Watermarking of Digital Images With the Substitution of Low-Value Bits to Increase Capacity

Author(s):  
Abdolreza Hatamlou ◽  
Aliasghar Erfannia ◽  
Farzaneh Mahalleh

In this article, a novel watermarking method is proposed which applies the substitution of LSB for low-value parts of the image to embed confidential data. The watermark bits are encoded before being placed. Also, the data on the diameters of the host image blocks are selected on the basis of an irregular determined algorithm that is resistant to attacks. The host image applied in the proposed algorithm should be grayscale. The proposed algorithm uses three bits to embed data that will increase the capacity. In the conventional LSB method, in host image matrix, data are stored in the consecutive numbers, but in this proposed scheme, the host image blocks are divided into separate n × n parts and the diameter of each block are placed in a vector. Then embedded watermarking bits in a vector of numbers is done, from the resulting vector a new block is created, and finally, that block is stored in a new matrix. Then the host image block is overwritten which results in a watermarked image with high capacity.

2018 ◽  
Vol 7 (3) ◽  
pp. 1024 ◽  
Author(s):  
Indu Maurya ◽  
S K Gupta

For hiding information in a digitalized object Steganography is an important technique. It is a special kind of scientific technique which involves the secret information communication inside suitable cover objects of multimedia like image files, audio or videos. The embedded data and its existence are hidden with the help of Steganography. It is a method of hiding data which has enormously improved the security level of confidential data with the help of special hiding mechanism and is considered as remarkable achievement in the computational power. The main aims of Steganography are; capacity of concealed data along with its robustness, lack of detection etc. These are some of the additional features which make it distinguishing from other older techniques like watermarking as well as cryptography. In this research paper, we have surveyed Steganography of digital images and cover the basic and key concepts. In spatial representation the development of image Steganographic methodology in the format of JPEG, along with that we will also debate on the modern developments as far as Steganography is concerned.For increasing Steganographic security, specifically used approaches are shortlisted and the developments made after investigations are also presented in this paper.  


2020 ◽  
Vol 6 (3) ◽  
pp. 8-13
Author(s):  
Farha Khan ◽  
M. Sarwar Raeen

Digital watermarking was introduced as a result of rapid advancement of networked multimedia systems. It had been developed to enforce copyright technologies for cover of copyright possession. Due to increase in growth of internet users of networks are increasing rapidly. It has been concluded that to minimize distortions and to increase capacity, techniques in frequency domain must be combined with another technique which has high capacity and strong robustness against different types of attacks. In this paper, a robust multiple watermarking which combine Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT)and Convolution Neural Network techniques on selected middle band of the video frames is used. This methodology is considered to be robust blind watermarking because it successfully fulfills the requirement of imperceptibility and provides high robustness against a number of image-processing attacks such as Mean filtering, Median filtering, Gaussian noise, salt and pepper noise, poison noise and rotation attack. The proposed method embeds watermark by decomposing the host image. Convolution neural network calculates the weight factor for each wavelet coefficient. The watermark bits are added to the selected coefficients without any perceptual degradation for host image. The simulation is performed on MATLAB platform. The result analysis is evaluated on PSNR and MSE which is used to define robustness of the watermark that means that the watermark will not be destroyed after intentional or involuntary attacks and can still be used for certification. The analysis of the results was made with different types of attacks concluded that the proposed technique is approximately 14% efficient as compared to existing work.


Author(s):  
Suphiya P. Inamdar ◽  
Suhas B. Bhagate

A steganography is an art of hiding confidential data into digital media such as image, audio, video etc. The proposed of system using steganography using reversible texture synthesis. Texture synthesis uses the concept of patch which represents an image block of source texture where its size is user specified. A texture synthesis process resamples a smaller texture image, and provides a new image with arbitrary size and shape. Instead of using an existing cover image to hide messages, the algorithm conceals the source texture image and embeds secret messages using the process of texture synthesis. This allows extracting the secret messages and source texture from a stego synthetic texture. The approach offers some advantages. First, the scheme offers the embedding capacity that is proportional to the size of the stego texture image. Second, the reversible capability inherited from this scheme provides functionality, which allows recovery of the source texture. And third, there will be no image distortion since size of new texture image is user specified.


2020 ◽  
Vol 10 (19) ◽  
pp. 6854 ◽  
Author(s):  
Jae-Eun Lee ◽  
Young-Ho Seo ◽  
Dong-Wook Kim

Digital watermarking has been widely studied as a method of protecting the intellectual property rights of digital images, which are high value-added contents. Recently, studies implementing these techniques with neural networks have been conducted. This paper also proposes a neural network to perform a robust, invisible blind watermarking for digital images. It is a convolutional neural network (CNN)-based scheme that consists of pre-processing networks for both host image and watermark, a watermark embedding network, an attack simulation for training, and a watermark extraction network to extract watermark whenever necessary. It has three peculiarities for the application aspect: The first is the host image resolution’s adaptability. This is to apply the proposed method to any resolution of the host image and is performed by composing the network without using any resolution-dependent layer or component. The second peculiarity is the adaptability of the watermark information. This is to provide usability of any user-defined watermark data. It is conducted by using random binary data as the watermark and is changed each iteration during training. The last peculiarity is the controllability of the trade-off relationship between watermark invisibility and robustness against attacks, which provides applicability for different applications requiring different invisibility and robustness. For this, a strength scaling factor for watermark information is applied. Besides, it has the following structural or in-training peculiarities. First, the proposed network is as simple as the most profound path consists of only 13 CNN layers, which is through the pre-processing network, embedding network, and extraction network. The second is that it maintains the host’s resolution by increasing the resolution of a watermark in the watermark pre-processing network, which is to increases the invisibility of the watermark. Also, the average pooling is used in the watermark pre-processing network to properly combine the binary value of the watermark data with the host image, and it also increases the invisibility of the watermark. Finally, as the loss function, the extractor uses mean absolute error (MAE), while the embedding network uses mean square error (MSE). Because the extracted watermark information consists of binary values, the MAE between the extracted watermark and the original one is more suitable for balanced training between the embedder and the extractor. The proposed network’s performance is confirmed through training and evaluation that the proposed method has high invisibility for the watermark (WM) and high robustness against various pixel-value change attacks and geometric attacks. Each of the three peculiarities of this scheme is shown to work well with the experimental results. Besides, it is exhibited that the proposed scheme shows good performance compared to the previous methods.


2016 ◽  
Vol 25 (08) ◽  
pp. 1650091 ◽  
Author(s):  
Geeta Kasana ◽  
Kulbir Singh ◽  
Satvinder Singh Bhatia

This paper proposes a block-based high capacity steganography technique for digital images. The cover image is decomposed into blocks of equal size and the largest pixel of each block is found to embed the secret data bits and also the smallest pixel of each block is used for embedding to enhance the capacity. Embedding of secret data is performed using the concept that the pixel of a cover image has only two states — even and odd. Multilevel approach is also combined in the proposed technique to achieve high embedding capacity. In order to make the proposed technique more secure, a key is generated using embedding levels, block size, pixel embedding way, encryption parameters, and starting blocks of each embedding levels. Embedding capacity and visual quality of stego images generated by the proposed steganography technique are higher than the existing techniques. Steganalysis tests have been performed to show the un-detectability and imperceptibility of the proposed technique.


Electronics ◽  
2022 ◽  
Vol 11 (1) ◽  
pp. 136
Author(s):  
Moataz Z. Salim ◽  
Ali J. Abboud ◽  
Remzi Yildirim

The usage of images in different fields has increased dramatically, especially in medical image analysis and social media. Many risks can threaten the integrity and confidentiality of digital images transmitted through the internet. As such, the preservation of the contents of these images is of the utmost importance for sensitive healthcare systems. In this paper, the researchers propose a block-based approach to protect the integrity of digital images by detecting and localizing forgeries. It employs a visual cryptography-based watermarking approach to provide the capabilities of forgery detection and localization. In this watermarking scheme, features and key and secret shares are generated. The feature share is constructed by extracting features from equal-sized blocks of the image by using a Walsh transform, a local binary pattern and a discrete wavelet transform. Then, the key share is generated randomly from each image block, and the secret share is constructed by applying the XOR operation between the watermark, feature share and key share. The CASIA V 1.0 and SIPI datasets were used to check the performance and robustness of the proposed method. The experimental results from these datasets revealed that the percentages of the precision, recall and F1 score classification indicators were approximately 97% for these indicators, while the percentages of the TAF and NC image quality indicators were approximately 97% and 96% after applying several known image processing and geometric attacks. Furthermore, the comparative experimental results with the state-of-art approaches proved the robustness and noticeable improvement in the proposed approach for the detection and localization of image forgeries in terms of classification and quality measures.


2016 ◽  
Vol 26 (03) ◽  
pp. 1750044 ◽  
Author(s):  
Hirak Kumar Maity ◽  
Santi P. Maity

Reversible contrast mapping (RCM) and its various modified forms are used extensively in reversible watermarking (RW) on digital images to embed secret information. Sometimes RW demands real-time implementation that can be made by hardware realization and RCM-based RW becomes appealing due to its integer transform nature followed by least significant bit (LSB) substitution for embedding. This motivates us to propose RCM-RW on digital images with two objectives: modification on the existing RCM algorithm to increase embedding rate with low visual distortion. Later on, prototype design through field-programmable gate array (FPGA) is developed for a (256 × 256), 8-bit gray scale image using (32 × 32) image block and pipeline architecture. For a cover image of size (256 × 256), the proposed architecture requires 8,971 slices, 8,246 slice flip-flops, 9,706 numbers of four-input LUTs and 2 FIFO 16/RAMB for watermark embedding purpose. Proposed architecture consumes a power of 636[Formula: see text]mW and offers a data rate of 1.0493[Formula: see text]Mbps at an operating frequency as high as 95.3[Formula: see text]MHz.


2019 ◽  
Vol 1 (2) ◽  
pp. 18-22
Author(s):  
Akubuilo K. ◽  
Rix Torimiro

The objective of the study was to propose a high capacity data embedding system from DCT domain. The default quantization table is used for fixed mask projection quantization steps. Accordingly, DCT coefficient of the host image from low to higher frequency bands and embed bits from band to band with specially designed base vectors called Hadamard vectors. The embedding scheme procedure is described step wise. The proposed system can be used for data embedding and can be associated with another encryption method to make it safer. The proposed system is reported to be highly robust and secure


Sign in / Sign up

Export Citation Format

Share Document