[Retracted] A Robust Image Encrypted Watermarking Technique for Neurodegenerative Disorder Diagnosis and Its Applications
Table 1
(a) Comparative analysis of existing transform techniques
Domain transform techniques
Robustness
Complexity
Transient signal changes
Edge adaptive transform
Real-time application
LSB
✗
✗
✗
✗
✗
DWT
✓
✓
✓
✗
✓
DCT
✓
✓
✓
✗
✓
DFT
✓
✓
✓
✗
✓
SVD
✓
✓
✓
✗
✓
GBT
✓
✓
✓
✓
✓
(b) Various encryption and security techniques used in watermarking
SNO
Name
Functionality
1.
Transposition cipher
This type of cipher comes in the category of simple encryption, where the shifting of plain texts is done in some regular pattern to form the ciphertext
2.
Rail-fence cipher
It is a form of transposition cipher where plain text is scrambled more straightforwardly, and alphabets are written in a zig-zag manner where individual rows are combined to form the ciphertext
3.
AES
It is termed as advanced encryption standard. It is a cipher used to protect classified data and is used on both hardware and software to encrypt sensitive data
4.
DES
It is known as data encryption standard. It is a cipher that is used to encrypt data in blocks of size 64 bits each
5.
RSA
It is known as Rivest–Shamir–Adleman. It is used for specific security services that enable public-key encryption to secure sensitive data
6.
Triple DES
3DES is an enhancement of DES; it has 64-bit block size with 192-bit key size. It is the same as DES but is applied three times more to get more encryption
7.
Hyperchaotic encryption
The hyper chaotic encryption is a modified encryption standard applied to images. It works on predefined values