with interplane arrangements in dost domain[J]. IET image processing, 2022, 17(4): 1195-1207.

    [19] [19] NAYAK D, RAY K, KAR T, et al. Walsh-Hadamard kernel feature-based image compression using DCT with bi-level quantization[J]. Computers, 2022, 11(7):100.

    [20] [20] DING Y, DUAN Z K, LI S. 2D arcsine and sine combined Logistic map for image encryption[J]. The visual computer, 2022, 39(4): 1517-1532.

    [21] [21] KONG L J, NIE P. A holographic watermarking technique based on DWT-DCT transform domain[J]. Journal of optoelectronics·laser, 2016, 27(02): 198-202. (inChinese)

    [22] [22] FENG Q B, ZHANG X, ZHENG C, et al. CNN-based method for dual-layer liquid crystal displays[J]. Acta photonica sinica, 2023, 52(8): 146-155.

    [23] [23] TAN X D, ZHAO Q, WEN M Z, et al. Hybrid image watermarking algorithm based on BEMD, DCT and SVD[J]. Journal of Zhejiang University (science edition),2023, 50(04): 442-454.

    Tools

    Get Citation

    Copy Citation Text

    WANG Chenglong, MA Yi, WANG Xia. Double random number encryption blind watermarking technique based on DWT-DCT domain[J]. Optoelectronics Letters, 2024, 20(10): 614

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Received: Sep. 22, 2023

    Accepted: May. 6, 2024

    Published Online: Sep. 20, 2024

    The Author Email: Chenglong WANG (clwang@lzjtu.edu.cn)

    DOI:10.1007/s11801-024-3203-5

    Topics