Skip to main content
Top

2023 | OriginalPaper | Chapter

Dual Image-Based High Quality Digital Image Watermarking

Authors : V. Srinadh, Balajee Maram, T. Daniya

Published in: Smart Technologies for Power and Green Energy

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Digital image watermarking techniques are suitable for integrity authentication, watermark security, and copyright protection. Further, the number of embedding bits and the process of watermarking also play a crucial role in deciding the effectiveness of any watermarking process. In this regard, to achieve better security without producing noticeable artifacts in the watermarked image, this paper proposes a dual image-based watermarking technique using an exclusive-or (XOR) operation. The proposed technique utilizes a modified least significant bit (LSB) substitution strategy in the host image (HI) pixel to substitute the watermark bits with a maximum of ±1 modification to each pixel. Each HI pixel embeds two watermark bits by producing two different watermarked pixels each. The proposed technique has better watermark bit embedding capacity, higher perceptual transparency, and security.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference K. Sreenivas, V.K. Prasad, Fragile watermarking schemes for image authentication: a survey. Int. J. Mach. Learn. Cybern. 9(7), 1193–1218 (2018)CrossRef K. Sreenivas, V.K. Prasad, Fragile watermarking schemes for image authentication: a survey. Int. J. Mach. Learn. Cybern. 9(7), 1193–1218 (2018)CrossRef
2.
go back to reference L. Rakhmawati, W. Wirawan, S. Suwadi, A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability. EURASIP J. Image Video Process. 2019(1), 61 (2019)CrossRef L. Rakhmawati, W. Wirawan, S. Suwadi, A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability. EURASIP J. Image Video Process. 2019(1), 61 (2019)CrossRef
3.
go back to reference C. Rey, J.L. Dugelay, A survey of watermarking algorithms for image authentication. EURASIP J. Adv. Signal Process. 2002(6), 1–9 (2002)CrossRef C. Rey, J.L. Dugelay, A survey of watermarking algorithms for image authentication. EURASIP J. Adv. Signal Process. 2002(6), 1–9 (2002)CrossRef
4.
go back to reference M. Begum, M.S. Uddin, Digital image watermarking techniques: a review. Information 11(2), 110 (2020)CrossRef M. Begum, M.S. Uddin, Digital image watermarking techniques: a review. Information 11(2), 110 (2020)CrossRef
5.
go back to reference W.L. Tai, Z.J. Liao, Image self-recovery with watermark self-embedding. Signal Process.: Image Commun. 65, 11–25 (2018) W.L. Tai, Z.J. Liao, Image self-recovery with watermark self-embedding. Signal Process.: Image Commun. 65, 11–25 (2018)
6.
go back to reference H. Zhang, C. Wang, X. Zhou, Fragile watermarking based on LBP for blind tamper detection in images. J. Inf. Process. Syst. 13(2), 385–399 (2017) H. Zhang, C. Wang, X. Zhou, Fragile watermarking based on LBP for blind tamper detection in images. J. Inf. Process. Syst. 13(2), 385–399 (2017)
7.
go back to reference P.W. Wong, A public key watermark for image verification and authentication, in Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No. 98CB36269), Vol. 1, pp. 455–459. IEEE (1998) P.W. Wong, A public key watermark for image verification and authentication, in Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No. 98CB36269), Vol. 1, pp. 455–459. IEEE (1998)
8.
go back to reference W.C. Chen, M.S. Wang, A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Syst. Appl. 36(2), 1300–1307 (2009)CrossRef W.C. Chen, M.S. Wang, A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Syst. Appl. 36(2), 1300–1307 (2009)CrossRef
9.
go back to reference L. Teng, X. Wang, X. Wang, Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme. AEU-Int. J. Electron. Commun. 67(6), 540–547 (2013)CrossRef L. Teng, X. Wang, X. Wang, Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme. AEU-Int. J. Electron. Commun. 67(6), 540–547 (2013)CrossRef
10.
go back to reference J. Molina-Garcia, B.P. Garcia-Salgado, V. Ponomaryov, R. Reyes-Reyes, S. Sadovnychiy, C. Cruz-Ramos, An effective fragile watermarking scheme for color image tampering detection and self-recovery. Signal Process.: Image Commun. 81, 115725 (2020) J. Molina-Garcia, B.P. Garcia-Salgado, V. Ponomaryov, R. Reyes-Reyes, S. Sadovnychiy, C. Cruz-Ramos, An effective fragile watermarking scheme for color image tampering detection and self-recovery. Signal Process.: Image Commun. 81, 115725 (2020)
11.
go back to reference T.Y. Lee, S.D. Lin, Dual watermark for image tamper detection and recovery. Pattern Recogn. 41(11), 3497–3506 (2008)MathSciNetCrossRef T.Y. Lee, S.D. Lin, Dual watermark for image tamper detection and recovery. Pattern Recogn. 41(11), 3497–3506 (2008)MathSciNetCrossRef
12.
go back to reference J. Mielikainen, LSB matching revisited. IEEE Signal Process. Lett. 13(5), 285–287 (2006)CrossRef J. Mielikainen, LSB matching revisited. IEEE Signal Process. Lett. 13(5), 285–287 (2006)CrossRef
13.
go back to reference P. Pal, B. Jana, J. Bhaumik, Watermarking scheme using local binary pattern for image authentication and tamper detection through dual image. Secur. Priv. 2(2), e59 (2019)CrossRef P. Pal, B. Jana, J. Bhaumik, Watermarking scheme using local binary pattern for image authentication and tamper detection through dual image. Secur. Priv. 2(2), e59 (2019)CrossRef
14.
go back to reference A.K. Sahu, M. Sahu, Digital image steganography techniques in spatial domain: a study. Int. J. Pharm. Technol. 8(4), 5205–5217 (2016) A.K. Sahu, M. Sahu, Digital image steganography techniques in spatial domain: a study. Int. J. Pharm. Technol. 8(4), 5205–5217 (2016)
15.
go back to reference S. Trivedy, A.K. Pal, A logistic map-based fragile watermarking scheme of digital images with tamper detection. Iran. J. Sci. Technol. Trans. Electr. Eng. 41(2), 103–113 (2017)CrossRef S. Trivedy, A.K. Pal, A logistic map-based fragile watermarking scheme of digital images with tamper detection. Iran. J. Sci. Technol. Trans. Electr. Eng. 41(2), 103–113 (2017)CrossRef
16.
go back to reference T. Daniya, K. Suresh Kumar, B. Santhosh Kumar, C. Sekhar Kolli, A survey on anomaly based intrusion detection system. Mater. Today Proc. (2021) T. Daniya, K. Suresh Kumar, B. Santhosh Kumar, C. Sekhar Kolli, A survey on anomaly based intrusion detection system. Mater. Today Proc. (2021)
17.
go back to reference B.S. Kumar, T. Daniya, N. Sathya, R. Cristin, Investigation on privacy preserving using K-anonymity techniques. Int. Conf. Comput. Commun. Inform. (ICCCI) 2020, 1–7 (2020) B.S. Kumar, T. Daniya, N. Sathya, R. Cristin, Investigation on privacy preserving using K-anonymity techniques. Int. Conf. Comput. Commun. Inform. (ICCCI) 2020, 1–7 (2020)
18.
go back to reference B. Maram, S.K. Gorripati, N. Supriya, A framework work for data security using cryptography and video steganography. Int. J. Sci. Technol. Res. 9(4), 56–60. ISSN 2277-8616 (2020) B. Maram, S.K. Gorripati, N. Supriya, A framework work for data security using cryptography and video steganography. Int. J. Sci. Technol. Res. 9(4), 56–60. ISSN 2277-8616 (2020)
19.
go back to reference B. Maram, G.K.D. Gopisetty, P.S. Rao, A framework work for data security using cryptography and image steganography. Int. J. Innov. Technol. Explor. Eng. 8(11), 1066–1070. ISSN:2278-3075 (Online) (2019) B. Maram, G.K.D. Gopisetty, P.S. Rao, A framework work for data security using cryptography and image steganography. Int. J. Innov. Technol. Explor. Eng. 8(11), 1066–1070. ISSN:2278-3075 (Online) (2019)
20.
go back to reference B. Maram, J.M. Gnanasekar, G. Manogaran, M. Balaanand, Intelligent security algorithm for unicode data privacy and security in IoT. Serv. Orient. Comput. Appl. (SPRINGER) (2018). ISSN:1863-2386 (Print) 1863-2394 (Online) B. Maram, J.M. Gnanasekar, G. Manogaran, M. Balaanand, Intelligent security algorithm for unicode data privacy and security in IoT. Serv. Orient. Comput. Appl. (SPRINGER) (2018). ISSN:1863-2386 (Print) 1863-2394 (Online)
Metadata
Title
Dual Image-Based High Quality Digital Image Watermarking
Authors
V. Srinadh
Balajee Maram
T. Daniya
Copyright Year
2023
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-19-2764-5_14