{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T18:07:39Z","timestamp":1771524459028,"version":"3.50.1"},"reference-count":38,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["42101420"],"award-info":[{"award-number":["42101420"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Symmetries and symmetry-breaking play significant roles in data security. While remote sensing images, being extremely sensitive geospatial data, require protection against tampering or destruction, as well as assurance of the reliability of the data source during application. In view of the increasing complexity of data security of remote sensing images, a single watermark algorithm is no longer adequate to meet the demand of sophisticated applications. Therefore, this study proposes a dual watermarking algorithm that considers both integrity authentication and copyright protection of remote sensing images. The algorithm utilizes Discrete Wavelet Transform (DWT) to decompose remote sensing images, then constructs integrity watermark information by applying Chebyshev mapping to the mean of horizontal and vertical components. This semi-fragile watermark information is embedded into the high-frequency region of DWT using Quantization Index Modulation (QIM). On the other hand, the robust watermarking uses entropy to determine the embedding position within the DWT domain. It combines the stability of Singular Value Decomposition (SVD) and embeds the watermark according to the relationship between the singular values of horizontal, vertical, and high-frequency components. The experiment showed that the proposed watermarking successfully maintains a high level of invisibility even if embedded with dual watermarks. The semi-fragile watermark can accurately identify tampered regions in remote sensing images under conventional image processing. Moreover, the robust watermark exhibits excellent resistance to various attacks such as noise, filtering, compression, panning, rotating, and scaling.<\/jats:p>","DOI":"10.3390\/sym16080969","type":"journal-article","created":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T15:26:53Z","timestamp":1722526013000},"page":"969","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Chebyshev Chaotic Mapping and DWT-SVD-Based Dual Watermarking Scheme for Copyright and Integrity Authentication of Remote Sensing Images"],"prefix":"10.3390","volume":"16","author":[{"given":"Jie","family":"Zhang","sequence":"first","affiliation":[{"name":"College of Geography Science and Geomatics Engineering, Suzhou University of Science and Technology, Suzhou 215009, China"}]},{"given":"Jinglong","family":"Du","sequence":"additional","affiliation":[{"name":"College of Geography Science and Geomatics Engineering, Suzhou University of Science and Technology, Suzhou 215009, China"}]},{"given":"Xu","family":"Xi","sequence":"additional","affiliation":[{"name":"College of Geography Science and Geomatics Engineering, Suzhou University of Science and Technology, Suzhou 215009, China"}]},{"given":"Zihao","family":"Yang","sequence":"additional","affiliation":[{"name":"College of Geography Science and Geomatics Engineering, Suzhou University of Science and Technology, Suzhou 215009, China"}]}],"member":"1968","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"125274","DOI":"10.1109\/ACCESS.2020.3007689","article-title":"Screen-cam robust and blind watermarking for tile satellite images","volume":"8","author":"Chen","year":"2020","journal-title":"IEEE Access"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"2218","DOI":"10.1109\/TGRS.2008.2010404","article-title":"Active learning methods for remote sensing image classification","volume":"47","author":"Tuia","year":"2009","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.rse.2012.09.005","article-title":"Spatial analysis of remote sensing image classification accuracy","volume":"127","author":"Comber","year":"2012","journal-title":"Remote Sens. Environ."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1951","DOI":"10.1109\/TMM.2020.3006415","article-title":"An automated and robust image watermarking scheme based on deep neural networks","volume":"23","author":"Zhong","year":"2020","journal-title":"IEEE Trans. Multimed."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.neucom.2022.02.083","article-title":"A comprehensive survey on robust image watermarking","volume":"488","author":"Wan","year":"2022","journal-title":"Neurocomputing"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Faheem, Z.B., Ishaq, A., Rustam, F., de la Torre D\u00edez, I., Gavilanes, D., Vergara, M.M., and Ashraf, I. (2023). Image watermarking using least significant bit and canny edge detection. Sensors, 23.","DOI":"10.3390\/s23031210"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1109\/JSTARS.2023.3329022","article-title":"High-Resolution Remote Sensing Image Zero-Watermarking Algorithm Based on Blockchain and SDAE","volume":"17","author":"Xu","year":"2023","journal-title":"IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Zhang, J., Chen, D., Liao, J., Ma, Z., Fang, H., Zhang, W., Feng, H., Hua, G., and Yu, N. (2024). Robust Model Watermarking for Image Processing Networks via Structure Consistency. IEEE Trans. Pattern Anal. Mach. Intell., 1\u20138.","DOI":"10.1109\/TPAMI.2024.3381543"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Azizoglu, G., and Toprak, A.N. (2023). A novel reversible fragile watermarking method in DWT domain for tamper localization and digital image authentication. Biomed. Signal Process. Control, 84.","DOI":"10.1016\/j.bspc.2023.105015"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"10269","DOI":"10.1109\/ACCESS.2018.2799240","article-title":"Secure and robust fragile watermarking scheme for medical images","volume":"6","author":"Shehab","year":"2018","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"168018","DOI":"10.1016\/j.ijleo.2021.168018","article-title":"Remote sensing image watermarking based on motion blur degeneration and restoration model","volume":"248","author":"Zhu","year":"2021","journal-title":"Optik"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1007\/s11082-023-04784-y","article-title":"A novel robust and more secure blind image watermarking for optical remote sensing using dwt-svd and chaotic maps","volume":"55","author":"Heidari","year":"2023","journal-title":"Opt. Quantum Electron."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"108783","DOI":"10.1016\/j.compeleceng.2023.108783","article-title":"An efficient fragile watermarking scheme for tamper localization in satellite images","volume":"109","author":"Shivani","year":"2023","journal-title":"Comput. Electr. Eng."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/TMM.2005.861293","article-title":"New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization","volume":"8","author":"Maeno","year":"2006","journal-title":"IEEE Trans. Multimed."},{"key":"ref_15","first-page":"192","article-title":"An adaptive watermarking for remote sensing images based on maximum entropy and discrete wavelet transformatio","volume":"18","author":"Hua","year":"2024","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Zhang, X., Yan, H., Zhang, L., and Wang, H. (2020). High-resolution remote sensing image integrity authentication method considering both global and local features. ISPRS Int. J. Geo-Inf., 9.","DOI":"10.3390\/ijgi9040254"},{"key":"ref_17","first-page":"19","article-title":"A digital watermarking algorithm based on QR code and quantization DCT for remote sensing image","volume":"33","author":"Wang","year":"2017","journal-title":"Geogr. Geo-Inf. Sci."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Devi, K.J., Singh, P., Dash, J.K., Thakkar, H.K., Santamar\u00eda, J., Krishna, M.V.J., and Romero-Manchado, A. (2022). A new robust and secure 3-level digital image watermarking method based on G-BAT hybrid Optimization. Mathematics, 10.","DOI":"10.3390\/math10163015"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"88","DOI":"10.23919\/JCC.2020.04.009","article-title":"Digital watermarking secure scheme for remote sensing image protection","volume":"17","author":"Yuan","year":"2020","journal-title":"China Commun."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"26813","DOI":"10.1007\/s11042-021-10886-0","article-title":"Semi-fragile watermarking scheme based on perceptual hash function (PHF) for image tampering detection","volume":"80","author":"Rhayma","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Senol, A., Elbasi, E., Topcu, A.E., and Mostafa, N. (2023). A Semi-Fragile, Inner-Outer Block-Based Watermarking Method Using Scrambling and Frequency Domain Algorithms. Electronics, 12.","DOI":"10.3390\/electronics12041065"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"863","DOI":"10.1007\/s12559-019-09700-9","article-title":"An effective semi-fragile watermarking method for image authentication based on lifting wavelet transform and feed-forward neural network","volume":"12","author":"Taherinia","year":"2020","journal-title":"Cogn. Comput."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1047","DOI":"10.1109\/TCSVT.2016.2633878","article-title":"Blind dual watermarking for color images\u2019 authentication and copyright protection","volume":"28","author":"Liu","year":"2016","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1701","DOI":"10.1007\/s10489-020-01903-0","article-title":"An intelligent and blind dual color image watermarking for authentication and copyright protection","volume":"51","author":"Ahmadi","year":"2021","journal-title":"Appl. Intell."},{"key":"ref_25","unstructured":"Tzouveli, P., Ntalianis, K., and Kollias, S. (2006, January 21\u201323). Video object watermarking using Hu moments. Proceedings of the 13th International Conference on Systems, Signals and Image Processing IWSSIP\u201906, Budapest, Hungary."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"7858","DOI":"10.1016\/j.eswa.2014.06.011","article-title":"Optimized gray-scale image watermarking using DWT\u2013SVD and Firefly Algorithm","volume":"41","author":"Mishra","year":"2014","journal-title":"Expert Syst. Appl."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1755","DOI":"10.1016\/j.jfranklin.2021.11.027","article-title":"Robust image watermarking algorithm based on QWT and QSVD using 2D Chebyshev-Logistic map","volume":"359","author":"Zhang","year":"2022","journal-title":"J. Frankl. Inst."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Khafaga, D.S., Karim, F.K., Darwish, M.M., and Hosny, K.M. (2022). Robust zero-watermarking of color medical images using multi-channel Gaussian-Hermite moments and 1D Chebyshev chaotic map. Sensors, 22.","DOI":"10.3390\/s22155612"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1016\/j.jvcir.2015.05.006","article-title":"A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization","volume":"30","author":"Qi","year":"2015","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"105515","DOI":"10.1016\/j.cageo.2023.105515","article-title":"A hybrid domain-based watermarking for vector maps utilizing a complementary advantage of discrete fourier transform and singular value decomposition","volume":"183","author":"Qu","year":"2024","journal-title":"Comput. Geosci."},{"key":"ref_31","first-page":"8455","article-title":"A blind dual color images watermarking based on singular value decomposition","volume":"219","author":"Su","year":"2013","journal-title":"Appl. Math. Comput."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"32931","DOI":"10.1109\/ACCESS.2021.3060861","article-title":"Hybrid SVD-based image watermarking schemes: A review","volume":"9","author":"Zainol","year":"2021","journal-title":"IEEE Access"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.ins.2020.11.020","article-title":"Double-encrypted watermarking algorithm based on cosine transform and fractional Fourier transform in invariant wavelet domain","volume":"551","author":"Li","year":"2021","journal-title":"Inf. Sci."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"5-es","DOI":"10.1145\/1242471.1242473","article-title":"A survey of RST invariant image watermarking algorithms","volume":"39","author":"Zheng","year":"2007","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2020\/8840779","article-title":"A novel comprehensive watermarking scheme for color images","volume":"2020","author":"Duan","year":"2020","journal-title":"Secur. Commun. Netw."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"80849","DOI":"10.1109\/ACCESS.2019.2915596","article-title":"An optimized image watermarking method based on HD and SVD in DWT domain","volume":"7","author":"Liu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1016\/j.eswa.2011.07.059","article-title":"An improved SVD-based watermarking technique for copyright protection","volume":"39","author":"Run","year":"2012","journal-title":"Expert Syst. Appl."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/j.ins.2020.01.019","article-title":"An improved SVD-based blind color image watermarking algorithm with mixed modulation incorporated","volume":"519","author":"Hu","year":"2020","journal-title":"Inf. Sci."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/16\/8\/969\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T15:26:51Z","timestamp":1760110011000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/16\/8\/969"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":38,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2024,8]]}},"alternative-id":["sym16080969"],"URL":"https:\/\/doi.org\/10.3390\/sym16080969","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,30]]}}}