2018
DOI: 10.22266/ijies2018.1231.27
|View full text |Cite
|
Sign up to set email alerts
|

Image Watermarking Using Two Level Encryption Method Based on Chaotic Logistic Mapping and Rivest Shamir Adleman Algorithm

Abstract: In this research study, a multipurpose image water-marking approach was developed for delivering selfrecovery, ownership verification and tamper localization of the cover image. For robust watermarking, color and grayscale images were used to deliver wide applicability and generalization to proposed work. Initially, the cover image was converted into wavelet domain by using Integer Wavelet Transform (IWT) and then the logo image was encrypted by using chaotic logistic mapping. This procedure makes the digital … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(13 citation statements)
references
References 15 publications
0
13
0
Order By: Relevance
“…One of the requirements for image watermarking is that the copyright size must be smaller than the media cover. Also, the watermark results in musthave aspects such as imperceptibility, robustness, and security [1][2][3][4]. Watermarking is quite similar to the steganography method because these two methods are both branches of data hiding science.…”
Section: Introductionmentioning
confidence: 99%
“…One of the requirements for image watermarking is that the copyright size must be smaller than the media cover. Also, the watermark results in musthave aspects such as imperceptibility, robustness, and security [1][2][3][4]. Watermarking is quite similar to the steganography method because these two methods are both branches of data hiding science.…”
Section: Introductionmentioning
confidence: 99%
“…Ref. [10] proposed a watermarking scheme based on two-level encryption. The procedure transforms the cover image using Integer Wavelet Transform (IWT) and the watermark is encrypted using chaotic logistic mapping.…”
Section: Literature Reviewmentioning
confidence: 99%
“…After performing saliency detection, IWT is applied in the foreground image to convert the image into the transform domain [18]. The wavelet transform is one of the popular approaches used in multi resolution image analysis, especially progressive image transmission.…”
Section: Integer Wavelet Transformmentioning
confidence: 99%