FOREX Press I. J. of Electrical & Electronics Research
Support Open Access

Research Article |

CNN-Guided Dual-Chaotic Encryption and Wavelet Domain Embedding for Robust and Adaptive Image Watermarking

Author(s): Prof. Ajit Singh1, and Rajni1*

Publisher : FOREX Publication

Published : 30 March 2026

e-ISSN : 2347-470X

Page(s) : 176-185




Prof. Ajit Singh, Department of Computer Science and Engineering, Bhagat Phool Singh Women University, Khanpur Kalan, Haryana, India; Email: bpsmv.ajit@gmail.com

Rajni, Department of Computer Science and Engineering, Bhagat Phool Singh Women University, Khanpur Kalan, Haryana, India; Email: rajnipreety@gmail.com

    [1] Safnaz and B. Pilar, “A comprehensive review of watermark detection and recognition techniques: challenges, applications, and future perspectives,” Mar. 2024, doi: 10.58532/v3bfai1p2ch7.
    [2] J. Bi and J. Han, “Application of Multimedia Watermarking Technology in the Field of Information Security,” Academic journal of science and technology, Mar. 2024, doi: 10.54097/zvce3e79.
    [3] H. Chaudhary and V. P. Vishwakarma, “Digital image watermarking recent trends and techniques: A survey,” Journal of Information and Optimization Sciences, Jan. 2024, doi: 10.47974/jios-1627.
    [4] B. Shukla et al., “Techniques for Digital Image Watermarking: A Review,” Jan. 2024, doi: 10.1007/978-981-99-9562-2_25.
    [5] S. Kumar et al., “Digital Image Watermarking,” International Journal of Innovative Research in Advanced Engineering, Dec. 2024, doi: 10.26562/ijirae.2024.v1112.04.
    [6] M. Gosul and N. Gandhewar, “A Wavelet Based Digital Image Watermarking Technique through Encryption with DCT,” IJERCSE, Sep. 2022, doi: 10.36647/ijercse/09.09.art016.
    [7] S. P. Ambadekar et al., “Digital Image Watermarking Through Encryption and DWT for Copyright Protection,” Jan. 2019, doi: 10.1007/978-981-10-8863-6_19.
    [8] M. K. A. Razak et al., “A Review on Digital Image Watermarking with Cryptosystem Techniques,” Apr. 2021, doi: 10.1109/ISCAIE51753.2021
    [9] W. Wan, J. Wang, J. Zhang, Y. Li, "Watermarking schemes for digital images: Robustness overview," Signal Processing: Image Communication, vol. 100, 2022.
    [10] L. Zhong, M. Guan, X. Deng, Y. Tang, "A comprehensive survey on deep learning-based image watermarking," Neurocomputing, vol. 501, pp. 1-15, 2023.
    [11] Y. Liu, S. Tang, R. Liu, L. Zhang, Z. Ma, "Secure and robust digital image watermarking scheme using logistic and RSA encryption," Expert Systems with Applications, vol. 97, pp. 95-105, May 2018.
    [12] V. Kamra, A. Jain, S. Singh, "Lightweight cryptographic watermarking scheme with chaotic mapping for IoT applications," International Journal of Network Security, vol. 23, no. 5, pp. 851-862, 2021.
    [13] A. Ray, S. Roy, "Recent trends in image watermarking techniques for copyright protection: A survey," International Journal of Multimedia Information Retrieval, vol. 9, no. 4, pp. 249-270, 2020.
    [14] S. N. Das and M. Panda, "Secure digital image watermarking technique based on ResNet-50 architecture," Intell. Automat. Soft Comput., vol. 39, no. 6, pp. 1073–1100, 2024.
    [15] R. Xiang, G. Liu, M. Dang, Q. Wang, and R. Pan, "A trusted medical image zero-watermarking scheme based on DCNN and hyperchaotic system," IEEE J. Biomed. Health Informatics, vol. 29, no. 6, pp. 4241–4253, 2025

Ajit Singh, Rajni (2026), CNN-Guided Dual-Chaotic Encryption and Wavelet Domain Embedding for Robust and Adaptive Image Watermarking. IJEER 14(1), 176-185. DOI: 10.37391/IJEER.140119.