An Image Transmission System Utilizing Chaos-Based Watermarking Technique

Article Preview

Abstract:

In this paper, an image transmission system utilizing chaos-based watermarking technique for copyright protection of the image transmission system is demonstrated experimentally. This system assures when pirated image is found, the illegal user can be traced. The users message after chaotic encryption as watermark can be embedded into image. Experimental results show our system which is used for a web-based image transmission is effective and robust. Especially, users message can also be extracted from the watermark image under diverse attacks such as some image-processing operations and Joint Photographic Experts Group (JPEG) compression.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

203-206

Citation:

Online since:

December 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Nasir Memon and Ping Wah Wong , Protecting Digital Media Content, Communications of the ACM, vol. 41, no. 7, pp.36-43, July (1998).

Google Scholar

[2] Pfitzmann, B., Schunter, M.: Asymmetric fingerprinting. In: Maurer, U.M. (ed. ) EUROCRYPT 1996. LNCS, vol. 1070, p.84–95.

Google Scholar

[3] Pfitzmann, B., Waidner, M.: Anonymous fingerprinting. In: Fumy, W. (ed. ) EUROCRYPT 1997. LNCS, vol. 1233, p.88–102.

DOI: 10.1007/3-540-69053-0_8

Google Scholar

[4] M. Kuribayashi and H. Tanaka, A new anonymous fingerprinting with high enciphering rate, in Proc. Indocrypt, vol. 2247, 2001, p.30–39.

DOI: 10.1007/3-540-45311-3_3

Google Scholar

[5] Kuribayashi, M., Tanaka, H.: Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans. Image Processing, 2005, 2129–2139.

DOI: 10.1109/tip.2005.859383

Google Scholar

[6] Prins, J.P., Erkin, Z., Lagendijk, R.: Anonymous fingerprinting with robust qim watermarking techniques. European Journal of Information Systems 2007, 1–13.

DOI: 10.1155/2007/31340

Google Scholar

[7] Wang Hong-Xia , He Chen, Robust Public Watermarking Based on Chaotic Map, Journal of Software, vol. 15, no. 8, August 2004, pp.1245-1251.

Google Scholar

[8] Voyatzis G, Pitas I. Embedding robust watermarks by chaotic mixing, . 13th International Conference on Digital Signal Processing. Santorini , Greece , 1997 : 213-216.

DOI: 10.1109/icdsp.1997.628019

Google Scholar

[9] W. Bender, D. Gruhl, and N. Morimoto, Technique for data hiding, SPIE, vol. 2020, p.2420–2440.

Google Scholar

[10] F. A. P. Petitcolas, Watermarking schemes evaluation, IEEE Signal Processing, vol. 17, no. 5, p.58–64, Sep (2000).

DOI: 10.1109/79.879339

Google Scholar