CFP last date
20 December 2024
Reseach Article

Digital Image Watermarking based on LSB Techniques: A Comparative Study

by Munirah Gaaed Almutiri, Mohamed Tahar Ben Othman
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 26
Year of Publication: 2018
Authors: Munirah Gaaed Almutiri, Mohamed Tahar Ben Othman
10.5120/ijca2018918105

Munirah Gaaed Almutiri, Mohamed Tahar Ben Othman . Digital Image Watermarking based on LSB Techniques: A Comparative Study. International Journal of Computer Applications. 181, 26 ( Nov 2018), 30-36. DOI=10.5120/ijca2018918105

@article{ 10.5120/ijca2018918105,
author = { Munirah Gaaed Almutiri, Mohamed Tahar Ben Othman },
title = { Digital Image Watermarking based on LSB Techniques: A Comparative Study },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2018 },
volume = { 181 },
number = { 26 },
month = { Nov },
year = { 2018 },
issn = { 0975-8887 },
pages = { 30-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number26/30102-2018918105/ },
doi = { 10.5120/ijca2018918105 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:07:15.355886+05:30
%A Munirah Gaaed Almutiri
%A Mohamed Tahar Ben Othman
%T Digital Image Watermarking based on LSB Techniques: A Comparative Study
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 26
%P 30-36
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information security is one among the top level issues that have being addressed since a decade and intensively focused on nowadays. As owning the information is considered having the power these days, maintaining this information secure is among the only ways to maintain this power. During the last decade, several techniques for information security were under research. One of these areas is the security of information communication. Among the techniques handling this issue is the digital image watermarking. The aim of this paper is to present several works in this area and compare the performance of such techniques. In this paper we focus on Least Significant Bit (LSB) techniques in spatial domain, starting with a description of the latest work carried out over LSB and ending with making a comparison between various LSB watermarking schemes.

References
  1. Kurak, Charles, and John McHugh. "A cautionary note on image downgrading." Computer Security Applications Conference, 1992. Proceedings. Eighth Annual. IEEE, 1992.
  2. Zheng, Dong, et al. "A survey of RST invariant image watermarking algorithms." ACM Computing Surveys (CSUR) 39.2 (2007): 5.
  3. Yang, Wen-Chao, Che-Yen Wen, and Chung-Hao Chen. "Applying public-key watermarking techniques in forensic imaging to preserve the authenticity of the evidence." International Conference on Intelligence and Security Informatics. Springer, Berlin, Heidelberg, 2008.
  4. He, HongJie, JiaShu Zhang, and Heng-Ming Tai. "A wavelet-based fragile watermarking scheme for secure image authentication." International Workshop on Digital Watermarking. Springer, Berlin, Heidelberg, 2006.
  5. Byun, Sung-Cheal, et al. "A SVD-based fragile watermarking scheme for image authentication." International Workshop on Digital Watermarking. Springer, Berlin, Heidelberg, 2002.
  6. Lee, Gil-Je, Eun-Jun Yoon, and Kee-Young Yoo. "A new LSB based digital watermarking scheme with random mapping function." Ubiquitous Multimedia Computing, 2008. UMC'08. International Symposium on. IEEE, 2008.
  7. Fazli, Saeid, and Gholamreza Khodaverdi. "Trade-off between imperceptibility and robustness of LSB watermarking using SSIM quality metrics." Machine Vision, 2009. ICMV'09. Second International Conference on. IEEE, 2009.
  8. Bamatraf Abdullah, Rosziati Ibrahim, and Mohd Najib B. Mohd Salleh. "Digital watermarking algorithm using LSB." Computer Applications and Industrial Electronics (ICCAIE), 2010 International Conference on. IEEE, 2010.
  9. Singh Krishna Kumar, and Shashank Dwivedi. "Digital Watermarking using Asymmetric Key Cryptography and Spatial Domain Technique." International Journal of Advance Research in Computer Science and Management Studies 2.8 (2014): 65-72.
  10. Low, Cheng-Yaw, Andrew Beng-Jin Teoh, and Connie Tee. "Fusion of LSB and DWT biometric watermarking using offline handwritten signature for copyright protection." International Conference on Biometrics. Springer, Berlin, Heidelberg, 2009.
  11. El Kerek Bilal, et al. "A new technique to multiplex stereo images: LSB watermarking and Hamming code." Artificial Intelligence, Modelling and Simulation (AIMS), 2013 1st International Conference on. IEEE, 2013.
  12. Bamatraf, Abdullah, et al. "A new digital watermarking algorithm using combination of least significant bit (LSB) and inverse bit." arXiv preprint arXiv:1111.6727 (2011).
  13. Kumar Sanjeev, and Tanupreet Singh. "Performance improvement of simple LSB watermarking using SVD." Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH), 2014 Innovative Applications of. IEEE, 2014.
  14. Dehkordi, Amin Banitalebi, Said Nader Esfahani, and Alireza Nasiri Avanaki. "Robust LSB watermarking optimized for local structural similarity." Electrical Engineering (ICEE), 2011 19th Iranian Conference on. IEEE, 2011.
  15. Apostol, Cristian-Gabriel, and Cristian-Iulian Rîncu. "Digital watermarking secured with PWLCM, chaotic-feedback and LSB data hiding." Communications (COMM), 2010 8th International Conference on. IEEE, 2010.
  16. Mohamed Tahar Ben Othman, "Novel image clustering based on image features for robust reversible data hiding", INTERNATIONAL JOURNAL of FUZZY SYSTEMS and ADVANCED APPLICATIONS 2, 2015, pp. 1-8.
  17. Mohamed Tahar Ben Othman, “Digital Image Watermarking based on image clustering”, the 3rd International Conference on Circuits, Systems, Communications, Computers and Applications (CSCCA '14),. Florence, Italy, November 22-24, 2014.
  18. Mohamed Tahar Ben Othman, "CAM-based Digital Image Watermarking Revisited", WSEAS Transaction on Systems, 2014/1.
  19. Mohamed Tahar Ben Othman, "New Image Watermarking Scheme based on Image Content Addressing Method", The 13th WSEAS International Conference on Applied Computer and Applied Computational Science, 23-25 April 2014
Index Terms

Computer Science
Information Sciences

Keywords

Watermarking LSB least significant bit spatial domain gray images information security digital image.