Skip to main content

2023 | OriginalPaper | Buchkapitel

Dual Image-Based High Quality Digital Image Watermarking

verfasst von : V. Srinadh, Balajee Maram, T. Daniya

Erschienen in: Smart Technologies for Power and Green Energy

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Digital image watermarking techniques are suitable for integrity authentication, watermark security, and copyright protection. Further, the number of embedding bits and the process of watermarking also play a crucial role in deciding the effectiveness of any watermarking process. In this regard, to achieve better security without producing noticeable artifacts in the watermarked image, this paper proposes a dual image-based watermarking technique using an exclusive-or (XOR) operation. The proposed technique utilizes a modified least significant bit (LSB) substitution strategy in the host image (HI) pixel to substitute the watermark bits with a maximum of ±1 modification to each pixel. Each HI pixel embeds two watermark bits by producing two different watermarked pixels each. The proposed technique has better watermark bit embedding capacity, higher perceptual transparency, and security.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat K. Sreenivas, V.K. Prasad, Fragile watermarking schemes for image authentication: a survey. Int. J. Mach. Learn. Cybern. 9(7), 1193–1218 (2018)CrossRef K. Sreenivas, V.K. Prasad, Fragile watermarking schemes for image authentication: a survey. Int. J. Mach. Learn. Cybern. 9(7), 1193–1218 (2018)CrossRef
2.
Zurück zum Zitat L. Rakhmawati, W. Wirawan, S. Suwadi, A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability. EURASIP J. Image Video Process. 2019(1), 61 (2019)CrossRef L. Rakhmawati, W. Wirawan, S. Suwadi, A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability. EURASIP J. Image Video Process. 2019(1), 61 (2019)CrossRef
3.
Zurück zum Zitat C. Rey, J.L. Dugelay, A survey of watermarking algorithms for image authentication. EURASIP J. Adv. Signal Process. 2002(6), 1–9 (2002)CrossRef C. Rey, J.L. Dugelay, A survey of watermarking algorithms for image authentication. EURASIP J. Adv. Signal Process. 2002(6), 1–9 (2002)CrossRef
4.
Zurück zum Zitat M. Begum, M.S. Uddin, Digital image watermarking techniques: a review. Information 11(2), 110 (2020)CrossRef M. Begum, M.S. Uddin, Digital image watermarking techniques: a review. Information 11(2), 110 (2020)CrossRef
5.
Zurück zum Zitat W.L. Tai, Z.J. Liao, Image self-recovery with watermark self-embedding. Signal Process.: Image Commun. 65, 11–25 (2018) W.L. Tai, Z.J. Liao, Image self-recovery with watermark self-embedding. Signal Process.: Image Commun. 65, 11–25 (2018)
6.
Zurück zum Zitat H. Zhang, C. Wang, X. Zhou, Fragile watermarking based on LBP for blind tamper detection in images. J. Inf. Process. Syst. 13(2), 385–399 (2017) H. Zhang, C. Wang, X. Zhou, Fragile watermarking based on LBP for blind tamper detection in images. J. Inf. Process. Syst. 13(2), 385–399 (2017)
7.
Zurück zum Zitat P.W. Wong, A public key watermark for image verification and authentication, in Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No. 98CB36269), Vol. 1, pp. 455–459. IEEE (1998) P.W. Wong, A public key watermark for image verification and authentication, in Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No. 98CB36269), Vol. 1, pp. 455–459. IEEE (1998)
8.
Zurück zum Zitat W.C. Chen, M.S. Wang, A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Syst. Appl. 36(2), 1300–1307 (2009)CrossRef W.C. Chen, M.S. Wang, A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Syst. Appl. 36(2), 1300–1307 (2009)CrossRef
9.
Zurück zum Zitat L. Teng, X. Wang, X. Wang, Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme. AEU-Int. J. Electron. Commun. 67(6), 540–547 (2013)CrossRef L. Teng, X. Wang, X. Wang, Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme. AEU-Int. J. Electron. Commun. 67(6), 540–547 (2013)CrossRef
10.
Zurück zum Zitat J. Molina-Garcia, B.P. Garcia-Salgado, V. Ponomaryov, R. Reyes-Reyes, S. Sadovnychiy, C. Cruz-Ramos, An effective fragile watermarking scheme for color image tampering detection and self-recovery. Signal Process.: Image Commun. 81, 115725 (2020) J. Molina-Garcia, B.P. Garcia-Salgado, V. Ponomaryov, R. Reyes-Reyes, S. Sadovnychiy, C. Cruz-Ramos, An effective fragile watermarking scheme for color image tampering detection and self-recovery. Signal Process.: Image Commun. 81, 115725 (2020)
11.
Zurück zum Zitat T.Y. Lee, S.D. Lin, Dual watermark for image tamper detection and recovery. Pattern Recogn. 41(11), 3497–3506 (2008)MathSciNetCrossRef T.Y. Lee, S.D. Lin, Dual watermark for image tamper detection and recovery. Pattern Recogn. 41(11), 3497–3506 (2008)MathSciNetCrossRef
12.
Zurück zum Zitat J. Mielikainen, LSB matching revisited. IEEE Signal Process. Lett. 13(5), 285–287 (2006)CrossRef J. Mielikainen, LSB matching revisited. IEEE Signal Process. Lett. 13(5), 285–287 (2006)CrossRef
13.
Zurück zum Zitat P. Pal, B. Jana, J. Bhaumik, Watermarking scheme using local binary pattern for image authentication and tamper detection through dual image. Secur. Priv. 2(2), e59 (2019)CrossRef P. Pal, B. Jana, J. Bhaumik, Watermarking scheme using local binary pattern for image authentication and tamper detection through dual image. Secur. Priv. 2(2), e59 (2019)CrossRef
14.
Zurück zum Zitat A.K. Sahu, M. Sahu, Digital image steganography techniques in spatial domain: a study. Int. J. Pharm. Technol. 8(4), 5205–5217 (2016) A.K. Sahu, M. Sahu, Digital image steganography techniques in spatial domain: a study. Int. J. Pharm. Technol. 8(4), 5205–5217 (2016)
15.
Zurück zum Zitat S. Trivedy, A.K. Pal, A logistic map-based fragile watermarking scheme of digital images with tamper detection. Iran. J. Sci. Technol. Trans. Electr. Eng. 41(2), 103–113 (2017)CrossRef S. Trivedy, A.K. Pal, A logistic map-based fragile watermarking scheme of digital images with tamper detection. Iran. J. Sci. Technol. Trans. Electr. Eng. 41(2), 103–113 (2017)CrossRef
16.
Zurück zum Zitat T. Daniya, K. Suresh Kumar, B. Santhosh Kumar, C. Sekhar Kolli, A survey on anomaly based intrusion detection system. Mater. Today Proc. (2021) T. Daniya, K. Suresh Kumar, B. Santhosh Kumar, C. Sekhar Kolli, A survey on anomaly based intrusion detection system. Mater. Today Proc. (2021)
17.
Zurück zum Zitat B.S. Kumar, T. Daniya, N. Sathya, R. Cristin, Investigation on privacy preserving using K-anonymity techniques. Int. Conf. Comput. Commun. Inform. (ICCCI) 2020, 1–7 (2020) B.S. Kumar, T. Daniya, N. Sathya, R. Cristin, Investigation on privacy preserving using K-anonymity techniques. Int. Conf. Comput. Commun. Inform. (ICCCI) 2020, 1–7 (2020)
18.
Zurück zum Zitat B. Maram, S.K. Gorripati, N. Supriya, A framework work for data security using cryptography and video steganography. Int. J. Sci. Technol. Res. 9(4), 56–60. ISSN 2277-8616 (2020) B. Maram, S.K. Gorripati, N. Supriya, A framework work for data security using cryptography and video steganography. Int. J. Sci. Technol. Res. 9(4), 56–60. ISSN 2277-8616 (2020)
19.
Zurück zum Zitat B. Maram, G.K.D. Gopisetty, P.S. Rao, A framework work for data security using cryptography and image steganography. Int. J. Innov. Technol. Explor. Eng. 8(11), 1066–1070. ISSN:2278-3075 (Online) (2019) B. Maram, G.K.D. Gopisetty, P.S. Rao, A framework work for data security using cryptography and image steganography. Int. J. Innov. Technol. Explor. Eng. 8(11), 1066–1070. ISSN:2278-3075 (Online) (2019)
20.
Zurück zum Zitat B. Maram, J.M. Gnanasekar, G. Manogaran, M. Balaanand, Intelligent security algorithm for unicode data privacy and security in IoT. Serv. Orient. Comput. Appl. (SPRINGER) (2018). ISSN:1863-2386 (Print) 1863-2394 (Online) B. Maram, J.M. Gnanasekar, G. Manogaran, M. Balaanand, Intelligent security algorithm for unicode data privacy and security in IoT. Serv. Orient. Comput. Appl. (SPRINGER) (2018). ISSN:1863-2386 (Print) 1863-2394 (Online)
Metadaten
Titel
Dual Image-Based High Quality Digital Image Watermarking
verfasst von
V. Srinadh
Balajee Maram
T. Daniya
Copyright-Jahr
2023
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-19-2764-5_14