scholarly journals Image Watermarking Approach Using LSB and Laplacian Filter

2021 ◽  
Vol 2129 (1) ◽  
pp. 012015
Author(s):  
N Imran ◽  
S Hameed ◽  
Z Hafeez ◽  
Z Faheem ◽  
M Waseem ◽  
...  

Abstract With the growth of information technologies, E-industry safety has recently become the mutual attention of education and business firms. Digital image watermarking is a technique that refers to the security of multimedia data. It is a process referred to the security and authentication of a digital image, video, and audio by embedding a watermark. Watermarking technique applies a number of variable editions to the host content, where the addition is related to embed information. In the past, researchers develop multiple simple watermarking techniques, today race is to find a region where the watermark is imperceptible and have a high payload. In this paper, an invisible image watermarking technique based on the least significant bit (LSB) and laplacian filter is proposed. The original image is divided into blocks and the laplacian filter is applied on each block. Laplacian is a derivative filter that uses the second derivate to find out the area of rapid changes in the image and the least significant bit is a technique to embed a watermark into the bit positions. Watermark is embedded on these regions which is favourable in achieving high desirable properties. This technique shows strong robustness against image processing and geometrical attacks. In evaluation with state of art methods, the proposed technique shows satisfactory progress.

2020 ◽  
Vol 29 (1) ◽  
pp. 30-39 ◽  
Author(s):  
Farah Deeba ◽  
She Kun ◽  
Fayaz Ali Dharejo ◽  
Hira Memon

2020 ◽  
Vol 2020 ◽  
pp. 1-12 ◽  
Author(s):  
Mahbuba Begum ◽  
Mohammad Shorif Uddin

Digital image watermarking is an attractive research area since it protects the multimedia data from unauthorized access. For designing an efficient and robust digital image watermarking system, the trade-off among imperceptibility, robustness, capacity, and security must be maintained. Various studies regarding this concern have been performed to ensure these requirements by hybridizing different domains, such as spatial and transform domains. In this paper, we have presented an analytical study of the existing hybrid digital image watermarking methods. At first, we have given a standard framework for designing a hybrid method that ensures the basic design requirements of watermarking for various applications. After a brief literature review, we compared and analyzed the complexity of several existing hybrid methods in a tabular form. The limitations and applications of these methods are also highlighted. Finally, we summarized the challenges of the existing methods and concluded the study by giving future research directions.


2021 ◽  
Vol 3 (4) ◽  
Author(s):  
Md. Ahasan Kabir

AbstractThis study presents the vulnerability of digital documents and its effective way to protect the ownership and detection of unauthorized modification of multimedia data. Watermarking is an effective way to protect vulnerable data in a digital environment. In this paper, a watermarking algorithm has been proposed based on a lossy compression algorithm to ensure authentication and detection of forgery. In this proposed method, the CDF9/7 biorthogonal wavelet is used to transform the watermark image and encoded the wavelet coefficients using Set Partition in Hierarchical Tree algorithm. Then, the encoded bits are encrypted by shuffling and encrypting using symmetric keys. After that the encrypted bits are inserted into the Least Significant Bit position of the cover image. In addition, two tamper detection bits are generated based on texture information and pixel location and inserted in the watermarked image. The proposed algorithm reconstructs the watermark and the tampering region more efficiently and achieved 56.5463 dB PSNR for STARE database. Experimental result shows that the proposed algorithm is effectively prevented different attacks and ensure the integrity of watermark bits within the watermarked image. Also finds the tampered region more efficiently compared with the existing state of art algorithms.


2017 ◽  
Vol 4 (1) ◽  
pp. 20-26
Author(s):  
Ari Muzakir ◽  
Mailan Habibi

Ease of deployment of digital image through the internet has positive and negative sides, especially for owners of the original digital image. The positive side of the ease of rapid deployment is the owner of that image deploys digital image files to various sites in the world address. While the downside is that if there is no copyright that serves as protector of the image it will be very easily recognized ownership by other parties. Watermarking is one solution to protect the copyright and know the results of the digital image. With Digital Image Watermarking, copyright resulting digital image will be protected through the insertion of additional information such as owner information and the authenticity of the digital image. The least significant bit (LSB) is one of the algorithm is simple and easy to understand. The results of the simulations carried out using android smartphone shows that the LSB watermarking technique is not able to be seen by naked human eye, meaning there is no significant difference in the image of the original files with images that have been inserted watermarking. The resulting image has dimensions of 640x480 with a bit depth of 32 bits. In addition, to determine the function of the ability of the device (smartphone) in processing the image using this application used black box testing.


Author(s):  
Santhosh Voruganti

Internet has caused an extraordinary increase in the transfer and sharing of digital data like text, videos, images, audio, etc. over it. However, with the advent of modern access technology, multimedia data is more prone to security risks as data can be modified or redistributed without prior permission. Chaotic encryption-based blind digital image watermarking technique applicable to both grayscale and colour images. Discrete cosine transform (DCT) is used before embedding the watermark in the host image. Arnold transform is used in addition to chaotic encryption to add double-layer security to the watermark. Three different variants of the proposed algorithm have been tested and analysed. The simulation results show that the proposed scheme is robust to most of the image processing operations like joint picture expert group compression, sharpening, cropping, and median filtering. To validate the efficiency of the proposed technique, the simulation results are compared with certain state-of-art techniques.


Sign in / Sign up

Export Citation Format

Share Document