Baker Map's Itinerary Based Image Scrambling Method and Its Watermarking Application in DWT Domain

Full Text (PDF, 786KB), PP.12-20

Views: 0 Downloads: 0


Ruisong Ye 1,* Leyi Zhuang 1

1. Department of Mathematics, Shantou University Shantou, Guangdong, 515063, China

* Corresponding author.


Received: 4 Oct. 2011 / Revised: 26 Nov. 2011 / Accepted: 5 Jan. 2012 / Published: 8 Feb. 2012

Index Terms

3D Baker map, Itinerary, Srambling, Watermarking


An image scrambling method based on the itinerary of the improved 3D Baker map is proposed in this paper. The standard 3D Baker map is improved by the tent map, so that the itinerary becomes more complicated and can be used to encode the image pixel positions to scramble the image. The scrambling method is applied to the preprocessing in watermarking. The watermark bits are embedded in the discrete wavelet transform (DWT) spectral domain based on the scrambling of watermark, the odd-even adjustment rule and the neighbor mean value. The watermark bits are embedded in medium coefficients in DWT domain of the host image. Experimental results show that the watermarked image looks visually identical to the original one and the watermark can be effectively extracted upon image processing attacks, which demonstrates strong robustness against a variety of attacks.

Cite This Paper

Ruisong Ye,Leyi Zhuang,"Baker Map's Itinerary Based Image Scrambling Method and Its Watermarking Application in DWT Domain", IJIGSP, vol.4, no.1, pp.12-20, 2012. DOI: 10.5815/ijigsp.2012.01.02


[1]I. J. Cox, J. Kilian, F. T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Trans. Image Process. 1997(6): 1673-1687. 

[2]Y. Wang, J. F. Doherty, R. E. V. Dyck, A wavelet-based watermarking algorithm for ownership verification of digital images, IEEE Trans. Image Process. 2002(11): 77-88.

[3]H. A. Peterson, A. J. Ahumada Jr., A. B. Watson, An improved detection model for DCT coefficient quantization, In: Proc. SPIE 1993(1913), pp. 191-201.

[4]A. B. Watson, DCT quantization matrices visually optimized for individual images, Proc. SPIE 1993(1913 ), pp. 202-216.

[5]A. B.Watson, G. Y. Yang, J. A. Solomon, J. Villasenor, Visibility of wavelet quantization noise, IEEE Trans. Image Process. 1997(6): 1164-1175.

[6]C.-I. Podilchuk, W. Zeng, Image-adaptive watermarking using visual models, IEEE J. Select. Areas Commun. 1998(16): 525-539.

[7]P. H. W. Wong, O.-C. Au, Y.-M. Yeung, A novel blind multiple watermarking technique for images, IEEE Trans. Circuit Syst. Video Technol. 2003, 13 (8): 813-830.

[8]T. H. Chen, G. Horng, W. B. Lee. A publicly verifiable copyright-proving scheme resistant to malicious attacks. IEEE Transactions on Industrial Electron, 2005, 52(1): 327-333.

[9]H. Inoue, A. Miyazaki, A. Yamamoto, et al. A digital watermark based on the wavelet transform and its robustness on image compression. In: Proceedings on IEEE ICIP, Chicago, pp. 391–395, 1998.

[10]D. P. Mukherjee, S. Maitra, S.T. Acton. Spatial domain digital watermarking of multimedia objects for buyer authentication. IEEE Transactions on Multimedia,2004(6): 1-15. 

[11]N. Nikolaidis, I. Pitas. Robust image watermarking in the spatial domain. Signal Processing, 1998(66): 385-403.

[12]Jiwu Huang, Yun Q. Shi, Yi Shi, Embedding image watermarks in DC components, IEEE Trans. on Circuits and Systems for Video Technology, 2000, 10(6): 974-979

[13]Shinfeng D. Lin, Chin-Feng Chen, A robust DCT-based watermarking for copyright protection, IEEE Trans. Consumer Electron. 2000, 46(3): 415-421.

[14]C.-S. Lu, S.-K. Huang, C.-J. Sze, H.Y.M. Liao, Cocktail watermarking for digital image protection, IEEE Trans. Multimedia, 2000(2): 209-224. 

[15]Zne-Jung Lee, Shih-Wei Lin, Shun-Feng Su, Chun-Yen Lin, A hybrid watermarking technique applied to digital images. Applied Soft Computing 8 (2008), pp. 798–808.

[16]Dawei Zhao, Guanrong Chen, Wenbo Liu, A chaos-based robust wavelet-domain watermarking algorithm, Chaos, Solitons and Fractals, 2004(22): 47-54.

[17]Chin-Chen Chang, Yih-Shin Hu, Tzu-Chuen Lu, A watermarking-based image ownership and tampering authentication scheme. Pattern Recognition Letters, 2006(27): 439-446.

[18]Bum-Soo Kima et al. Robust digital image watermarking method against geometrical attacks. Real-Time Imaging, 2003(9): 139-149.

[19]Wei-Hung Lin, Yuh-Rau Wang, Yuh-Rau Wang, A wavelet-tree-based watermarking method using distance vector of binary cluster, Expert Systems with Applications, 2009, 36 (6): 9869-9878.

[20]Ruisong Ye, Huiliang Li, A novel image scrambling and watermarking scheme based on cellular automata, In: Proceedings of the 2008 International Symposium on Electronic Commerce and Security, Guangzhou, 2008, pp. 938-941

[21]Ruisong Ye, A novel digital image scrambling and watermarking scheme based on orbits of Arnold transform, In: Proceedings of the 2009 Pacific-Asia Conference on Circuits, Communications and System, 485-488, 2009

[22]Liehuang Zhu, Wenzhuo Li, Lejian Liao, Hong Li, A Novel Image Scrambling Algorithm for Digital Watermarking Based on Chaotic Sequences , International Journal of Computer Science and Network Security, 2006,6 (8B).

[23]Dong-xu Qi, Jian-cheng Zou, Xiao-you Han, A new class of scrambling transformation and its application in the image information covering, Science in China (Series E), 2000, 43(3): 304-312.

[24]Guanrong Chen, Yaobin Miao, and Charles K. Chui, A symmetric image encryption scheme based on chaotic cat maps, Chaos, Solitons and Fractals, 2004(21): 749-761.

[25]J. Fridrich, Symmetric ciphers based on wo-dimensional chaotic maps, Int. J. Bifurcat. Chaos, 1998, 8(6): 1259-1284.

[26]Yaobin Mao, Guanrong Chen, Shiguo Lian, A Novel Fast Image Encryption Scheme Based On 3D Chaotic Baker Maps, International Journal of Bifurcation and Chaos, 2004, 14 (10): 3613-3624.

[27]Pei Wang, A Blind Wavelet-based Watermarking with Robust for Image Cropping, Journal of Electronics & Information Technology, 2005, 27 (7): 1039-1042. 

[28]R. Clark Robinson, An Introduction to Dynamical Systems, Continuous and Discrete, Prentice Hall, 2004.Tan Zhiming. Research on Graph Theory Based Image Segmentation and Its Embedded Application Shanghai: Dissertation of Shanghai Jiao Tong University, 2007, 14-24.