Definition 2. The set B denoting {0, 1}, let f :
B
N
−→ B
N
be a function and S ∈ S be a strategy.
Then, the so-called chaotic iterations are defined by
x
0
∈ B
N
and ∀n ∈ N
∗
, ∀i ∈ J1;NK,
x
n
i
=
x
n−1
i
if S
n
6= i
f(x
n−1
)
S
n
if S
n
= i.
(1)
3 A NEW CHAOS-BASED
WATERMARKING
ALGORITHM
3.1 Most and Least Significant
Coefficients
Let us first introduce the definitions of most and least
significant coefficients of an image.
Definition 3. For a given image, the most significant
coefficients (in short MSCs), are coefficients that al-
low the description of the relevant part of the image,
i.e. its most rich part (in terms of embedding informa-
tion), through a sequence of bits.
For example, in a spatial description of a grayscale
image, a definition of MSCs can be the sequence con-
stituted by the first three bits of each pixel.
Definition 4. By least significant coefficients (LSCs),
we mean a translation of some insignificant parts of a
medium in a sequence of bits (insignificant can be un-
derstand as: “which can be altered without sensitive
damages”).
The LSCs are used during the embedding stage:
some of the least significant coefficients of the carrier
image will be chaotically chosen and replaced by the
bits of the (possibly mixed) watermark.
The MSCs are only useful in case of authentica-
tion, mixture and embedding stages will then depend
on them. Hence, a coefficient should not be defined
at the same time both as a MSC and a LSC: the LSC
can be altered, while the MSC is needed to extract the
watermark (in case of authentication).
3.2 Stages of the Algorithm
Our watermarking scheme consists of two classical
stages: the mixture of the watermark and its embed-
ding into a cover image.
3.2.1 Watermark Mixture
For security reasons, the watermark can be mixed be-
fore its embedding. A common way to achieve this
stage is to use the bitwise exclusive or (XOR), for
example, between the watermark and a logistic map.
In this paper, we will introduce a mixture scheme
based on chaotic iterations. Its chaotic strategy will
be highly sensitive to the MSCs, in case of an authen-
ticated watermark (Bahi and Guyeux, 2010). For the
details of this stage see the Paragraph 4.1.2 in Section
4.
3.2.2 Watermark Embedding
This stage can be done either by applying the logical
negation of some LSCs, or by replacing them by the
bits of the possibly mixed watermark.
To choose the sequence of LSCs to be changed,
a number of integers, less than or equals to the num-
ber N of LSCs, corresponding to a chaotic sequence
U
k
k
, is generated from the chaotic strategy used in
the mixture stage and possibly the watermark. Thus,
the U
k
− th least significant coefficient of the carrier
image is either switched, or substituted by the k
th
bit
of the possibly mixed watermark. In case of authenti-
cation, such a procedure leads to a choice of the LSCs
which are highly dependent on the MSCs.
On the one hand, when the switch is chosen, the
watermarked image is obtained from the original im-
age, whose LSCs L = B
N
are replaced by the result of
some chaotic iterations. Here, the iterate function is
the vectorial boolean negation, defined by f
0
: B
N
−→
B
N
, (x
1
, . . . , x
N
) 7−→ (x
1
, . . . , x
N
), the initial state is L
and strategy is equal to
U
k
k
. In this case, it is pos-
sible to prove that the whole embedding stage satis-
fies topological chaos properties (Bahi and Guyeux,
2010), but the original medium is needed to extract
the watermark.
On the other hand, when the selected LSCs are
substituted by the watermark, its extraction can be
done without the original cover. In this case, the se-
lection of LSCs still remains chaotic, because of the
use of a chaotic map, but the whole process does not
satisfy topological chaos (Bahi and Guyeux, 2010):
the use of chaotic iterations is reduced to the mixture
of the watermark. See the Paragraph 4.1.3 in Section
4 for more details.
3.2.3 Extraction
The chaotic sequence U
k
can be regenerated, even in
the case of an authenticated watermarking: the MSCs
have not been changed during the stage of embedding
watermark. Thus, the altered LSCs can be found. So,
SECRYPT 2010 - International Conference on Security and Cryptography
456