Hybrid Reversible Digital Image Processing Using Fibonacci-Pell-Based Encryption and Transform Domain Techniques
DOI:
https://doi.org/10.32628/CSEIT251112142Keywords:
Hybrid Reversible Watermarking, Fibonacci-Pell-Based Image Encryption, Integer Wavelet Transform (IWT), Singular Value Decomposition (SVD) Embedding, Secure Medical Image AuthenticationAbstract
Reverse watermarking in image digital processing is now essential where high-fidelity image reconstruction and authentication are required, like in medical imaging and archiving in a legal setting. The current paper proposes the latest innovative hybrid watermarking algorithm that combines Integer Wavelet Transform (IWT) and Singular Value Decomposition (SVD) to a dual layer of the Fibonacci and Pell numbers based encryption algorithm. The watermark is then encrypted with a two-layer XOR process to provide a little upgrade in security against illegitimate extraction due to the deterministic behaviour of the Fibonacci and Pell sequences. The encrypted watermark is spread in the host image's low-frequency sub-bands through multi-level IWT and SVD, making it imperceptible and robust. Using an experimental setup, it has been proved that the existing methods do not perform well; therefore, the proposed scheme is highly efficient compared to the existing techniques in some of the critical parameters such as Peak Signal-to-Noise Ratio (PSNR), Structural Similarity Index (SSIM), and Normalized Correlation Coefficient (NCC). The original image and the watermark can also be retrieved without loss, demonstrating the system's complete reversibility. The tradeoff of this hybrid model consists of increased resistance to typical attacks on images in the processing domain, combined with conservation of image quality. These factors can be used in secure and reversible watermarking.
📊 Article Downloads
References
Alshoura, W. H., Zainol, Z., Teh, J. S., & Alawida, M. (2022). An FPP-resistant SVD-based image watermarking scheme based on chaotic control. Alexandria Engineering Journal, 61(7), 5713–5734. https://doi.org/10.1016/j.aej.2021.10.052
Alshoura, W. H., Zainol, Z., Teh, J. S., & Alawida, M. (2022). An FPP-resistant SVD-based image watermarking scheme based on chaotic control. Alexandria Engineering Journal, 61(7), 5713–5734. https://doi.org/10.1016/j.aej.2021.10.052 DOI: https://doi.org/10.1016/j.aej.2021.10.052
Chen, X., Zou, M., Yang, B., Wang, Z., Wu, N., & Qi, L. (2021). A visually secure image encryption method based on integer wavelet transform and rhombus prediction. Mathematical Biosciences and Engineering, 18(2), 1722–1739. https://doi.org/10.3934/mbe.2021089 DOI: https://doi.org/10.3934/mbe.2021089
Chen, Y., Xie, S., & Zhang, J. (2022). A Hybrid Domain Image Encryption Algorithm Based on Improved Henon Map. Entropy, 24(2). https://doi.org/10.3390/e24020287
Chen, Y., Xie, S., & Zhang, J. (2022). A Hybrid Domain Image Encryption Algorithm Based on Improved Henon Map. Entropy, 24(2). https://doi.org/10.3390/e24020287 DOI: https://doi.org/10.3390/e24020287
Huang, X., Dong, Y., Zhu, H., & Ye, G. (2022). Visually asymmetric image encryption algorithm based on SHA-3 and compressive sensing by embedding encrypted image. Alexandria Engineering Journal, 61(10), 7637–7647. https://doi.org/10.1016/j.aej.2022.01.015 DOI: https://doi.org/10.1016/j.aej.2022.01.015
Huo, D., Qiu, Y., Han, C., Wei, L., Hong, Y., Zhu, Z., & Zhou, X. (2023). A visually meaningful double-image encryption scheme using 2D compressive sensing and multi-rule DNA encoding. Complex and Intelligent Systems, 9(5), 4783–4803. https://doi.org/10.1007/s40747-023-00989-6
Huo, D., Qiu, Y., Han, C., Wei, L., Hong, Y., Zhu, Z., & Zhou, X. (2023). A visually meaningful double-image encryption scheme using 2D compressive sensing and multi-rule DNA encoding. Complex and Intelligent Systems, 9(5), 4783–4803. https://doi.org/10.1007/s40747-023-00989-6 DOI: https://doi.org/10.1007/s40747-023-00989-6
Ishtiaq, M., Ali, W., Shahzad, W., Jaffar, M. A., & Nam, Y. (2018). Hybrid Predictor Based Four-Phase Adaptive Reversible Watermarking. IEEE Access, 6, 13213–13230. https://doi.org/10.1109/ACCESS.2018.2803301 DOI: https://doi.org/10.1109/ACCESS.2018.2803301
Jafari Barani, M., Ayubi, P., Yousefi Valandar, M., & Yosefnezhad Irani, B. (2020). A blind video watermarking algorithm robust to lossy video compression attacks based on generalized Newton complex map and contourlet transform. Multimedia Tools and Applications, 79(3–4), 2127–2159. https://doi.org/10.1007/s11042-019-08225-5 DOI: https://doi.org/10.1007/s11042-019-08225-5
Juvvanapudi, S. R. V., Kumar, P. R., & Reddy, K. V. V. S. (2024). Hybrid chaotic map with L-shaped fractal Tromino for image encryption and decryption. International Journal of Electrical and Computer Engineering, 14(1), 389–397. https://doi.org/10.11591/ijece.v14i1.pp389-397 DOI: https://doi.org/10.11591/ijece.v14i1.pp389-397
Khare, P., & Srivastava, V. K. (2021). A novel dual image watermarking technique using homomorphic transform and DWT. Journal of Intelligent Systems, 30(1), 297–311. https://doi.org/10.1515/jisys-2019-0046 DOI: https://doi.org/10.1515/jisys-2019-0046
Liu, J., Huang, J., Luo, Y., Cao, L., Yang, S., Wei, D., & Zhou, R. (2019). An Optimized Image Watermarking Method Based on HD and SVD in DWT Domain. IEEE Access, 7, 80849–80860. https://doi.org/10.1109/ACCESS.2019.2915596 DOI: https://doi.org/10.1109/ACCESS.2019.2915596
Luo, Y., Du, M., & Liu, J. (2015). A symmetrical image encryption scheme in wavelet and time domain. Communications in Nonlinear Science and Numerical Simulation, 20(2), 447–460. https://doi.org/10.1016/j.cnsns.2014.05.022 DOI: https://doi.org/10.1016/j.cnsns.2014.05.022
Rosiyadi, D., Basuki, A. I., Ramdhani, T. I., Susanto, H., & Siregar, Y. H. (2023). Approximation-based homomorphic encryption for secure and efficient blockchain-driven watermarking service. International Journal of Electrical and Computer Engineering, 13(4), 4388–4400. https://doi.org/10.11591/ijece.v13i4.pp4388-4400 DOI: https://doi.org/10.11591/ijece.v13i4.pp4388-4400
Sedik, A., El-Latif, A. A. A., Wani, M. A., El-Samie, F. E. A., Bauomy, N. A. S., & Hashad, F. G. (2023). Efficient Multi-Biometric Secure-Storage Scheme Based on Deep Learning and Crypto-Mapping Techniques. Mathematics, 11(3). https://doi.org/10.3390/math11030703 DOI: https://doi.org/10.3390/math11030703
Selvam, P., Balachandran, S., Pitchai Iyer, S., & Jayabal, R. (2017). Hybrid transform based reversible watermarking technique for medical images in telemedicine applications. Optik, 145, 655–671. https://doi.org/10.1016/j.ijleo.2017.07.060 DOI: https://doi.org/10.1016/j.ijleo.2017.07.060
Thanki, R., Borra, S., Dwivedi, V., & Borisagar, K. (2017). A steganographic approach for secure communication of medical images based on the DCT-SVD and the compressed sensing (CS) theory. Imaging Science Journal, 65(8), 458–468. https://doi.org/10.1080/13682199.2017.1367129 DOI: https://doi.org/10.1080/13682199.2017.1367129
Yasmeen, F., & Uddin, M. S. (2021). An Efficient Watermarking Approach Based on LL and HH Edges of DWT–SVD. SN Computer Science, 2(2). https://doi.org/10.1007/s42979-021-00478-y DOI: https://doi.org/10.1007/s42979-021-00478-y
Zhu, L., Song, H., Zhang, X., Yan, M., Zhang, T., Wang, X., & Xu, J. (2020). A robust meaningful image encryption scheme based on block compressive sensing and SVD embedding. Signal Processing, 175. https://doi.org/10.1016/j.sigpro.2020.107629 DOI: https://doi.org/10.1016/j.sigpro.2020.107629
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Scientific Research in Computer Science, Engineering and Information Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.