Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

A Watermarking Technique with Chaotic Fractional S-Box Transformation

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In this paper, the system of non-linear ordinary differential equations which defines a continuous-time dynamical system that shows the fractal characteristics of attractor is used to construct chaotic S-box. In this new digital watermarking technique the priority is of importance of robustness along with chaos to create confusion. The inclusion of chaos along with watermarking in frequency domain ensures robustness. As we have proposed a frequency domain watermarking as which we embed watermark into the low or middle frequencies, these changes will be spread all over the image. The strength of fractional S-box is evaluated with the help of bit independence criterion, nonlinearity analysis, strict avalanche criterion, linear approximation probability and differential approximation probability. Additionally, some security analyses in the form of correlation, contrast, energy, entropy, homogeneity, mean square error and peak signal to noise ratio are performed for validity of proposed watermarking scheme. The confidence measure after these analyses indicates the survival aligned with malicious attacks like noise, cropping and compression.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Chen, G., & Ueta, T. (1999). Yet another chaotic attractor. International Journal of Bifurcation and Chaos, 9(07), 1465–1466.

    Article  MathSciNet  MATH  Google Scholar 

  2. Shannon, C. E. (1949). Communication theory of secrecy systems*. Bell System Technical Journal, 28(4), 656–715.

    Article  MathSciNet  MATH  Google Scholar 

  3. Sam, I. S., Devaraj, P., & Bhuvaneswaran, R. S. (2012). An intertwining chaotic map based image encryption scheme. Nonlinear Dynamics, 69(4), 1995–2007.

    Article  MathSciNet  Google Scholar 

  4. Tang, G., & Liao, X. (2005). A method for designing dynamical S-boxes based on discretized chaotic map. Chaos, Solitons & Fractals, 23(5), 1901–1909.

    Article  MathSciNet  MATH  Google Scholar 

  5. Chen, G. (2008). A novel heuristic method for obtaining S-boxes. Chaos, Solitons & Fractals, 36(4), 1028–1036.

    Article  MathSciNet  MATH  Google Scholar 

  6. Özkaynak, F., & Özer, A. B. (2010). A method for designing strong S-Boxes based on chaotic Lorenz system. Physics Letters A, 374(36), 3733–3738.

    Article  MATH  Google Scholar 

  7. Hussain, I., Shah, T., Mahmood, H., & Gondal, M. A. (2012). Construction of S 8 Liu J S-boxes and their applications. Computers & Mathematics with Applications, 64(8), 2450–2458.

    Article  MathSciNet  MATH  Google Scholar 

  8. Rössler, O. E. (1976). An equation for continuous chaos. Physics Letters A, 57(5), 397–398.

    Article  Google Scholar 

  9. Adams, C., & Tavares, S. (1989). Good S-boxes are easy to find. In: Advances in cryptology—CRYPTO’89 proceedings (pp. 612–615). Springer New York.

  10. Wang, Y., Xie, Q., Wu, Y., & Du, B. (2009). A software for S-box performance analysis and test. In: Electronic commerce and business intelligence, 2009. ECBI 2009. International Conference on (pp. 125–128). IEEE.

  11. Khan, M., Shah, T., Mahmood, H., Gondal, M. A., & Hussain, I. (2012). A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems. Nonlinear Dynamics, 70(3), 2303–2311.

    Article  MathSciNet  Google Scholar 

  12. Anees, A. (2015). An image encryption scheme based on Lorenz system for low profile applications. 3D Research, 6(3), 1–10.

    Article  Google Scholar 

  13. Cox, I. J., Kilian, J., Leighton, F. T., & Shamoon, T. (1997). Secure spread spectrum watermarking for multimedia. Image Processing, IEEE Transactions on, 6(12), 1673–1687.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sajjad Shaukat Jamal.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jamal, S.S., Khan, M.U. & Shah, T. A Watermarking Technique with Chaotic Fractional S-Box Transformation. Wireless Pers Commun 90, 2033–2049 (2016). https://doi.org/10.1007/s11277-016-3436-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3436-0

Keywords

Navigation