digital image watermarking protection based on chaotic...

41
Arab Academy for Science Technology and Maritime Transport Cairo, Egypt College of Engineering and Technology Electronics and Communications Engineering Department Digital Image Watermarking Protection Based on Chaotic Biometric System A Thesis by Eng. Ahmed Eisayed Ahmed Zein Eldin Submitted in Partial Fulfillment of the Requirementsfor the Degree of Master of Science In Communications Engineering Supervised by: Prof. Mohammed Waleed Fakhr Dean of Faculty of Computer Science & IT, Arab Academy for Science, Technology and Maritime Transport (AASTMT) Dr. Mohammed Saad EI-MahaUawy Electronics and Communication Department, Faculty of Engineering, Arab Academy for Science, Technology and Maritime Transport (AASTMT) Cairo Dr. Esam AbdEI-Magid Hagras Electronics and Communication Department 2011 Technical Researches Center Armed Forces

Upload: others

Post on 02-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

Arab Academy for Science Technology and Maritime Transport Cairo, Egypt

College of Engineering and Technology Electronics and Communications Engineering Department

Digital Image Watermarking Protection Based on Chaotic Biometric System

A Thesis by

Eng. Ahmed Eisayed Ahmed Zein Eldin

Submitted in Partial Fulfillment of the Requirementsfor the Degree of

Master of Science

In Communications Engineering

Supervised by:

Prof. Mohammed Waleed Fakhr Dean of Faculty of Computer Science & IT,

Arab Academy for Science, Technology and Maritime Transport (AASTMT)

Dr. Mohammed Saad EI-MahaUawy Electronics and Communication Department,

Faculty of Engineering, Arab Academy for Science, Technology and

Maritime Transport (AASTMT)

Cairo

Dr. Esam AbdEI-Magid Hagras Electronics and Communication

Department

2011

Technical Researches Center Armed Forces

Page 2: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

'.~~ ,,~ ~~ ~~t

'4"~\'f~ Arab Academy for Science Technology and Maritime Transport

Cairo, Egypt

College of Engineering and Technology Electronics and Communications Engineering Department

Digital Image Watermarking Protection Based on Chaotic Biometric System

A Thesis by

Eng. Ahmed Eisayed Ahmed Zein Eldin

Submitted in Partial Fulfillment of the Requirements for the Degree of

Master of Science

In Communications Engineering

Prof. Mohamed Waleed Fakhr Dr. Mohamed Saad EIMahallawy Dr. Esam AbdEI-Magid Hagras

Supervisor Supervisor Supervisor

Prof. Fatma EI-Zahraa Abou-Chadi Associate Prof. Mohamed Esam Khedr

Examiner Examiner

NOVEMBER 2011

Page 3: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

ABSTRACT The growth of high speed computer networks and that of Internet, in particular, has

explored means of new business, scientific, entertainment, and social opportunities.

Ironically, the cause for the growth is also of the apprehension use of digital formatted

data. Digital media offer several distinct advantages over analog media, such as high

quality, easy editing, high fidelity copying. The ease by which digital information can be

duplicated and distributed has led to the need for effective copyright protection tools.

Various software products have been recently introduced in attempt to address these

growing concerns. Digital Watermarking is the process that embeds data called a

watermark into a multimedia object such that watermark can be detected or extracted later

to make an assertion about the object.

In this thesis, three different contributions were suggested, firstly, a Partial image

Encryption algorithm based on Multi-Level two dimension Discrete Wavelet Transform

and Multi-Map Orbit Hopping Chaotic Encryption (ML 2D-DWT-MMOH-CPE) has been

proposed, secondly, a new commutative watermarking and partial encryption (CWPE)

algorithm based on DWT Spread Spectrum watermarking and Partial Encryption algorithm

using single level two Dimension Discrete Wavelet Transform and Multi-Map Orbit

Hopping Chaotic Encryption (IL 2D-DWT-MMOH-CPE ) and, [mally, a new

Commutative Watermarking and Partial Encryption algorithm based on one level two

dimension wavelet and discrete cosine transform domain (lL 2D-DWT-DCn and Multi­

Map Orbit Hopping Chaotic Encryption (MMOH-CPE).

DWT characteristics provide spatial\frequency localization and multi resolution

sub-band. CDMA SS improves security, anti interference and low probability of intercept.

Chaos based encryption techniques which is considered suitable for practical use as these

techniques provide combination of speed, high security, complexity, reasonable

computational overheads and computational power.

For the proposed algorithm (CWPE) (IL 2D-DWT-MMOH-CPE), performance

evaluation reflects some weakness against some sever attacks (50% Resizing, Median

Filtering, 10% JPEG Compression). To overcome the previous mentioned weakness, a

Commutative Hybrid Frequency Domain Watermarking and Chaotic Partial Encryption

algorithm is proposed (CWPE) (IL 2D-DWT-DCT-MMOH-CPE), which is based on the

fact; combined two transforms could compensate for the drawbacks of each other;

resulting in effective watermarking, based on characteristics of embedding locations.

I

Page 4: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

Acknowledgement This thesis with all its final results would have never been achieved without

ALLAH's will, and I am so grateful Allah for giving me the ability and strength to

complete its final phases. I would also like to express my thanks for my parents, brother,

wife, daughter, professors and tutors who were always supporting me and never hesitated a

second to give me as much as they can from their knowledge, care, time and efforts.

I express my many thanks and all grateful feeling to my supervisors Prof.

Mohmmmed Waleed Fakhr, Dr. Mohammed S. EI-Mahallawy and Dr. Esam A.

Hagras for their guidance and support throughout the research to achieve all of the gained

results, also, for all times we spent working together in the thesis and for benefiting from

them in many fields of life.

I would also like to express my thanks to the Arab Academy for Science and

Technology and Maritime Transport and the National Telecommunication Institute for all

the facilities that were available, and for the provided environment during my studies and

research.

Finally I would like to express my thanks to my colleagues and to everyone who helped

me to complete this research.

II

Page 5: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

TABLE OF CONTENTS

Page

List Of Figures ............ '" ...... ......... ... ........... .... ....... ..... ...... ..... .... ... ....... III List Of Tables ................................................................................... '" VIn List Of Symbols................................................................. ....................... XIII List Of Abbreviations... .......................................................................... XVI

CHAPTER 1:

Introduction

1.1 Aims and Objectives............................................................ .................... 1 1.2 Methodology... ............................................................... ................... 2 1.3 Thesis Outline ................................................................................... 3

CHAPTER 2:

Multimedia Protection Overview

2.1 Introduction....................................... .................................................... 4 2.2 Multimedia content encryption............... ................................................. 5 2.3 Encryption techniques...................................................... .................... 6

2.3.1 Private-Key Encryption............................................................. 6 2.3.2 Public-Key Cryptography............ ..................... ......................... 6

2.4 Digital Multimedia Watermarking............................................................ 7 2.4.1 Watermarking System Instruction......... ......... ..................... ........... 10 2.4.2 Watermarking Classification.................................................. ...... 11

2.4.2.1 Watermarking Visibility................................................. 11 2.4.2.2 Watermarking Robustness... ...... ...................................... 13 2.4.2.3 Watermarking Embedding Domain................................ .... 17 2.4.2.4 Watermarking Extraction.............. ..................... ..... ..... .... 28

2.5 Watermarking Issues... ......................................................................... 29 2.5.1 Capacity Issue (Bit Rate)............... .............................................. 29 2.5.2 Robustness.............................................................. ..... ........... 29 2.5.3Transparency (Invisibility).............................. ...... ........ .... ............ 30

2.5.3.1 Perceptual Invisibility...................................... ...... ..... .... 30 2.5.3.2 Statistical Invisibility....................................... ............... 30

2.5.4 Security ........................ '" ......... ...... ......... ......... ... ................. 30 2.6 Watermarking Applications............... ........................................... ..... ..... 31

IV

Page 6: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

CHAPTER 3:

Multi-LeveI2D-DWT Image Encryption Based on Multi-Map Orbit Hopping

Chaotic Partial Encryption

3.1 Introduction ........................ '" ............... ... ...... ... ......... ..................... 33 3.2 Chaos and Cryptography..................... .......................................... ....... 34

3.2.1 Characteristics of Chaos ........................... '" . ..... ......... ......... ..... 35 3.2.2 Relationship between Chaos and Cryptography.............................. 36 3.2.3 Chaotic Map-Based Encryption................................................. 38

3.2.3.1 I-D Chaotic Map (Logistic map).. .... ...... ...... ... ................. 38 3.2.3.2 2D Cat Chaotic Mapping (Anto Id Map) ... '" . '" .. ................ 41

3.2.4 Cryptographic Hash Functions............... ................................... 42 3.3 Related Multimedia Partial Encryption Schemes........................................ 43 3.4 Proposed Image Encryption based on Multi-LeveI2D-DWT and

MMOH-CPE................................. ................................................. 49 3.4.1 Secure Key Management(SKM) Subsystem................................. 50

3.4.1.1 Chaotic Scrambling Generator Subsystem......................... 51 3.4.1.2 Proposed MMOH-CPE............................................... 51

3.5 Simulation Results for the proposed algorithm.......................................... 53 3.5.1 Security Analysis... ..................... .......................................... 53

3.5.1.1Visual Testing........................................................... 53 3.5.1.2 Statistical Analysis........................ ............................. 53 3.5.1.3 Differential Analysis................................................... 54 3.5.1.4 Key Sensitivity Test...................................... ... ...... ..... 55

3.6 Summary ..................... '" ............................. , ...... ...... ..................... 64

CHAPTER 4:

Secure Biometric DWT Watermarking Based on Multi Map Orbit Bopping

Chaotic Partial Encryption

4.1 Introduction.............................................................................. ...... 66 4.2 Related DWT watermarking and Chaotic Encryption .................................. , 66 4.3 Commutative Watermarking and Encryption............................................. 71 4.4 Proposed Commutative Biometric Watermarking and Chaotic Partial

Encryption Based on MMOH-CPE...................................................... ... 77 4.4.1 Biometric Key Generation..................... ......... ......................... 78 4.4.2 Fingerprint Image Preprocessing Stages....................................... 81

4.4.2.1 Fingerprint Image Normalization....................... ............... 82 4.4.2.2 Orientation Estimation............................................ .... 83

v

Page 7: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

4.4.2.3 Fingerprint Image Enhancement..................................... 83 4.4.2.4 Fingerprint Image Binarization................................... .... 85 4.4.2.5 Fingerprint Image Thinning.......................................... 86 4.4.2.6 Fingerprint Image Segmentation..................................... 86

4.4.3 Fingerprint Image Post-processing Stages..................................... 87 4.4.3.1 Minutiae extraction and Filtering....................... .............. 87

4.5 General Architecture of the Proposed Algorithm......................................... 91 4.5.1 Pre-processing Stage..................... ........................................ 91

4.5.1.1 Chaotic Scrambling Parameter Generator Subsystem... ......... 92 4.5.1.2 Multi-Map Orbit Hopping Chaotic Subsystem.................. ... 93

4.5.2 Processing Stage........................... ........................... ................. 94

4.5.2.1 Watermark Embedding and MMOH-CPE process................ 94

4.5.2.2 Watermark extraction Process and decryption......................... 95 4.6 Signal Processing and Security Analysis......... .......................................... 95

4.6.1 Security Analysis................................................................ 95 4.6.1.1 Visual Testing........................................................... 95 4.6.1.2 Statistical analysis...... ................................................ 96 4.6.1.3 Differential Analysis................................................... 97 4.6.1.4 Key sensitivity test... ...... ............................................. 97

4.6.2 Signal Processing Attacks Analysis............................................ 98

4.6.3 Simulation results............................ .. .................. .............. .... 98

4.7 Summary....................................................................................... 118

CHAPTERS:

Robust Secure and Blind Commutative DWT-DCT Biometric Watermarking

and Multi Map Orbit Hopping Chaotic Partial Encryption

5.1 Introduction... ...... ... ............................ ........... ... ... ... ...... ......... ... ...... 119 5.2 Related DCT & DWT -DCT watermarking and Chaotic Encryption.................. 119 5.3 Proposed CWPE 2D DWT DCT Algorithm.............................................. 132

5.3.1 Pre-processing Stage........................... ................................... 132 5.3.2 Processing Stage.... ............................................................ ... 132

5.3.2.1 Watermark Embedding and Encryption Steps..................... 133 5.3.2.2 Watermark Decryption and Extraction Steps....................... 134

5.4 Signal processing and Security Analysis.................................................. 134 5.4.1 Security Analysis.................................................................. 134

5.4.1.1 Statistical analysis.................................................. ... 135 5.4.1.2 Differential Analysis....................................... ............... 135

5.4.2 Signal Processing Attacks Analysis.......................................... ... 136

VI

Page 8: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

5.4.3 Simulation results.............................................................. .... 136 5.5 Summary....... ..... ... ... ... ......... ......... .... ..... ... ...... ... ......... ...... ... ......... 167

CHAPTER 6:

Conclusions and Future Work

6.1 Conclusions.................................................................. ....................... 168 6.2 Future Works.................................................................................. 170

Publication Extracted from tbe Tbesis.............................................. 171

References................................................ ....................................... 172

VII

Page 9: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

LIST OF FIGURES

Page

CHAPTER 2:

MULTIMEDIA PROTECTION OVERVIEW

Figure 2.1 Architecture of multimedia encryption and decryption 5

Figure 2.2 Architectures of symmetric complete encryption 6

Figure 2.3 Architectures of asymmetric cipher 7

Figure 2.4 Watermarking Processes 10

Figure 2.5 Example of least significant bit watermarking 18

Figure 2.6 Coefficients of block OCT 21

Figure 2.7 Marked region in 8x8 OCT block 23

Figure 2.8 Difference between Wave and Wavelet (a) wave (b) wavelet 24

Figure 2.9 One decomposition step of the two dimensional image 26

Figure 2.10 One DWT decomposition step 26

Figure 2.11 One composition step of the four sub images 27

Figure 2.12 Three decomposition steps of an image using Pyramidal Decomposition 27

Figure 2.13 Pyramid after three decomposition steps 28

Figure 2.14 Pyramidal decomposition of Lena image (1, 2 and 3 times) 28

Figure 2.15 Watermarking requirements 29

Page 10: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

CHAPTER 3:

MULTI LEVEL 2D-DWT BASED SELECTIVE IMAGE CHAOTIC

PARTIAL ENCRYPTION

Figure 3.1

Figure 3.2

General architecture of a chaotic map

The limitations of Logistic iteration map

38

(a) iteration property when A. = 2.8, (b) iteration property when A. = 3.2. 39

Figure 3.3 Bifurcation diagram of the logistic map 40

Figure 3.4 Arnold Cat map with different control parameters a,b 41

Figure 3.5 Bases uses of Cryptographic hash function 42

Figure 3.6 Architecture of partial encryption/decryption 44

Figure 3.7 Typical architecture ofthe proposed chaos based image crypto systems 47

Figure 3.8 The proposed system block diagram ofElknz system 48

Figure 3.9 Multi-leveI2D-DWT-MMOH-CPE System 49

Figure 3.10 SKM sub-keys structure 50

Figure 3.11 Even eight sub-keys structure 51

Figure 3.12 Odd eight sub-keys structure 51

Figure 3.13 Multi-Map Orbit Hopping Chaotic Sub-system 51

Figure 3.14 The effect of one bit change in Encryption key 58

Page 11: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

CHAPTER 4:

SECURE BIOMETRIC DWT WATERMARKING BASED ON MULTI

MAP ORBIT HOPPING CHAOTIC PARTIAL ENCRYPTION

(MMOH-CPE)

Figure 4.1

Figure 4.2

Figure 4.3

Figure 4.4

Figure 4.5

Figure 4.6

Figure 4.7

Figure 4.8

Figure 4.9

The proposed block diagram of the watermarking scheme

The flowchart of the proposed watermark embedding scheme

The watermark images embedding process

The watermark extracting process

Architecture of commutative watermarking and encryption

Behavioral and Physiological characteristics

Human Fingerprint Ridge and Valley

Fingerprint Core and Delta

Fingerprints and a fingerprint classification schema involving five

categories

Figure 4.10 Basic types (Ridge Ending, Bifurcation) and Some combinations of the

basic types.

Figure 4.11 A portion of a fingerprint where sweat pores (white dots on ridges) are

visible.

Figure 4.12 Flowchart of the minutiae extraction algorithm.

Figure 4.13 Fingerprint Image Normalization.

Figure 4.14 Good quality Fingerprint image histogram vs. a bad quality one

Figure 4.15 Fingerprint image Binarization and Thinning.

68

69

71

71

73

79

80

80

80

81

81

82

82

85

86

Page 12: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

Figure 4. 16 Simple example for Minutiae extraction process based on eight

connected neighbors.

Figure 4. 17 Examples of typical false minutiae structures.

Figure 4. 18 Minutiae post-processing.

Figure 4. 19 Minutiae data.

Figure 4.20 Proposed CWPE 20 OWT subsystem.

Figure 4. 21 SKM sub-keys generation process.

Figure 4. 22 Arnold Cat Maps parameter generation process.

Figure 4.23 Multi-Map Orbit Hopping Chaotic Subsystem.

Figure 4. 24 Logistic Maps initial condition generation process.

Figure 4. 25 Arnold Cat Map Parameters generation process.

Figure 4. 26 1 L 20 OWT -based encrypted and decrypted Lena.

Figure 4. 27 The effect of one digit change in Encryption key.

CHAPTERS:

ROBUST SECURE AND BLIND COMMUTATIVE DWT-DCT

BIOMETRIC WATERMARKING AND MULTI MAP ORBIT

HOPPING CHAOTIC PARTIAL ENCRYPTION

Figure 5.1 Block diagram of the proposed method.

Figure 5.2 The watermark embedding block diagram.

Figure 5.3 Combined OWT -OCT watermark embedding procedure

Figure 5.4 Combined OWT -OCT watermark extraction procedure

87

88

88

89

91

92

93

93

94

94

95

97

120

127

128

128

Page 13: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

Figure 5.5

Figure 5.6

Figure 5.7

Figure 5.8

The proposed block diagram of the joint OWT -OCT watermarking

algorithm (a) Joint OWT-OCT watermark embedding, (b) Joint DWT­

OCT watermark extraction

Embedding and Extraction Algorithm Principle Block Diagram

Proposed CWPE lL 20 DWT OCT scheme

1 L 20 OWT OCT -based encrypted and decrypted Peppers

129

131

133

135

Page 14: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

List of Tables

Table 2.1

Table 2.2

Table 3.1

Table 3.2

Table 3.3

Table 3.4

Table 3.5

Table 3.6

Table 3.7

Table 3.8

Table 3.9

Table 3.10

Table 3.11

Table 3.12

Table 3.13

Table 3.14

Table 3.15

LIST OF TABLES

Watermarking classification ...................................................... .

Properties of different DC coefficients ........................................... .

Comparison between Chaos and Cryptography Properties .................... .

Comparison between Classical and Chaotic Cryptography .................... .

Different standard gray scale tested images ..................................... .

Histogram analysis comparison between l-L, 2-L (2D-DWT-MMOH-

Page

11

22

37

37

56

CPE) Lena test image... ............................................................. 57

Security analysis comparison between l-L, 2-L (2D-DWT-MMOH-CPE)

Lena test image ...................................................................... . 58

Key sensitivity analysis comparison between l-L, 2-L (2D-DWT-MMOH-

CPE) Lena test image... ........................ ..................................... 58

Histogram analysis comparison between l-L, 2-L (2D-DWT-MMOH-

CPE) Fruit test image... .................................... ......................... 59

Histogram analysis comparison between l-L, 2-L (2D-DWT-MMOH-

CPE) Bird test image ............................................................... .

Histogram analysis comparison between l-L, 2-L (2D-DWT-MMOH-

CPE) Hat test image ................................................................. .

Histogram analysis comparison between 1-L, 2-L (2D-DWT-MMOH-

CPE) Baboon test image ........................................................... .

Security analysis comparison between l-L, 2-L (2D-DWT-MMOH-CPE)

using different standard gray scale tested images .............................. .

Security analysis comparison between l-L, 2-L (2D-DWT-MMOH-CPE)

Fruit test image ...................................................................... .

Security analysis comparison between l-L, 2-L (2D-DWT-MMOH-CPE)

Bird test image ....................................................................... .

Security analysis comparison between l-L, 2-L (2D-DWT-MMOH-CPE)

Hat test image ....................................................................... .

Security analysis comparison between l-L, 2-L (2D-DWT-MMOH-CPE)

60

61

62

63

63

63

63

63

Page 15: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

List of Tables

Table 3.16

Table 4.1

Table 4.2

Table 4.3

Table 4.4

Table 4.5

Table 4.6

Table 4.7

Table 4.S

Table 4.9

Table 4.10

Table 4.11

Table 4.12

Table 4.13

Baboon test image ................................................................... .

Key sensitivity analysis comparison between lL, 2L (2D-DWT-MMOH-

CE) using different standard grey scale tested images..... .... ... ...... ... ..... 64

Overlaid Minutiae image and hexadecimal representation of the final

authenticated secrete system key.................................................. 90

Encrypted Watermarked image security analysis for different standard

gray scale test images under no signal processing attack ... " ...... , ....... .... 96

Encrypted watermarked image security and signal processing analysis

under (Salt & Peppers Noise Attack) Lena host image......................... 99

Encrypted watermarked image security and signal processing analysis

under (Speckle Noise Attack) Lena host image... .................................. 100

Encrypted watermarked image security and signal processing analysis

under (A WNG Noise Attack) Lena host image.................................. 101

Encrypted watermarked image security and signal processing analysis

under (Wiener Filter Attack - S &P - [3,3], 0.02) Lena host image....... ... 102

Encrypted Watermarked image security and signal processing analysis

under (Wiener Filter Attack - S &P - [5,5], 0.02) Lena host image ........ '" 1 03

Encrypted watermarked image security and signal processing analysis

under (Wiener Filter Attack - A WGN - [3,3], 0.02) Lena host

image................................................................................... 104

Encrypted watermarked image security and signal processing analysis

under (Wiener Filter Attack - A WGN - [5,5], 0.02) Lena host

image................................................................................... 105

Encrypted watermarked image security and signal processing analysis

under (Median Filter Attack - S &P - [3,3], 0.02) Lena host image...... ..... 106

Encrypted watermarked image security and signal processing analysis

under (Resizing Attack - 50%) Lena host image................................ 107

Encrypted watermarked image security and signal processing analysis

under (Resizing Attack - 75%) Lena host image..................................... lOS

Encrypted watermarked image security and signal processing analysis

under (JPEG. Compression Attack - 10%) Lena host image................... 109

Page 16: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

List of Tables

Table 4.14

Table 4.15

Table 4.16

Table 4.17

Table 4.18

Table 4.19

Table 4.20

Table 4.21

Table 4.22

Table 4.23

Table 5.1

Table 5.2

Table 5.3

Table 5.4

Table 5.5

Table 5.6

Encrypted watermarked image security and signal processing analysis

under (JPEG. Compression Attack - 25%) Lena host image................... 110

Encrypted watermarked image security and signal processing analysis

under (Rotation Attack - 10°) Lena host image... ............................... III

Encrypted watermarked image security and signal processing analysis

under (Rotation Attack - 20°) Lena host image... ............................... 112

Encrypted watermarked image security and signal processing analysis

under (Cropping Attack- 25%) Lena host image............................... 113

Encrypted watermarked image security and signal processing analysis

under (Cropping Attack - 50%) Lena host image........ .......... .............. 114

Encrypted watermarked image security and signal processing analysis

under (Cropping Attack - 50%) Lena host image................................ 115

Encrypted watermarked image security and signal processing analysis

under (Cropping Attack - 50%) Lena host image.................. .............. 116

Encrypted watermarked image security and signal processing analysis

under (Cropping Attack - 50%) Lena host image.............. ....... ........... 117

Encrypted watermarked image security analysis under different signal

processing attacks for Lena test image............ ............... ................. 118

Encrypted watermarked image security analysis under no Attack for

different standard grey scale tested images... .................................... 118

Encrypted watermarked image security analysis under no attack......... ... 137

Encrypted watermarked image security and signal processing analysis

under (Salt & Peppers Noise Attack) Pepper test image... ... ... ......... ...... 138

Encrypted watermarked image security and signal processing analysis

under (Speckle Noise Attack) Pepper test image................................ 139

Encrypted watermarked image security and signal processing analysis

under (A WNG Noise Attack) Pepper test image......... .................... ... 140

Encrypted watermarked image security and signal processing analysis

under (Wiener Filter Attack - S &P - [3,3],0.02) Pepper test image......... 141

Encrypted watermarked image security and signal processing analysis

under (Wiener Filter Attack - S &P - [5,5],0.02) Pepper test image......... 142

Page 17: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

List of Tables

Table 5.7 Encrypted watermarked image security and signal processing analysis

under (Wiener Filter Attack - A WGN - [3,3], 0.02) Pepper test image....... 143

Table 5.8 Encrypted watermarked image security and signal processing analysis

under (Wiener Filter Attack - A WGN - [5,5], 0.02) Pepper test image... .... 144

Table 5.9 Encrypted watermarked image security and signal processing analysis

under (Median Filter Attack - S &P - [3,3],0.02) Pepper test image.... ..... 145

Table 5.10 Encrypted watermarked image security and signal processing analysis

under (Median Filter Attack - S &P - [5,5], 0.02) Pepper test image..... .... 146

Table 5.11 Encrypted watermarked image security and signal processing analysis

under (Median Filter Attack - A WGN - [3,3], 0.02) Pepper test image... ... 147

Table 5.12 Encrypted watermarked image security and signal processing analysis

under (Median Filter Attack - AWGN - [5,5], 0.02) Pepper test image...... 148

Table 5.13 Encrypted watermarked image security and signal processing analysis

under (Resizing Attack) Pepper test image...... ... ... ............... ... ...... ... 149

Table 5.14 Encrypted Watermarked image security and signal processing analysis

under (Resizing Attack) Pepper test image... .... ....................................... 150

Table 5.15 Encrypted Watermarked image security and signal processing analysis

under (Compression Attack) Pepper test image.......... ........... ............. 151

Table 5.16 Encrypted Watermarked image security and signal processing analysis

under (Compression Attack) Pepper test image................................. 152

Table 5.17 Encrypted Watermarked image security and signal processing analysis

under (Rotation Attack) Pepper test image... .................................... 153

Table 5.18 Encrypted Watermarked image security and signal processing analysis

under (Rotation Attack) Pepper test image....................................... 154

Table 5.19 Encrypted Watermarked image security and signal processing analysis

under (Cropping Attack) Pepper test image.................. ...... ........... ... 155

Table 5.20 Encrypted Watermarked image security and signal processing analysis

under (Cropping Attack) Pepper test image................................... ... 156

Table 5.21 Comparison between CWPE 20 OWT OCT and CWPE 20 OWT Only

for encrypted watermarked image security analysis for different standard

gray scale images under no signal processing attack............... .......... .. 157

XI

Page 18: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

List 0/ Tables

Table 5.22

Table 5.23

Table 5.24

Table 5.25

Table 5.26

Table 5.27

Table 5.28

Table 5.29

Table 5.30

Comparison between CWPE 20 OWT OCT and CWPE 20 OWT Only

for encrypted watermarked image security analysis under different attacks

Lena host image...................................................................... 158

Comparison between CWPE 20 OWT OCT and CWPE 20 OWT Only

for Encrypted Watermarked image security and signal processing analysis

under No Attack Lena test image... ......... ......... ...... ..................... ... 159

Comparison between CWPE 20 OWT OCT and CWPE 20 OWT Only

for Encrypted Watermarked image security and signal processing analysis

under (Median Filter Attack - S &P - [3,3],0.02) Lena test image........ ... 160

Comparison between CWPE 20 OWT OCT and CWPE 20 OWT Only

for Encrypted Watermarked image security and signal processing analysis

under (Resizing Attack 50%) Lena test image............... .................... 161

Comparison between CWPE 20 OWT OCT and CWPE 20 OWT Only

for Encrypted Watermarked image security and signal processing analysis

under (JPEG. Compression Attack - 10%) Lena test image.................... 162

Comparison between CWPE 20 OWT OCT and CWPE 20 OWT Only

for encrypted watermarked image security and signal processing analysis

under no Attack Pepper test image.................. ... ........................... 163

Comparison between CWPE 20 OWT OCT and CWPE 20 OWT Only

for encrypted watermarked image security and signal processing analysis

under (Median Filter Attack - S &P - [3,3], 0.02) Pepper test image......... 164

Comparison between CWPE 20 OWT OCT and CWPE 20 OWT Only

for encrypted watermarked image security and signal processing analysis

under (Resizing Attack 50%) Pepper test image... . .. ... .. .... ... ......... ..... 165

Comparison between CWPE 20 OWT OCT and CWPE 20 OWT Only

for encrypted watermarked image security and signal processing analysis

under (JPEG. Compression Attack - 10%) Pepper test image...... ............ 166

XII

Page 19: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

C

E

P

K

X'

X"

Embd(.)

Ext(. )

d(.)

[. ]

y

L

Rx".w

T

XCm,n)

XCi,j)

p

let)

'" Ce) cp(x)

Original media

Encryption operation

Cipher media

Encryption key

Public key

Private key

Decryption operation

Original media or Original counterpart

Watermark

Marked media or Watermarked media

Test media or Attacked media

Embedding process

Extraction process

Detection process

LIST OF SYMBOLS

Means that the element in the bracket may be optional

Positions to be embedded

Gain factor

Watermark length

Correlation between the possibly attacked image (X',), and the watermark

(W)

Pre-determined threshold

Selected coefficient position

Selected coefficient position

Positive value

SpatiaVtemporal domain signals

Mother wavelet function

One dimensional scale factor

I j / I; /1 I' I 1'111/ I 'II( Iff I' I/.

XIII

Page 20: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

l\J(x)

t/JH (x, Y)

t/JV(X,y)

t/JD(X, y)

<pCy)

l\JCy)

<p(X, y)

L

D(L)

a

b

L xn+l

yk L

Yn+1

h

Y

M

k

p

n

Ci

EiO

Ki

DiO

Xn

r

Wavelet related to <p(x)

Horizontal wavelet analysis

Vertical wavelet analysis

Diagonal wavelet analysis

One dimensional scale factor

Wavelet related to <p(y)

Two dimensional discrete wavelet analysis

Number of decompositions

Number of subbands results from L decompositions

Secrete control parameter

Initial condition

Arnold parameter

i\rnold parameter

Original pixel position

New position of the original pixel position after using Cat map

Original pixel position

New position of the original pixel position after using Cat map

Cryptographic hash function

Output of cryptographic hash function

message

Key

Original media content

Number of portioned parts of original media content

ith cipher-part or Encrypted media content

Encryption algorithm

key

Decryption algorithm

System variable

System parameter

1/ III flflll' I II ,t/ 1/(/1 /II/! (ll 1/ I///f/ I I1I11 Ifi 1IIIIIIIIIf II/ II ! r II/II I/.

XIV

Page 21: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

n

J Xi o

{x~}~=o X

P(x)

a

[(i,j)

[,(i,j)

(x,y)

D

(i,j)

w(i,j)

w'(i,j)

Number of chaotic orbit

logistic map index

logistic maps initial values

Series are computed

Orbit position

Permutation of x

Positive integer number

Original image pixel values

Encrypted image pixel values

Grey scale values of two adjacent pixels in the image

Correlation coefficients

Bipolar array

Grid

Original watermark pixel

Extracted watermark pixel

I II! I I flfl 1/ I 1/ 1/111 III frr/flll! ! I I! IIIJIII I 'f Ifl( If '"

xv

Page 22: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

AWGN

S&P

JPEG

MATLAB

DWT

DCT

2D

ML

lL

MMOH-CPE

DVD

MP3

QoS

DES

AES

IDEA

GIF

DC

LSB

DFT

IDCT

STFT

IDWT

HVS

HAS

ID

TV

PDA

LIST OF ABBREVIATIONS

Additive White Gaussian Noise

Salt and Peppers Noise

Joint Photographic Experts Group.

Matrix Laboratory (Mathworks, Inc.)

Discrete Wavelet Transform

Discrete Cosine Transform

Two Dimensional

Multi-Level

One Level

Multi Map Orbit Hopping Chaotic Partial Encryption

Digital Voice Recorder

Moving Picture Experts Group Layer-3 Audio (file format)

Quality of Services

Data Encryption Standard

Advanced Encryption Standard

International Data Encryption Algorithm

Graphics Interchange Format

Direct Current

Least Significant Bit

Discrete Fourier Transform

Inverse Discrete Cosine Transform

Short Time Fourier Transform

Inverse Discrete Wavelet Transform

Human Visual System

Human Auditory System

Identification

Television

Personal Digital Assistant

XVI

Page 23: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

MACs

SHA

SHS

MD4

PE

PSNR

MPEG4

M-L2DDWT

SKM

LL

CA

HL

CH

LH

CV

HH

CD

OHS

NPCR

UACI

ID

MPEGI

MPEG2

AC

BMP

CWE

MACs

M-L2DDWT

SKM

SRNG

CWPE

Message Authentication Codes

Secure Hash Algorithm

Secure Hash Standard

Message Digest Four

Partial Encryption

Peak Signal to Noise Ratio

Moving Picture Experts Group Four

Multi-Level two dimension Discrete Wavelet Transform

Secure Key Management subsystem

Low Low subband

Approximation Coefficients

High Low subband

Horizontal Coefficients

Low High subband

Vertical Coefficients

High High subband

Diagonal Coefficients

Orbit Hopping Selector

Number of Pixels Change Rate

Unified Average Changing Intensity

One Dimensional

Moving Picture Experts Group one

Moving Picture Experts Group two

Alternative Current

Bitmap Image File Format

Commutative Watermarking and Encryption

Message Authentication Codes

Multi-Level two dimensions Discrete Wavelet Transform

Secure Key Management

Selective Random Number Extractor

Commutative Watermarking and Partial Encryption

XVII

Page 24: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

MMOH

CPE

WPE

CDMA

T

ROI

PN

NCC

Multi Map Orbit Hopping

Chaotic Partial Encryption

Watennarking and Partial Encryption

Code Division Multiple Access

Threshold

Region of Interest

Pseudo Number

Nonnalized Cross Correlation

XVID

Page 25: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

Publication Extracted from the Thesis

Publication Extracted from the Thesis

1 Mohamed S. El-Mahallawy, Esam A. Hagras, Ahmed Zein

Eldin, and Mohamed Waleed Fakhr. 2011. " Robust Blind

and Secure Biometric Watermarking Based on Partial

Multi-Map Chaotic Encryption " New Technologies ,

Mobility and Security (NTMS), 4th IFIP International

Conference

2 Mohamed S. El-Mahallawy, Esam A. Hagras, Ahmed Zein

Eldin, and Mohamed Waleed Fakhr. 2011. " Selective

Image Encryption Based on Multi-Level 2D-DWT and

Multi-Map Chaotic Partial Encryption", The Malaysian

Journal of Remote Sensing & GIS, June 2011, Vol. 2(1)

3 Esam A. Hagras, Mohamed S. El-Mahallawy, Ahmed Zein

Eldin, and Mohamed Waleed Fakhr. 2011. " DWT-DCT

based Robust Secure and Blind Commutative

Watermarking And Partial Multi Map Chaotic Encryption

", The International journal of Multimedia & Its

Applications, (IJMA), November, 2011, Vol 3(3)

171

Page 26: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

References

REFRENCES [1] S. A Yanstone, A J. Menezes, and P. C. Oorschot, 1996. Handbook of Applied

Cryptography. Boca Raton: CRC Press.

[2] Shiguo Lian, 2008. Multimedia Content Encryption: techniques and applications.

Boca Raton. CRC Press.

[3] J. Cox, Matthew L. Miller, Jeffrey A Bloom, Jessica Fridrich, and Ton Kalker , 2008.

Digital Watermarking and Steganography, 2nd ed. London. Elsevier Publishing.

[4] Arnold Michael, 2003.Techniques and Applications of Digital Watermarking and

Content Protection. London. Artech House computer security series.

[5] Jeng-Shyang Pan, Hsiang-Cheh Huang and Lakhmi C. Jain, 2004. Intelligent

Watermarking Techniques. London. World Scientific Publishing.

[6] Chun-Shien Lu., 2004. Multimedia Security: Steganography and Digital

Watermarking Techniques for Protection ofIntellectual Property. London. Idea group

Publishing.

[7] Mintzer, F., Braudaway, G.W., and Yeung, M.M. 1997. Effective and ineffective

digital watermarks. International Conference on Image Processing Proceedings, ICIP

97, Yol (3), 9-12.

[8] AM.Tekalp, 1995. Digital Video Processing. London. Prentice Hall.

[9] Saraju P. Mohanty, 1999. Digital Watermarking: A Tutorial Review. [online],

available from

http://www .cse.unt.eduJ-smohanty/research/OtherPublicationsfMohantyWatennarkin

gSUIVey1999 .pdf

[10] Lang Zhai, Qi Hu, Jilin Bus and Changchun. 2011. Researches on digital image

watennarking algorithm in DWT domain with chaotic encryption. 2nd International

Conference on Artificial Intelligence, Management Science and Electronic Commerce

(AIMSEC),pp,3321-3324

[11] Arnold, M., 2002. Audio watermarking: Features, applications and algorithms. IEEE

International Conference on Multimedia and Expo, vol (2),1013-1016.

[12] C. E.T. Lin and E. J. Delp. 2000. Detection of Image Alterations Using Semi-fragile

Watermarks, SPIE Int. Conf. on Security and Watermarking of Multimedia Contents,

172

Page 27: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

References

vol (3971),152-163.

[13] R. D. J. Fridrich, M. Goljan. 2001. Invertible Authentication Watermark for JPEG

Images. Information Technology: Coding and Computing, 223 - 227.

[14] Ruanaidh, J.O., Dowling, W.J., & Boland, F.M. 1996. Watermarking digital images

for copyright protection. IEEE Proceedings on Vision, hnage and Signal Processing,

143(4),250-256.

[15] Harpuneet Kaur, 2006. Robust hnage Watermarking Technique to Increase Security

and Capacity of Watermark Data Thesis (Msc). Deemed University.

[16] Wen-Nung Lie, Guo-Shiang Lin, Chih-Liang Wu, and Ta-Chun Wang. Robust Image

Watermarking On the DCT Domain. 2000, IEEE International Symposium on

Circuits and Systems (IS CAS 2000), vol (1), 228-231.

[17] Langelaar, G.C., Setyawan, 1, and Lagendijk, R.L. 2000. Watermarking digital image

and video data: A state-of-the-art overview. IEEE Signal Processing Magazine, vol

(17),20-46.

[18] Jun Xiao and Ying Wang. 2008. Toward a Better Understanding ofDCT Coefficients

in Watermarking. IEEE Pacific-Asia Workshop on Computational Intelligence and

Industrial Application, vol (2),206-209.

[19] Daubechies I, 1988. Time-frequency localization operators: A geometric phase space

approach. IEEE Trans. Information Theory, 34(4), 605-612.

[20] Daubechies I, 1990. The wavelet transform, time-frequency localization and signal

analysis. IEEE Trans. Information Theory, 36(5).961-1005.

[21] Mallat S G. 1989. A theory of multi resolution signal decomposition: The wavelet

representation. IEEE Trans. Pattern Analysis and Machine Intelligence, 11 (7), 674-

693.

[22] Marc Antonini, Michel Barlaud, Pierre Mathieu, Ingrid Daubechies. 1992. Image

coding using wavelet transform. IEEE Trans. hnage Processing, 1 (2),205-220.

[23] Reza Safabakhsh, Shiva Zaboli and Arash Tabibiazar. 2004. Digital Watermarking on

Still hnages Using Wavelet Transform. Proceedings of the International Conference

on Information Technology: Coding and Computing, (ITCC 2004), vol (1),671-675.

[24] Ruanaidh, 1.0., Boland, F., and Dowling, W. 1996. Phase watermarking of digital

images. International Conference on hnage Processing Proceedings, ICIP 96, vol (3),

173

Page 28: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

References

239-242.

[25] Voyatzis, G., Nikolaidis, N., and Pitas, 1. 1998. Digital watennarking an overview.

Proceedings EUSIPCO, vol (1), 13-16.

[26] Swanson, M.D., Zhu, B., and Tewfik, A.H. 1998. Multiresolution scene based video

watermarking using perceptual models. IEEE Journal on Selected Areas in

Communications, 16(4),540-550.

[27] Liang Zhao et aI. 2010. Image Encryption Design Based on Multi-Dimensional

Matrix Map and Partitioning Substitution and Diffusion-Integration Substitution

Network Structure. Infonnation Science and Applications (ICISA), 1-8

[28J Hossam EI-din H. Ahmed, Hamdy M. Kalash, and Osama S. Farag Allah, 2007. An

Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and

Decryption. Infonnatica, (Magazine/Journal), 31(1), 121-129.

[29] Haojiang Gao, Yisheng Zhang, Shuyun Liang and Dequn Li. 2006. A new chaotic

algorithm for image encryption. Elsevier, 29(2),393-399

[30] Wong, K.W, Kwok, B.S.H. and Law, W.S. 2008. A fast image encryption scheme

based on chaotic standard map. [online]

http://arxiv.orglftp/cs/papers/0609/0609158.pdf

[31] David Arroyo, Gonzalo Alvarez and Veronica Fernandez. 2009. A Basic Framework

for the Cryptanalysis of Digital Chaos Based Cryptography. 6th International Multi­

Conference on Systems, Signals and Devices, SSD '09, 1-6.

[32J Zhi-Hong Guan , Fangjun Huang and Wenjie Guan. 2005. Chaos-based image

encryption algorithm. Elsevier ,Physics Letters, 153-157.

[33] Zhu Liehuang, Li Wenzhuo, Liao Lejian, and Li Hong. 2006. A Novel Image

Scrambling Algorithm for Digital Watennarl<ing Based on Chaotic Sequences.

UCSNS International Journal of Computer Science and Network Security, 6 (8B),

125-130.

[34] William Stallings. 1999. Cryptography and network security, London, Prentice Hall

[35] Lala Krikor, Sami Baba, Thawar Arif and Zyad Shaaban. 2009. Image Encryption

Using DCT and Stream Cipher. European Journal of Scientific Research, 32 (1), 47-

57.

[36] Pareek, N.K., Patidar, V. and Sud, K.K., 2005. Cryptography using multiple one-

174

Page 29: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

References

dimensional chaotic maps, Communications in Nonlinear Science and Numerical

Simulation, Vol(10), 715-723.

[37] Pareek, N.K., Patidar, V. and Sud, K.K., 2003, Discrete chaotic cryptography using

external key, Phys. Lett. A, vol(309), 75-82.

[38] Behnia, S., Akhshani, A., Mahmodi, H. and Akhavan, A. 2008. A novel algorithm for

image encryption based on mixture of chaotic maps, Chaos Solitons Fractals, vol(35),

408-419.

[39] Lian, S. and Wang, Z., 2003. Comparison of several wavelet coefficients confusion

methods applied in multimedia Encryption. Int. Conference on Computer Networks

and Mobile Computing (ICCNMC 03),372-376.

[40] Ginesu, G., Onali, T. and Giusto, D.D., 2006, Efficient Scrambling of Wavelet-based

Compressed Images, A comparison between simple techniques for mobile

applications. 2nd International Mobile Multimedia Communications Conference.

[41] Li, S., Chen, G., 2004. Chaos-Based Encryption for Digital Images and Videos,

Multimedia Security Handbook, CRC Press, vol(4), 133-167,2004.

[42] Pei-pei LID, Zhong-liang ZHU, Hong-xia WANG and Tian-yun Y AN. 2008. A Novel

Image fragile watermarking Algorithm Based on Chaotic Map. Congress on Image

and Signal Processing, CISP 08, 631-634

[43] G.A.Sathishkumar , K.Bhoopathy bagan and N.Sriraam. 2011. Image Encryption

Based on Diffusion and Multiple Chaotic Maps. International Journal of Network

Security & Its Applications (UNSA), 3(2), 181-194.

[44] Said EI-Khamy, M. Abou EI-Nasr and Amina EI-Zein. 2009. An Encryption Scheme

for Images Based on the DWT and a Chaotic Cipher. Radio Science Conference,.

NRSC 2009, 1-10.

[45) Ahmed A. Abdel wahab and Lobna A. Hassaan. 2008. A Discrete Wavelet Transform

Based Technique For Image Data Hiding. 25th National Radio Science Conference

(NRSC 2008), 1-9.

[46) Xiang, T., Wong, K. W. and Liao, X., 2007. A novel symmetrical cryptosystem based

on discretized two-dimensional chaotic map, Phys. Lett A, vol (364), 252-258.

[47] Jui-Cheng Yen, Hun-Chen Chen, and lui-Hsiang Juan. 2006. Blind Watermarking

Based on The Wavelet Transform. Proceedings of the Seventh International

175

Page 30: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

References

Conference on Parallel and Distributed Computing, Applications and Technologies

(pDCAT'06), 474 -478.

[48] Clara Cruz Ramos et al. Watermarking-Based Image Authentication System in the Discrete Wavelet Transform Domain. On line http://www.intechopen.comlsource/pdfslI8614IInTech Watermarking_based _image_authentication _system_in _the_discrete wavelet transfo ~~~~ - -

[49] WANG Hui-qin, SHANG Fei, 11 Qi-chun and HAO Ji-chao. 2009. Robust Digital

Watermarking Adopting Barcode in Image. The 1st International Conference on

Information Science and Engineering (ICISE2009) , 660-662.

[50] Ke Luo and Xiaolin Tian. 2008. A New Robust Watermarking Scheme based on

Wavelet Transform. Congress on Image and Signal Processing. 312-316.

[51] Li Fan and Tiegang Gao. 2009. A Novel Blind Robust Watermarking Scheme Based

on Statistic Characteristic of Wavelet Domain Coefficients. International Conference

on Signal Processing Systems, 121-125.

[52] Osamah M. Al-Qershi and Khoo Bee Ee. 2009. A Comparison Between Block-Based

and Non Block-Based Watermarking Schemes based on DWT. Second International

Symposium on Electronic Commerce and Security (pp:l69-173)

[53] Ji-Hong Chen and Chin-Hsing Chen. 2009. A Watermarking Scheme Using Code

Division Multiple Access and DWT. Fifth International Conference on Intelligent

Information Hiding and Multimedia Signal Processing, 13-16.

[54] Shiguo Lian. 2009. Quasi-commutative watermarking and encryption for secure media content distnbution. Journal of Multimedia Tools and Applications, 43(1).

[55] S. Lian, Z. Liu, Z. Ren, and H. Wang. 2007. Commutative encryption and

watermarking in compressed video data. IEEE Circuits and Systems for Video

Technology 17(6). 774-778.

[56] Said E. El-Khamy, M. A. El-Nasr, and Amina H. El-Zein. 2009. A Partial image

encryption scheme based on ELKINZ chaotic stream cipher. MASAUM Journal of

basic and applied sciences, 1(3),389- 394.

[57] Li Li , He-Huan Xu, Chin-Chen Chang and Ying-Ying Ma. 2011. A novel image watermarking in redistributed invariant wavelet domain. Elsevier, The Journal of Systems and Software. 1-7

[58] P.Ramman, Munage.V.N.K.Prasad, and D.Sreenivasa Rao2009. Robust Digital

Watermarking of Jmages using Wavelets. International Journal of Computer and

176

Page 31: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

References

Electrical Engineering, 1(2), 111-116.

[59] TianKai Sun, XiaoGen Shao, and XingYuan Wang,. 2009. A Novel Binary Image

Digital Watennarking Algorithm Based on DWT and Chaotic Encryption. The 9th

International Conference for Young Computer Scientists, 2797-2802.

[60] Amit Mendiratta, Anil Dahiya, Asok De and Navin Rajpa1, 2007. Chaos Based Audio

Watermarking. International Conference on Computational Intelligence and

Multimedia Applications, 64-69.

[61] LID Nian-sheng, YANG, GUO Dong-hui, and CHENG L. L, 2008. A New Wavelet

Watermark Scheme of Color Image Based on Chaotic Sequences. International

Conference on Intelligent Information Hiding and Multimedia Signal Processing, 994-

998.

[62] Qiang Wang, Qun Ding, Zhong Zhang and Lina Ding,. 2008. Digital Image

Encryption Research Based on DWT and Chaos. Fourth International Conference on

Natural Computation, 494-498.

[63] Shiguo Lian, Zhongxuan Liu, Ren Zhen, and Haila Wang. 2006. Commutative

watermarking and encryption for media data. SPIE Digital Library, 45(8).

[64] Fu Yu, Wu Xiaoping, Chen Zemao, Ye Qing. 2008. A Wavelet Digital Watennarking

Algorithm Based on Chaotic Mapping. International Symposium on Electronic

Commerce and Security, 886-889.

[65] Huang Hui-fen. 2009. Perceptual image watermarking algorithm based on Magic

Squares Scrambling in DWT. 5th International Joint Conference on INC, IMS and

IDC.1819-1822.

[66] Gursharanjeet Singh Kalra , Rajneesh Talwar and Harsh Sadawarti. 2011. Robust

Blind Digital Image Watermarking Using DWT and Dual Encryption Technique.

2011 Third International Conference on Computational Intelligence, Communication

Systems and Networks, 225-230.

[67] Jila Ayubi, Shahram Mohanna, Farahnaz Mohannaand, and Mehdi Rezaei. 2011. A

Chaos Based Blind Digital Image Watermarking in The Wavelet Transform Domain.

DCSI International Journal of Computer Science, 8(4),192-199.

[68] Anil K. Jain, Patrick Flynn, Arun A. Ross. 2008. Handbook of Biometrics, Springer

Science, Business Media, LLC.

177

Page 32: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

References

[69] AZain et aL 2009. Fingerprint-Based Biometric Authentication System for Theft­

Proof Cars, (Graduation Project AAST)

[70] Anil Jain and Sharath Pankanti . Fingerprint Classification and Matching. [online],

available from

http://citeseerx.ist.psu.eduiviewdoc/summary?doi=10.1.1.5.6484

[71] Davide Maltoni, Dario Maio,Salil, Anil K. Jain and Prabhakar. 2003. Handbook of

Fingerprint Recognition. Springer-Verlag New York Berlin Heidelberg

[72] Lin Hong, Yifei Wan, and Anil Jain. 1998. Fingerprint Image Enhancement:

Algorithm and Performance Evaluation. IEEE Transaction on Pattern Analysis and

Machine Intelligence, 20(8),777-789.

[73] M. Kawagoe and A Tojo. 1998. Fingerprint Pattern Classification, Pattern

Recognition, 17(3), 295-303.

[74] Manvjeet Kaur, Mukhwinder Singh, Akshay Girdhar, and Parvinder S. Sandhu. 2008.

Fingerprint Verification System using Minutiae Extraction Technique. Proceeding of

World Academy of Science, Engineering and Technology, vol (36), 497- 502.

[75] Xinjian Chen, Jie Tian, liangang Cheng and Xin Yang. 2004. Segmentation of

Fingerprint Images Using Linear Classifier. EURASIP Journal on Applied Signal

Processing, vol (4), 480--494.

[76] Raymond Thai. 2003 Fingerprint Image Enhancement and Minutiae Extraction.

Thesis [Msc]. The University of Western Australia.

[77] Khalil Zebbiche, Lahouari Ghouti, Fouad Khelifi and Ahmed Bouridane.2006.

Protecting Fingerprint Data using Watermarlcing. Proceedings of the First NASA/ESA

Conference on Adaptive Hardware and Systems (AHS'06).

[78] A J. Ahumada and H. A Peterson. 1992. Luminance- model based OCT quantization

for color image compression. Proc. SPIE: Human Vision, Visual Processing, and

Digital Display. SPIE press, 365-374.

[79] C. 1. Zhang and M. Y. Fu. 2003. Infrared Image De-noising Based on Discrete

Stationary Wavelet Transform. Optical technique, vol (29), 250-256.

[80] N. Li, X. S. Zheng, Y.I. Zhao, H.M. Wu and S.F. Li. 2008. Robust Algorithm of

Digital Image Watermarking Based on Discrete Wavelet Transform. IEEE Symp_

Electronic Commerce and Security, 942-945.

178

Page 33: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

Rejerellces

[81] J. x.. Liu and Z. M. Lu. 2008. DWT and DCT Combined Robust Watermarking

Algorithm Based on Vector Quantization with Labeled Codewords. Proc. IEEE Conf,

Anti-counterfeiting, Security, and Identification in Communication (ASID'08) 51-54.

[82] J. Liu, F. Gao and H. Zbang. 2008. A Blind Watermark Algorithm in Mixed

Transform Domain Based on Chaotic Sequence Locating. IEEE Coof. Innovative

Computing Information and Control (ICICIC'08, 23-27.

[83] A. F. Hu and N. Chen. 2008. A Blind Watermarking Algorithm for Color Image

Based on Wavelet Transform and Fourier Transform. Proc. IEEE Conf, Young

Computer Scientists (ICYCS'08), 1453-1458.

[84] J. F. Delaigle, C. De Vleeschouwer and B. Macq. 1998. Watermarking algorithm

based on a human visual model. Signal Processing, vol(66), 319-335.

[85] Y. Z. Li, H. Zhu, R. Q. Yu, G. Yang, and J. Xu. 2008. An Adaptive Blind

Watermarking Algorithm Based on DCT and Modified Watson's Visual Model. Proc.

IEEE Symp. Electronic Commerce and Security, 904-907.

[86] X. F. Zhao. 2003. Digital image scrambling based on baker's transformation. Journal

of Northwest Normal University (Nature science), 26-29.

[87] I. 1. Cox, 1. Kilian, F. T. Leighton and T. Shamoon. 1997. Secure spread spectrum

watermarking for multimedia. IEEE Trans. Image processing, vol (6), 1673-1687.

[88] S. Voloshynovskiy, S. Pereira, V. Jquise and T. Pun. 2001. Attack Modeling: Towards

a second generation watermarking benchmark. Signal Processing, Special Issue on

Information Theoretic Issues in Digital Watermarking, Elsevier, vol (81), 1177-1214.

[89] K. Janthawongwilai and T. Amomraksa. 2004. Improved Performance of Amplitude

Modulation Based Digital Watermarking. IEEE Symp. International Symposium

Communications and Information Technology (ISCIT'04), 318-323.

[90J M. W. Zhao and Y. Z. Dang. 2008. Color Image Copyright Protection Digital

Watermarking Algorithm Based on DWT &DCT. Proc.IEEE Conf, Wireless

Communications, Networking and Mobile Computing (WiCOM'08), 1-4.

[91] Xi Chen and Shiguo Lian. 2010. On the OCT Based Joint Fingerprint Embedding and

Decryption Scheme. Journal of Multimedia, 5(5), 473-480.

[92J D. Kundur and K. Karthik. 2004. Video fingerprinting and encryption principles for

179

Page 34: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

References

digital rights management. Proceedings of the IEEE, 92(6) 918-932.

[93] Musheer Ahmad, Omar Farooq and Jonathan Blackledge. 2010. Chaotic image

encryption algorithm based on frequency domain scrambling. Information Processing

Letters

[94] Neminath Hubballi and Kanyakumari D P. 2009. Novel DCT based watermarking

scheme for digital images. International Journal of Recent Trends in Engineering,

1(1),430-433.

[95] Saeid Saryazdi and Mehrnaz Demehri, 2005. A Blind DCT Domain Digital

Watermarking. 3rd International Conference: Sciences of Electronic, Technologies of

Information and Telecommunications SETIT

[96] Sadik Ali M. AI-Taweel, Putra Sumari, Saleh Ali K. Alomari and Anas J.A. Husain.

2009. Digital Video Watermarking in the Discrete Cosine Transform Domain. Journal

ofCornputer Science, 5 (8),536-543.

[97] Chi-Man Pun, 2009. High Capacity and Robust Digital Image Watermarking. Fifth

International Joint Conference on INC, IMS and IDC

[98] Shikha Tripathi, R.C. Jain and V. Gayatri. 2006. Novel DCT and DWT based

Watermarking Techniques for Digital Images. The 18th International Conference on

Pattern Recognition (ICPR'06)

[99] Rakhi Dubolia , Roop Singh, Sarita Singh Bhadoria and Rekha Gupta, 2011. Digital

Image Watermarking by Using Discrete Wavelet Transform and Discrete Cosine

Transform and Comparison Based on PSNR. International Conference on

Communication Systems and Network Technologies, 593-596.

[100] Mohamed Al Baloshi and Mohammed E. AI-Mualla. 2007. A DCT-Based

Watermarking Technique for Image Authentication. International Conference on

Computer Systems and Applications. IEEE/ACS IEEE, 754-760.

[10l] Shanshan Zhang, Xiaohong Wang, Shizheng Zhou. 2011. The Research of Image

Watermarking Encryption Algorithm. Fourth International Joint Conference on

Computational Sciences and Optimization, 821-824.

[102] Yanling Wang and Xiuhua Ji. 2009. A New Algorithm For Watermarking Based On

DCT and Chaotic Scrambling. 4th International Conference on Computer Science &

180

Page 35: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

References

Education, 1957-1961.

[103] Gengming Zhu, Nong Sang,DeshegXiang and Shaobo Zhang. 2008. Watennark

Algorithm Research and Simulation Based on Different Frequency Coefficients.

International Conference on Advanced Computer Theory and Engineering, 271-275.

[104] ZHAO Rui-mei, LIAN Hua ,PANG Hua-wei , and HU Bo-ning. 2009. A Blind

Watermarking Algorithm Based on DCT. Second International Symposium on

Intelligent Information Technology Application. 821-824.

[105] Ali AI-Haj. 2007. Combined DWT-DCT Digital Image Watennarking. Journal of

Computer Science, 3 (9), 740-746.

[106] Saied Amirgholipour Kasmani and Ahmadreza Naghsh Nilchi. 2008. A New Robust

Digital Image Watennarking Technique Based On Joint DWT-DCT Transfonnation.

3rd International Conference on Convergence and Hybrid Infonnation Technology,

539-544.

[107] Wang Na,Wang Yunjin and Li Xia. 2009. A novel Robust Watennarking Algorithm

Based on DWT and DCT. Computational Intelligence and Security, CIS '09,437-441.

[l08) Guangyong Gao, 2010. A Blind Grayscale Watermark Algorithm Based on Chaos and

Mixed Transform Domain. 2nd International Conference on Computer and

Automation Engineering (ICCAE), vol (1), 658-662.

[109] Liu Yuejun, 2010. Research on Information Hiding System based on OCT Domain.

Second International Conference on Computer Modeling and Simulation, 11-14.

181

Page 36: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

~J (Approximation Coefficients) ~..foll -=...~\-11 JIJ:.j} (Discrete Cosine Transform)

¥WI ~I t...Jj ~ ~I..?")' (Mid Band Frequencies) ~jWI ~I -=...1.3 -=...I.l.lyll ~I~}

~ . .:.~ .. -II~·~·II-=...I.l.l·~II -,,~ \i.W I_' w .. ~ .>- Y'r=--...J ~~~.

'il ~ •· .. --11 ~ .11 "::"UWI .. ,j .1 .~ 1 '- ~ .1 u.' ru.. I'- L ~. . ~ ~ y ~. u- ~~. ~ _ ..r.y~ & y ~ r~ ..

.l;lji r\..l:.j J)\..:i.. w-a";Y" Ctii... ~ ~ J Wjill \.l,Iooo JJi'il..;~ c~ \t-ol~} J (Fingerprint)

.(Sub Key Management) ~.fo.JI ~..>i11 ~1.i.JI

, .. : . .t~I ..; ,,~ ~ (Security Analysis) c.;1...';I J ~I J:W "I.»! ~ c.fo.J1 r\.l;.,.ill ~I ~J ~

.C.fo.J1 rUi.Jl1 .,,\..is J • .,! loS::"" ~\:ij}1 ,-,i"';\ J ~WI

Signal Processing) ...J.,-lJ ~I 4l\.-l1 -=...4Loc- ~IY" ~ c.fo.J1 rUi.JlI ~w ~ r3 ~ I·. \....utA· •. ~II .,t..i~11 ' .. '~'1 .,,~"il .- .--11 .- .l::.&....;.J\S(Anal . '--'"""":! • Y.C J ~ Y' J 0-- J (.)'U~ J . ~ J ~ ~ J YSIS

~';I ~ 1.~Lb. ~WI ~I I . - I - ~. ~ ' .. 11 ~Wl ~I '- I .L.:. ~ • '1t"'. J _ ~ ~. ~ ~...J J J...J..r' _ ~ ~

.' 1··'1 . 4.i.U:..J1 ~ ~. 1- .....wI1· -=...1· .. I··'I·I:.·A . Ute. 4.i.Lb. ~ ~ ',_'1 ~.Y""..r. . ~"i'"' J . ;-..Y"" r--..r. " .. J...J..r'

.-:-':.11 Ui.Jl1 -:""L~. 1.11 ~l..ltJ ·-:-':·'1 \..l:>.ll1 . .J. (OI'AO) .--11 ··.l:.a......;JI .h....~_I\ • ·~'I c~ r ~&Y .. "c~ r <,?"/O ~ ~J J.>- ~Y'

II I<.l§ 4.i.\..h.o ~ ~ ". _'I ~';1 ~ 1.~\..h.o ~WI ~I "I . ~ 1 ~ \ .11 ~l..ltJ <-r. ........... " •. J...J..r' • . '1t"'" J. ~ ~. i'"' & y . . .

Page 37: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

r~I i.J."..,. ~ iJ.o ~)I ~.J ~! J.-: i.Jy.o::JI wl..)""" iJ.o J!1 ).u... ~ ~ .sy....,JI ~\.illl

• .sy....,JI .s..l6. YI

.,si ~~I w~...,..JI ":"'::lU.,..p:i rl~H ¥WI ~I ~ cfo rJ,'j a..)1 iJ.o y411 I~ JJI1i:!

~ :- 'I ~I u..c. lWj .~ -'I .• ~. • • J~

w~ ~) .)! .sji..:-JI ~6.1 ..l~YI ¥~ ~I ~~I w~...,..JI ~I~ • ..Jy.-:JI ~ .lL!

':7~I J ~pl w')L.t-li "l.b..i (Approximation Coefficients) ~ ¥WI ~I r.Jj f'~.)

rU.JYI (pseudo Random Sequence) ~~ rl~H i.J~I uc- ~)I wl....,b..JI.)c- ':7jJ:..:

.¥I..,.wI~1

~';.I ~ .~I ~)I w\..j\,!,JI ~I ~Iy..:;.....! .)c- ~ .r.)~ ~u. .J..l ~1..i.. rl~H

rl.J:2.j ~ u.- ':7>-' Clli... ~ ~ J Wjill 1..l,IA ~ ':7~ Clli...S. 4--I~J J (Fingerprint)

.(Sub Key Management) .4.:...fo.JI ~.;ill ~1.i..JI -¥ji

..,.,411 ~ ,,4-~ (Security Analysis) lJl..YI J ~I ~ "I..?oJ f' c.fo.J1 r~ ~t:illl ~J ~

.C.fo.J1 r~1 .,,\.is; J • ..,5.s..lA ~t:illl "\j.'~1 J ~WI

Signal Processing) .Jy.-ll ~I ~I wyL.c. ~I-"" ~ c.fo.JI r~I ~ti:s ~ f' ~

~ ~ lA.J:!C- J ~yll J ~I J Ju~I J ."Wo:i...';.1 ~ J FI ~ J~\.S (Analysis

u....,,~1 ~ 1.:itiJ:.... ~WI ~I I" I • ~. ~ :.11 ~WI ~I 1_, .L..:. • . ~. J. ~ ~. ~ ~.J J J.Jyw • ~ J"""""

'~I .h...·~·'1 ·.~III..)c.L.uiw1.-I··'I-\:.-- . ...iO/'" II' ~U\.c.~th..~~ ' .. 11 ~ J Y""'~..>" • __ yow .-- '-r /0 -r. u.....::u. . •• J.Jyw

• ~I I"·' 0/110 II' ~ ~th.. ~ ~ :.11 u...."YI ~ 1.:itiJ:.... ~WI ~I I .• I ~ .. ...... J /0 -r. u.....::u • . . . J.Jyw • . ~. J. ~ ~.

WI '-l\...Jt.. . - WI .' I· .II..ill:; . ~u...J1 ~ .) A...i~1 Wt..... ~ . L . . .C;~II .0"'" ' .. ~ ~ yow ..r. . t! . .' . .J-~ ~

~I ~ ~~I w~...,..J1 w::lU.,..p:i rl~H ~WI ~I ~ cfo ('1"; a..)1 u.- y411 I~ JJI1i:!

.¥..»ll ~I ~ ~ J rWlI ~ w::lU.,..p:i J w::lU.,..p:i

~6.i ..lLLhl ~~ .~ _'I ~~I..:...6.. .. 11 Uo....I ..1h:il1 J ~I r .:11 •. -II ~. . . ~ • • •• ~ • • .YOW .>!. J J*'.J.,.-.. V' I.Y.C- Y ~-- ~

rt...:ill ~ J:W ~WI r.,llt (Discrete Wavelet Transform) ~.) wL.-l.b..i ~) .)! .sji....J1

Page 38: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

0.a ~w..'I1 .)c. ~ I~ .J ~~I ~tbjll /~I (Transform Domain) U"""":! .J ~-rul t~1

. I • I • . .!. -'I . j uw.J1 wb... . ·'1 u~· t..:ill ~ w~ •. "'. ~I ~ .- ~II ~~, ~ U'" .J ~ IS"" • • ~ ~ .J r . •. ~ u..a ~

~·.-II~lwu..· I . -: .. L~I~I •. LlI •• ...F."". • ..)..)~~ '-'~

~I ~ .1:.,· ~ I~u "._11 ~I I..l:.lI 1~1'1 -...ill:; ~ .11' , .... Jl.JII~ J u:u • .~ U'" r , . .,r...F."". r r ,CJlIA ..- J' U'" . • .J •

U;.j. .~ .11 ~I.ti ~6.1 ..lLu'J1 ~I.ti .!. -II - ~w.J1 wb...· .11 w~· ~I . ,:.11 r ~ .J .1oS.,......... • .J. .• ~ IS"" • • .Y'" ~ ~ • .J"""-'

~ o~ U\.c. ~ ~ c:. .-:::. ~I • ~II UJ'1....:W1 ~I wu..· I '. . _II ".- 'I ~I • F.-.J. • Y'" ~ ~ .r' • • ..)..) p U'" ..)~.,r..F."" •

.u....1 ;; . -II ~ • ~ ti. '.': 'I ~I ,~ ~I ~ .t:., ~ ~ .11 . '11 wWlS...1 \iU...1' Yo..)Y""'"" • ~ • ...",..... ~. .~ .J • ...Y-"".J U'" ., ~. ,

~l (Digital Wavelet Transform) 1oSy....J1 ~I.ti .J ~6.i ~~'JI ~I.ti .ft.-11 ~w.J1 u~..,..ll

'i~ .J ~..foll U)I..,,\.a.J1 J\.hj (Approximation Coefficients) ~ J J.J'J I ~..;! W\!\.hj ~)

~'JI w)L..\.a.J1 J\.hj (Horizontal Coefficients) ~ J ~~I J ;;.).,.-\1 rJ:-~ yl ut ... )a..J1 ~

~ J &1)\ Jtbjll t....i ~Iyl ~\.a.J1 J\.hi (Vertical Coefficients) ~ .J ~I Jtbjll .J

.~..;hill U)I..,,\.a.J1 J\.hj (Diagonal Coefficients)

Partial Chaotic) ~-»ll ~I~I ~I rlJ:..j rl~~ (Approximation Coefficients) ~ M!

(Logistic Maps) ~I ~6.i :41i ".'1') .hJ1-.?-~) rl~l ~ ~ 'i~1 .J (Image encryption

(Sub Key Management) ~ yLJl ~..;ill ~1.iJ1 ¥ ji f'1J:..j 0-0 D¥ ji ~ ~\..,;.. loS Y'" C l:ii.. ~ JSl

l>-'fl (Orbit Hopping) ~)11 .hJ1-.?- &.)';1 ri! ~ jii.l1 ~ ~ ~j.,..u ¥ji ~.ft.! ..cll:l J

'i~1 J ~..foll u::L\.a.J1 J\.hj (Approximation Coefficients) ~ ~p'.,..ll r=il1 ~ ~ ~jyU

·1....';1 ~ .. 11 ~ I I· .~.II ~I I..l:.lI 't:ij]1 ~ .. -:'~I UotS 0 .. 11 ~ • ~ U .J • ..Y-"". ~ ..», ~ CY--. r ~ ..J r-:- . .)Y""'"". ~ • .

:~ I.... ~ ~ (Security Analysis)

:~ I.... r'~~ ~.J (Statistical Analysis) .,;t...-:a. 'II J.!b.:ill -,

~I 0.).,.-\1 J ~';I o.),.,...,JI ~fi.JI.bWlI ri! ~t...-:a.J (Histogram Analysis) -,

.J ~'JI 0.)".....,Jl ~fi.JI.b~ yfojll ~ 0"45 (Correlation Coefficients) -Y

.~I 0.).,.-\1

Key Sensitivity Test) Cl:ii..11 ,..;. .} .J:!:!-Llll ~4 c.fo.Jl ~ j)"p-!I f'1..l:.lI1 ~L...:... Jli.. -Y

.b.....~ .11 .. !.~II ~ us (NPCR) 0 .. 11 A..;.< .11 .bWlI.ui .• ~ us IjS (Anal . .J-' ~ 0". J .)~ J-" ... ~ 0" • .J YSIS

.0 ..).,.-\1 o~t....;:.:;....J ~ ..;:a:il

U;.jJ1 I~I' 't:ij]1 A..; \i... .~ .11 ~I IJ:..j o.i ..lA t...-:a.1'1 ~ ~tS WiUI .l! r f' ' I.E-! ~ ..)~.J CY""". r .T loS ~ ,. • J

· .cl1:l~\:; ~.IL.II~Iu..c. . ..i· U;.jJlo~t.iSu1i1 .~.~.II '\.till U;.jJ1 .,..-: .. IIIoS~6.'i1 U'" J .~. • 'or U:!'" . .J""""""",.r r .J .... y-

r1..l;.j}1 ~ t....11oS.,:;.....J\IoS~6.'J1 r1..l;.j}1 ~.b:ii 0.).,.-\1 &.) ~ M! ~ 0:!-01..l:.ll1 ~ FI ~ y.)~

Page 39: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

w.i "'11 ~ ~ ~ -~;-II w~1 1.liU..1 ~ -'IL:.. _L'C~II . .-i ~\A t _L~ 11-'1 U ~ YJ. - •• J-'W • f' • J • Y •. yy-o-w -r J>""" '-F- ~ ~

Jt.J1 0--~I ~yl wt...)-ll JJI,lj J Jij~.,....J t~ J .~~I wt...)-ll JJI,lj J Jij ~ LolA t..;~

t...16.·· ~I ~ • t...... ~. . ~.L. r._.' • il~1 u..-~I wliL..J.\ t..w illJ:... .. ,-f' ~. ~ • Y"'~ .~"""..J'" .J. •. . ~u--

J .~I ~ ~I..i.. ~ J.".-.,ll ~Jh.J1 (j";.J~1 0-0 WIS. ~ .ulit+.J1 o~ ~ ~Ijll wl~~.l)'1

wt...)-ll J:;..1.l ~WI ~I ~~ ~ J ~I 0.» ~ ~.fo.JI J).JI -.>.l:o.' ~I ~I u;1S.

wi ~ .illlI J ~~I .cllWI(.Fo wl...)-~ ~I w\....L)WI .illi .~p. ~ .;~ "i ~ ~~I

.~ ~I J ~ ~w.ill ~ ~I u'iJh.JI ~fo.)c- iyu wfo

0-- tiel J ~ ~~ ~I w'JL-J')'1 u~ .)c- ¥WI wt....:lW1 wl~ ..;.,.-}I ~ JJI,lj ~I

~ .:I~ ~Jh.. J ~I ~I~I 0-- ~Iy J tt-lfl ~ ~I J ~4JI J ~~I Aj";.,,!11 u'i4--JI

J:ll:.. 0-- .~WI u~1 ul~ ..;.,.-\1 JJI,lj ~~i wL.'1I.J ~I Jii ... ; ~ f""t.....:i ~I .J ~.fo.JI J).:...ll

ul...:W1 ul~ ..;.,.-\1 J ..;.,.-ll JJI,lj ~ wI... ~I J ~I JJ;'" jl w411 ~ ~L.... yl ~ Jfo:ij ..;~I I~

. ':'1 •• LII .' . to,. ~I ·I...~I wt..l.l:.l..u ~\i."il 1- - _It ~ ·'1 . '11 .' • .lAi.u ~WI J ~ J c:r- ..,.,.... u- U .•. • or-.JJ'""""*' • .J- J i.JA ~ •••

• .~WI u~1 wlW:i -:' .. L" J:ll:..' .• :11 •• Ltl·· ~ •••• J I,lj}1 ~ ~ .. '1 ~ J • • ~ U'" ~ .J c:r- ..,.,..... J ~ ~..J •• J U"""

~I A..W:i -:' .. L~ ~. J I,lj}1 Wu -~- -'I ~ . ~I ;,i'ij ••• • • • ~ i.JA J .J ~ .Y'" i.JA • J~

~ (j;;':"':' J ~ 4->,," '\ ~ J E-"Iyoll ~.J yly'l ~ 0-- wfo J W-WT' ~ ~yl ill wl..;t...-:i:..)'1 J jY'P. ....... ~ J ~L....yl(.Fo -»Y'.)' ~w.)'4 ~jj 'j~ VT' .J ~~ L.....; '\ t

.~.JI ~fi..J1 yly.'11 v<:olyLi.a' ~~ J L ,;; .. II

u... .11' . ·.:.'1 .' II Aj~'iU ~I ~ . __ I tw:. ., -~ ~ -'I' .....LlII~ J .. J J' i.JA V"" J"-' ~ Y 'T' .' . L""-..r' JC-~ J' i.JA • • ~

A..W:i l.liU..u - -'I J l,lj Jj.j' \..jJ ~I -\:'~II ~I . I '·1 u... "1' <...LJI I~ J Ui.. • f' .. ..;~ J J ~ C---. ->" J V"" ~. J' i.JA • • J •

J l,lj ~I ·I...~I ~·'I .' • ~ h.J 1. ·1.liU..I • -:11 ~I ~I ~I ~ u.JI ~I J J ~ u J • .J- ~ J _ .,..~. .J •

• . L~ ·.C .• w .I1~WI ~I ~~~I •. LlI '1 • I· - -II Jij ~ '-'...>- • u-= J • J' • ~- •• '-'J"'"' V"" yu.... ,.. .J . ..;~

:WF~.)' ~I w~1

~jl:. CF- ~WI ~I t.Jj ...,.lc. .lAia: J ~ts.JI ~I / ~I (Spatial Domain) ~ .J J.J'11 t~1

";\<-11/ - I ·;'1 :·-'I . .-i -'" i - -'I· l.4i...1 ~ ., .or--- or-~ J:"'"" -r <r"' J .J~ ~ • ~

Page 40: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

~,,~, , 4.w4' ~

~~~1" , ~~,~, ~

~\.1;.j ~ O~jQ .JJla\\ ~y\ ~W\ ~)l,J\ ~~

~~..,il\ ~~\ w~yil\

~1~j~i~l~i

~).) ~.:.,,~ J~), ~~, ~" ~j1~" I",u,u ~~, ~.)lf"w 4.G~ 4Jl-)

~LoJ'

~

.:.,,')'~-y, , ':"'~,jOO'Y' 4,..,.,w,

,-,f Iof ~ ..

.;i.! J:l.J ~ I.;foJJ\ ju .•. ii\ w\...)a.JI .J w1..,l....W\ ~ ~

-,?H\ Jijll.J ~)fo:ill.J~).Jl ~yr.ll ~\S\lI o .JA\.il\ t..)

" • , , o.JA\.il\

Page 41: Digital Image Watermarking Protection Based on Chaotic ...openaccess.aast.edu/PDFs/Thesis/partial/77459_c.pdf · In this thesis, three different contributions were suggested, firstly,

DIS

005.82 ZE-DI

77459 C2

DIGITAL IMAGE WATERMARKING PROTECTION BASED ON CHAOTIC BIOMETRIC SYSTEM

\\\\\~\"\\\"~'\\\I \\11' I'll \ll\ 77459