Document Type : Research Article



The intriguing characteristics of chaotic maps have prompted researchers to use these sequences in watermarking systems to good effect. In this paper we aim to use a tent map to encrypt the binary logo to achieve a like-noise signal. This approach makes extraction of the watermark signal by potential attacker very hard. Embedding locations are selected based on certain principles. Experimental results demonstrate that our proposed watermarking method is highly superior to other techniques reported in literature and readily achieves the desired robustness and security level.


[1] Ester Yen and Li-Hsien Lin. Rubik's cube watermark technology for gray scale images. Expert Systems with Applications, 37(6):4033-4039, 2010.
[2] Tiegang Gao, Qiaolun Gu, and Sabu Emmanuel. A novel image authentication scheme based on hyper-chaotic cell neural network. Chaos, Solitions and Fractals, 42(1):548-553, 2009.
[3] Hazem Munawer Al-Otum and Nedal Abdul Samara. A robust blind color image watermarking based on wavelet-tree bit host difference selection. Signal Processing, 90(8):2498-2512, 2010.
[4] Maneli Noorkami and Russell M. Mersereau. A framework for robust watermarking of h.264/avc-encoded video with controllable detection performance. IEEE Transaction on Information Forensics and Security, 2(1):14-23, 2007.
[5] Gwenael Doerr and Jean-Luc Dugelay. A guide tour of video watermarking. Signal Processing: Image Communication, 18(4):263-282, 2003.
[6] Karen Su, Deepa Kundur, and Dimitrios Hatz inakos. Statistical invisibility for collusion resistant digital video watermarking. IEEE Trans. Multimedia, 7(1):43-51, 2005.
[7] Muhammad Khurram Khan, Jiashu Zhang, and Lei Tian. Chaotic secure content-based hidden transmission of biometric templates. Chaos, Solitions and Fractals, 32(5):1749-1759, 2007.
[8] Narendra Singh and Aloka Sinha. Digital image watermarking using gyrator transform and chaotic maps. International Journal for Light and Electron Optics (Optik), 121(15):1427-1437, 2010.
[9] Jiashu Zhang, Lei Tian, and Heng-Ming Tai. A new watermarking method based on chaotic maps. In IEEE International Conference on Multimedia and Expo (ICME), 2004.
[10] S. Behnia, M. Teshnelab, and Ayubi P. Multiple-watermarking scheme-based on improved chaotic maps. Communications in Nonlinear Science and Numerical Simulation, 15(9):24692478, 2010.
[11] Xianyong Wu and Zhi-Hong Guan. A novel digital watermark algorithm based on chaotic maps. Physics Letters A, 365(5-6):403-406, 2007.
[12] Rongrong Ni, Qiuqi Ruan, and Yao Zhao. Pin-point authentication watermarking based on a chaotic system. Forensic Science International, 179(1):54-62, 2008.
[13] Siyue Chen and Henry Leung. Chaotic watermarking for video authentication in surveillance applications. IEEE Transactions on Circuits and Systems for Video Technology, 18(5):704-709, 2008.
[14] Somayyeh Mohammadi, Siamak Talebi, and Ahmad Hakimi. A secure and robust video watermarking based on chaotic maps. In 8th Iranian Security Community Conference, 2011.
[15] Yan Liu and Jiying Zhao. A new video watermarking algorithm based on 1D DFT and Radon transform. Signal Processing, 90(2):626-639, 2010.
[16] Radu O. Preda and Dragos N. Vizireanu. A robust digital watermarking scheme for video copyright protection in the wavelet domain. Measurement, 43(10):17201726, 2010.
[17] Dooseop Chio, Hoseok Do, and Taejeong Kim. A blind Mpeg-2 video watermarking robust to camcorder recording. Signal Processing, 90(4): 13271332, 2010.
[18] Alper Koz and A. Aydin Alatan. Oblivious spatiotemporal watermarking of digital video by exploiting the human visual system. IEEE Transactions on Circuits and Systems for Video Technology, 18(3):326-337, 2008.
[19] Bijan G. Mobasseri, Michael J. Sieffert, and Richard J. Simard. Content authentication and tamper detection in digital video. In Proceeding of IEEE International Conference on Image Processing, volume 1, pages 458-461, 2000.
[20] Dengpan Ye, Changfu Zou, and ZhiquanWang. A new adaptive watermarking for real-time MPEG videos. Applied Mathematics and Computation, 185(2):907-918, 2007.
[21] Jing Zhang, Anthony T. S. Ho, Gang Qiu, and Pina Marziliano. Robust video watermarking of H.64/AVC. IEEE Transactions on Circuits and System-II: Express Briefs, 54(2):205-209, 2007.
[22] Hae-Yeoun Lee, Hyungshin Kim, and Heung-Kyu Lee. Robust image watermarking using local invariant features. Optical Engineering, 45(3): 37001-37002, 2006.
[23] Hefei Ling, Liyun Wang, Fuhao Zou, Zhengding Lu, and Ping Li. Robust video watermarking based on affine invariant regions in the com- pressed domain. Signal Processing, 91(8):1863{ 1875, 2011.
[24] Maneli Noorkami and Russell M. Mersereau. Digital video watermarking in p-frames with controlled video bit-rate increase. IEEE Transactions on Information Forensics and Security, 3 (3):441-455, 2008.
[25] Guang-yong Gao and Guo-ping Jiang. Zero-bit watermarking resisting geometric attacks based on composite-chaos optimized SVR model. The Journal of China Universities of Posts and Telecommunications, 18(2):94-101, 2011.
[26] Yu-feng Hu and Shan-an Zhu. Zero-watermark algorithm based on PCA and chaotic scrambling. Journal of Zhejiang University: Engineering Science, 42(4):593-597, 2008.
[27] Sanjay Rawat and Balasubramanian Raman. A chaotic system based fragile watermarking scheme for image tamper detection. International Journal of Electronics and Communications (AEU), 65(10):840847, 2011.
[28] Mohammed Ghanbari. Standard codecs: Image compression to advanced video coding (IET telecommunications series). The Institution of Engineering and Technology, 2003.
[29] Kathleen T. Alligood, Tim D. Sauer, and James A. Yorke. Chaos: an introduction to dynamical systems. Springer, 2001.