Preprint Article Version 2 Preserved in Portico This version is not peer-reviewed

Exploring Cellular Automata Learning: An Innovative Approach for Secure and Imperceptible Digital Image Watermarking

Version 1 : Received: 24 November 2023 / Approved: 24 November 2023 / Online: 27 November 2023 (03:10:55 CET)
Version 2 : Received: 12 March 2024 / Approved: 12 March 2024 / Online: 12 March 2024 (14:27:28 CET)

How to cite: Khurshid Bhat, I.; Qadir, F.; Neshat, M.; Gandomi, A.H. Exploring Cellular Automata Learning: An Innovative Approach for Secure and Imperceptible Digital Image Watermarking. Preprints 2023, 2023111615. https://doi.org/10.20944/preprints202311.1615.v2 Khurshid Bhat, I.; Qadir, F.; Neshat, M.; Gandomi, A.H. Exploring Cellular Automata Learning: An Innovative Approach for Secure and Imperceptible Digital Image Watermarking. Preprints 2023, 2023111615. https://doi.org/10.20944/preprints202311.1615.v2

Abstract

As technology and multimedia production have advanced, there has been a significant rise in attacks on digital media, resulting in duplicated, fraudulent, and altered data and the infringement of copyright laws. This paper presents a robust and secure digital image watermarking technique that has been implemented in the spatial domain and exploits the erratic and chaotic behaviour of the powerful elementary cellular automata rule-30. The crucial characteristics of the watermarking system, i.e., imperceptibility, capacity, and robustness, have been perfectly balanced by the suggested blind watermarking technique. In this approach, prior to embedding, the grayscale watermark image is downsized to its two Most Significant Bits (MSBs). Then, the 2-MSBs watermark is encrypted using an ECA rule-30 so as to level up the security attribute of the system. Then, the host image is scrambled using ECA rule-30 to distribute the watermark pixels throughout the host image and thus achieve the highest robustness against geometrical attacks. Finally, the encrypted watermark data is embedded into the scrambled host image using the ECA rule-30-based embedding key. The proposed method performs better in terms of imperceptibility, capacity, and robustness when compared to several systems with similar competencies. The simulation's findings demonstrate strong imperceptibility as evaluated by the Peak Signal-to-Noise Ratio (PSNR), which has an average value of 58.3735 dB and a high payload. The experimental outcomes, observed across a diverse range of standardized attack scenarios, unequivocally establish the ascendancy of the proposed algorithm over competing methodologies in the realm of image watermarking.

Keywords

Watermarking algortihms; Elementary Cellular Automata; Rule-30; Security; Copyright Protection; Authentication; Robustness

Subject

Computer Science and Mathematics, Computer Vision and Graphics

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.