DIGITAL WATERMARKING USING CHAOTIC MAPS
DOI:
https://doi.org/10.26906/SUNZ.2025.2.203Keywords:
chaotic maps, algorithm, cyber threats, image, steganography, protection, watermarksAbstract
In today's digital environment, the issues of copyright protection and information security are becoming increasingly important. One of the effective methods for protecting multimedia content is digital watermarking technology, which enables the identification and tracking of unauthorized use of digital files. At the same time, traditional watermarking methods have certain drawbacks, which encourages the search for new solutions. The aim of this research is to develop a method for implementing digital watermarks using chaotic maps, in order to enhance the resilience of watermarks against tampering and alterations. The subject of the research is the methods and technologies of digital watermarking (steganography) that utilize chaotic maps to improve the reliability, security, and invisibility of embedded information within digital objects. The object of the research is digital images (or multimedia objects) to which a watermark is applied using chaotic map-based algorithms, ensuring copyright protection, authentication, and data integrity. To achieve the set goal, the following tasks were undertaken: an analysis of key digital watermarking methods, an examination of the characteristics of chaotic maps and their potential in watermark creation, and a review of an algorithm for embedding digital watermarks using chaotic maps. This work explores the theoretical foundations of digital watermarking, analyzes existing embedding methods, and thoroughly investigates the potential application of chaotic maps in this domain. A methodology for using chaotic maps to generate keys and embed watermarks is proposed. The strengths and weaknesses of this approach are analyzed, and prospects for future research in this area are outlined.Downloads
References
1. Anderson, Ross J. Security engineering: a guide to building dependable distributed systems. John Wiley & Sons, 2010. url:https://www.cl.cam.ac.uk/archive/rja14/book.html
2. Diffie, Whitfield, and Martin E. Hellman. "New directions in cryptography." Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman. 2022. 365-390. doi: https://doi.org/10.1145/3549993.355000
3. J. Chen and B. C. Schafer, "Watermarking of Behavioral IPs: A Practical Approach," 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), Grenoble, France, 2021, pp. 1266-1271, doi: 10.23919/DATE51398.2021.9474071.
4. Kadian, P., Arora, S.M. & Arora, N. Robust Digital Watermarking Techniques for Copyright Protection of Digital Data: A Survey. Wireless Pers Commun 118, 3225–3249 (2021). doi: https://doi.org/10.1007/s11277-021-08177-w
5. Lawnik, M.; Berezowski, M. New Chaotic System: M-Map and Its Application in Chaos-Based Cryptography. Symmetry 2022, 14, 895. doi: https://doi.org/10.3390/sym14050895
6. Shih, Frank Y. Digital watermarking and steganography: fundamentals and techniques. CRC press, 2017. doi: https://doi.org/10.1201/9781315121109
7. Cox, Ingemar J., et al. "A review of watermarking principles and practices 1." Digital signal processing for multimedia systems (2018): 461-485. url: http://www.wirelesscommunication.nl/wireless/articles/98_bookchapterwatermarking.pdf
8. Hamadi, S. J., & Emad A. Mohammed. (2024). Chaotic Systems in Cryptography: An Overview of Feature-Based Methods. AlSalam Journal for Engineering and Technology, 4(1), 164–172. doi: https://doi.org/10.55145/ajest.2025.04.01.016
9. Zhang, B.; Liu, L. Chaos-Based Image Encryption: Review, Application, and Challenges. Mathematics 2023, 11, 2585. doi:https://doi.org/10.3390/math11112585
10. Menezes, Alfred J., Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of applied cryptography. CRC press, 2018. doi: https://doi.org/10.1201/9780429466335
11. Aberna, P., Agilandeeswari, L. Digital image and video watermarking: methodologies, attacks, applications, and future directions. Multimed Tools Appl 83, 5531–5591 (2024). https://doi.org/10.1007/s11042-023-15806-y
12. Naik, R.B., Singh, U. A Review on Applications of Chaotic Maps in Pseudo-Random Number Generators and Encryption. Ann. Data. Sci. 11, 25–50 (2024). https://doi.org/10.1007/s40745-021-00364-7
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Anton Shandyba, Vitalii Sitnikov, Alexey Nikolayev, Denis Kibirev

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.