Loading

A Modified Image Watermarking Method using Logistics and Rsa Algorithm
Anitta Balsalam Vasanthan
Anitta Balsalam Vasanthan, PG Scholar, School of Computer Science and Engineering, Vellore Institute of Technology, Vellore-632014, Tamil Nadu, INDIA.
Manuscript received on 21 April 2019 | Revised Manuscript received on 26 May 2019 | Manuscript published on 30 May 2019 | PP: 3456-3461 | Volume-8 Issue-1, May 2019 | Retrieval Number: A1815058119 /19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In the current era due to the increasing growth of multimedia data it is necessary to protect them, as they are subjected to cyber-attacks like ransomware, trojan, viruses etc. This can affect the con fi dentiality and integrity of the confidential data transmitted by private and government organizations over the internet. To protect such data digital watermarking is used highly now adays. Embeddingdataintodigital signals like images, audios and videos in the form of digital watermarking copyright information by which the header of data block orsynchronizationoftimeisadapted to mark data. Most of the existing watermarking algorithm encrypts the watermark image using RSA, but this is a time-consuming process. Several other existing techniques like Arnold transformation, LSB, DWT etc. fail to address all the security requirements. This paper puts forth a modified watermarking system that uses RSA encryption algorithm and Scrambling Logistic algorithm. In it the watermark image is encrypted by using Logistic and RSA technique is used for encrypting the scrambling parameters. The host image is decomposed by Integer Wavelet Transform (IWT) and SV Decomposition (SVD) and the watermark image is then incorporated into it. This system has a much higher computational efficiency, robustness and embedding capacity compared to the existing techniques.
Keywords: Watermarking, IWT, Logistic, RSA.

Scope of the Article: Image Security