SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 1 (Sep-Oct. 2012), PP 36-41
www.iosrjournals.org
www.iosrjournals.org 36 | Page
Lsb Based Digital Image Watermarking For Gray Scale Image
Deepshikha Chopra1
, Preeti Gupta2
, Gaur Sanjay B.C.3
, Anil Gupta4
1,2
(CSE Department, Jodhpur Institute of Engineering & Technology Jodhpur, RTU, India)
3
(ECE Department, Jodhpur Institute of Engineering & Technology Jodhpur, RTU, India)
4
(CSE Department, M.B.M. Engineering College, JNVU Jodhpur, India)
ABSTRACT : In recent years, internet revolution resulted in an explosive growth in multimedia applications.
The rapid advancement of internet has made it easier to send the data/image accurate and faster to the
destination. Besides this, it is easier to modify and misuse the valuable information through hacking at the same
time. Digital watermarking is one of the proposed solutions for copyright protection of multimedia data. A
watermark is a form, image or text that is impressed onto paper, which provides evidence of its authenticity.
In this paper an invisible watermarking technique (least significant bit) and a visible watermarking technique is
implemented.
This paper presents the general overview of image watermarking and different security issues. Various
attacks are also performed on watermarked images and their impact on quality of images is also studied. In this
paper, Image Watermarking using Least Significant Bit (LSB) algorithm has been used for embedding the
message/logo into the image. This work has been implemented through MATLAB.
Keywords - Watermarking, Least Significant Bit (LSB), JPEG (Joint Photographic Experts Group), Mean
Square Error (MSE) and Peak Signal to Noise Ratio (PSNR).
I. INTRODUCTION
Watermarking is a technique used to hide data or identifying information within digital multimedia.
Our discussion will focus primarily on the watermarking of digital images, though digital video, audio, and
documents are also routinely watermarked. Digital watermarking is becoming popular, especially for adding
undetectable identifying marks, such as author or copyright information.
The digital watermarking process embeds a signal into the media without significantly degrading its
visual quality. Digital watermarking is a process to embed some information called watermark into different
kinds of media called Cover Work [1, 3]. Digital watermarking is used to hide the information inside a signal,
which cannot be easily extracted by the third party. Its widely used application is copyright protection of digital
information. It is different from the encryption in the sense that it allows the user to access, view and interpret
the signal but protect the ownership of the content. Digital watermarking involves embedding a structure in a
host signal to “mark” its ownership [4]. Digital watermarks are inside the information so that ownership of the
information cannot be claimed by third party [5]. While some watermarks are visible [6], most watermarks are
invisible.
The best known Watermarking method that works in the Spatial Domain is the Least Significant Bit
(LSB), which replaces the least significant bits of pixels selected to hide the information. This method has
several implementation versions that improve the algorithm in certain aspects.
II. BASIC MODEL
Basic model of watermarking with four stages as shown in figure 2.1 below: [5, 8]
 Generation
 Embedding
 Distribution and attacks
 Detection and Recovery.
Explanation about the Generation, Embedding and Detection stage is presented together.
Figure 2.1 Basic Model
Generation Embedding Distribution
and Attacks
Detection
and
Recovery
LSB Based Image Watermarking For Gray Scale Image
www.iosrjournals.org 37 | Page
In Generation stage watermark is created and its contents should be unique and complex such that it is difficult
to extract or damaged from possible attacks.
In Embedding stage watermark is embedded in cover media. Embedding is directly related to extraction
algorithm. Hence Embedding algorithm is combination of watermark with chosen media, so the result is
equivalently:
WM= E (CI, WI)
Where CI is original image, WI is watermark, E is embedding function and WM is the watermarked media.
The Distribution process can be seen as transmission of signal through watermark channel. Possible attacks in
broadcast channel may be intentional or accidental.
Detection process allows owner to be identified and provides information to the intended recipients.
There are two kinds of detection: Informed detection and Blind detection.
To insert a watermark we can use spatial domain, transform domain.
2.1 CLASSIFICATION OF WATERMARKING
Digital Watermarking techniques can be classified as:
 Text Watermarking
 Image Watermarking
 Audio Watermarking
 Video Watermarking
In other way, the digital watermarks can be divided into three different types as follows:
i. Visible watermark
ii. Invisible-Robust watermark
iii. Invisible-Fragile watermark
2.2 CLASSIFICATION OF WATERMARKING ATTACKS
Many operations may affect the watermarking algorithms and destroy it. Those operations that destroy
watermark data are called attacks [7]. Here are some of the best known attacks.
 Simple attacks: (other possible names include “waveform attacks” and “noise attacks”) are
conceptually simple attacks that attempt to impair the embedded watermark by manipulations of the
whole watermarked data (host data plus watermark) without an attempt to identify and isolate the
watermark.
 Detection-disabling attacks: (other possible names include “synchronization attacks”) are attacks that
attempt to break the correlation and to make the recovery of the watermark impossible or infeasible for a
watermark detector, mostly by geometric distortion like zooming, shift in (for video) direction, rotation,
cropping, pixel permutations, subsampling, removal or insertion of pixels or pixel clusters, or any other
geometric transformation of the data.
 Ambiguity attacks: (other possible names include “deadlock attacks,” “inversion attacks,” “fake
watermark attacks,” and “fake-original attacks”) are attacks that attempt to confuse by producing fake
original data or fake watermarked data.
 Removal attacks: are attacks that attempt to analyze the watermarked data, estimate the watermark or
the host data, separate the watermarked data into host data and watermark and discard only the
watermark.
 Cryptographic attacks: The above two type of attacks, removal and geometric, do not breach the
security of the watermarking algorithm. On the other hand, cryptographic attacks deal with the cracking
of the security.
III. SPATIAL DOMAIN TECHNIQUES
Techniques in spatial domain class generally share the following characteristics:
 The watermark is applied in the pixel domain.
 No transforms are applied to the host signal during watermark embedding.
 Combination with the host signal is based on simple operations, in the pixel domain.
 The watermark can be detected by correlating the expected pattern with the received signal.
3.1 REVIEW OF LSB
In a digital image, information can be inserted directly into every bit of image information or the more busy
areas of an image can be calculated so as to hide such messages in less perceptible parts of an image [4],[7].
Tirkel et. al were one of the first used techniques for image watermarking. Two techniques were presented to
LSB Based Image Watermarking For Gray Scale Image
www.iosrjournals.org 38 | Page
hide data in the spatial domain of images by them. These methods were based on the pixel value‟s Least
Significant Bit (LSB) modifications.
The algorithm proposed by Kurah and McHughes [9] to embed in the LSB and it was known as image
downgrading [2]. An example of the less predictable or less perceptible is Least Significant Bit insertion. This
section explains how this works for an 8-bit grayscale image and the possible effects of altering such an image.
The principle of embedding is fairly simple and effective. If we use a grayscale bitmap image, which is 8- bit,
we would need to read in the file and then add data to the least significant bits of each pixel, in every 8-bit pixel.
In a grayscale image each pixel is represented by 1 byte consist of 8 bits. It can represent 256 gray colors
between the black which is 0 to the white which is 255.
The principle of encoding uses the Least Significant Bit of each of these bytes, the bit on the far right side. If
data is encoded to only the last two significant bits (which are the first and second LSB) of each color
component it is most likely not going to be detectable; the human retina becomes the limiting factor in viewing
pictures [7].
For the sake of this example only the least significant bit of each pixel will be used for embedding
information. If the pixel value is 138 which is the value 10000110 in binary and the watermark bit is 1, the value
of the pixel will be 10000111 in binary which is 139 in decimal. In this example we change the underline pixel.
3.2 WATERMARK EMBEDDED AND EXTRACTION
All images are 256*256 Pixels by 8 bit per pixel gray scale image.
Select an image CI to be used as base image or cover image in which watermark will be inserted. Select an
image to be used as watermark Reading images WI which will be added to base image.
n: integer
n=no. of least significant bits to be utilized to hide most significant bits of watermark under the base
image
Figure 3.1 Watermark Embedded Figure 3.2 Watermark Extraction
Watermark Embedded
For each pixel in base, watermark, watermarked_image
Do
Base_image:set n least significant bits to zero
Watermark:shift right by 8-n bits
Watermarked-image : add values from base and watermark
Enddo
End
Watermark Extraction
In watermarked image for each pixel in watermarked image and extracted image
Do
Watermarked image:
Shift left by 8-n bits
Extracted image:
Set to the shifted value of watermarked image
The technique used will be LSB technique which is a form of spatial domain technique.
This technique is used to add an invisible and visible watermark in the image by varying the number of bits
to be replaced in base image.
IV. EXPERIMENTAL RESULTS
The Mean Square Error (MSE) and the Peak Signal to Noise Ratio (PSNR) are the two error metrics used to
compare image compression quality. This ratio is often used as a quality measurement between the original and
Cover Image (CI) Watermark Image (WI)
Watermarked Embedding Algorithm
Watermarked Image (WM)
Cover Image (CI) Watermark Image (WI)
Watermarked Extraction Algorithm
Watermarked Image (WM)
LSB Based Image Watermarking For Gray Scale Image
www.iosrjournals.org 39 | Page
a watermarked image. If one of the signals is an original signal of acceptable (or perhaps pristine) quality, and
the other is a distorted version of it whose quality is being evaluated, then the MSE may also be regarded as a
measure of signal quality.
MSE is a signal fidelity measure. The goal of a signal fidelity measure is to compare two signals by
providing a quantitative score that describes the level of error/distortion between them. Usually, it is assumed
that one of the signals is a pristine original, while the other is distorted or contaminated by errors.
Suppose that x = { xi |i = 1, 2, · · ·, N} and y = { yi |i = 1, 2, · · · , N} are two finite-length, discrete
signals (e.g., visual images), where N is the number of signal samples (pixels, if the signals are images) and xi
and yi are the values of the i th samples in x and y, respectively. The MSE between the signals x and y is
2
1
1
( , ) ( )i i
N
i
MSE x y
N 
 x y
In the MSE, we will often refer to the error signal ei,= xi − yi, which is the difference between the original and
distorted signals. If one of the signals is an original signal of acceptable (or perhaps pristine) quality, and the
other is a distorted version of it whose quality is being evaluated, then the MSE may also be regarded as a
measure of signal quality.
MSE is often converted into a peak-to-peak signal-to-noise ratio (PSNR) measure
10
2
10log
L
PSNR
MSE

Where L is the dynamic range of allowable image pixel intensities. For example, for images that have
allocations of 8 bits/pixel of gray-scale, L = 28
− 1 = 255. The PSNR is useful if images having different
dynamic ranges are being compared, but otherwise contains no new information relative to the MSE.
Cover Image CI (Flower) Watermark Image WI (logo)
1st
bit substitution 2nd
bit substitution 3rd
bit substitution 4th
bit substitution
(Invisible Watermarked Image)
5th
bit substitution 6th
bit substitution 7th bit substitution 8th
bit substitution
(Visible Watermarked Image)
The figure 4.1 shows various images, WI, upon which the algorithm was implemented and their corresponding
watermarked copy WM. Values for mean square error (MSE) and peak signal to noise ratio (PSNR) are
measured. Table 4.1
LSB Based Image Watermarking For Gray Scale Image
www.iosrjournals.org 40 | Page
Method PSNR MSE
LSB or 1st Bit Substitution 54.87 0.21
2nd Bit Substitution 45.54 1.83
3rd Bit Substitution 38.25 9.80
4th Bit Substitution 31.68 44.50
5th Bit Substitution 25.42 188.28
6th Bit Substitution 19.28 772.72
7th Bit Substitution 13.21 3129.01
MSB or 8th Bit Substitution 14.3467 2.3900e+003
TABLE 4.1 PSNR & MSE for Different Bit Substitution
V. IMAGES WITH DISTORTIONS
Here we have applied different types of distortion to the watermarked image and the Mean Squared
Error (MSE) for the images is calculated. The traditional error measuring techniques are mainly MSE and Peak
Signal to Noise Ratio (PSNR). These are widely used because they are simple to calculate and are independent
of viewing conditions and individual observers.
VARIOUS ATTACKS ON THE WATERMARKED IMAGE
1. Salt and Paper Noise
Bit
Substitution
Watermarked Image Salt and Paper Noise
PSNR MSE PSNR MSE
Bit=1 141.40 142.25 26.63 140.33
Bit=2 143.97 142.11 26.64 137.59
Bit=3 148.73 139.83 26.71 134.84
Bit=4 145.69 136.52 26.53 144.24
Bit=5 143.86 136.65 26.81 149.50
Bit=6 131.87 132.88 26.93 135.00
Bit=7 136.97 133.00 26.93 138.74
Bit=8 184.13 187.42 25.44 180.95
2. Gaussian Noise
Bit
Substitution
Watermarked Image Gaussian Noise
PSNR MSE PSNR MSE
Bit=1 205.67 203.96 25.07 204.85
Bit=2 206.11 205.22 25.04 203.76
Bit=3 204.74 204.71 25.05 207.45
Bit=4 205.57 205.86 25.03 207.47
Bit=5 205.40 205.40 25.04 207.62
Bit=6 204.45 207.13 25.00 207.14
Bit=7 197.64 198.67 25.18 199.47
Bit=8 193.72 190.94 25.36 194.93
3. Poisson Noise
Bit
Substitution
Watermarked Image Poisson Noise
PSNR MSE PSNR MSE
Bit=1 34.06 34.57 32.78 33.70
Bit=2 34.27 34.09 32.84 34.74
Bit=3 34.62 34.47 32.79 34.81
Bit=4 34.81 34.89 32.74 34.51
Bit=5 35.78 35.23 32.70 35.39
Bit=6 33.64 33.92 32.86 33.65
Bit=7 37.52 38.00 32.37 38.23
Bit=8 36.24 35.96 32.61 36.28
LSB Based Image Watermarking For Gray Scale Image
www.iosrjournals.org 41 | Page
4. Speckle Noise
Bit
Substitution
Watermarked Image Speckle Noise
PSNR MSE PSNR MSE
Bit=1 49.75 49.57 31.21 49.26
Bit=2 49.45 49.83 31.19 49.56
Bit=3 49.70 50.33 31.15 50.11
Bit=4 50.51 50.31 31.15 49.82
Bit=5 50.84 51.13 31.08 51.10
Bit=6 48.52 48.78 31.28 48.75
Bit=7 56.21 55 62 30.71 56.15
Bit=8 75.30 74.26 29.46 74.85
Noise on ‘Bit=1’
Speckle Noise Poisson Noise Gaussian Noise Salt and Paper Noise
VI CONCLUSION
The increasing amount of digital exchangeable data generates new information security needs.
Multimedia documents and specifically images are also affected. Users expect that robust solutions will ensure
copyright protection and also guarantee the authenticity of multimedia documents. In the current state of
research, it is difficult to affirm which watermarking approach seems most suitable to ensure an integrity service
adapted to images and more general way to multimedia documents.
The tool used for the execution of this algorithm was „Matlab‟. The aim of the program is to replace the
LSB of the base image with the MSB of the watermark.
REFERENCES
Journal Papers:
[1] Preeti Gupta, “Cryptography based digital image watermarking algorithm to increase security of watermark data”, International
Journal of Scientific & Engineering Research, Volume 3, Issue 9 (September 2012) ISSN 2229-5518
[2] Manpreet Kaur, Sonika Jindal, Sunny Behal, “A Study of Digital Image Watermarking”, IJREAS ,Volume 2, Issue 2 (Febru ry
2012) pp-126-136
[3] B Surekha, Dr GN Swamy, “A Spatial Domain Public Image Watermarking”, International Journal of Security and Its
Applications Vol. 5 No. 1, January, 2011
[4] Robert, L., and T. Shanmugapriya, “A Study on Digital Watermarking Techniques ”, International Journal of Recent Trends in
Engineering, vol. 1, no. 2, pp. 223-225, 2009.
[5] H.Arafat Ali, “Qualitative Spatial Image Data Hiding for Secure Data Transmission”, GVIP Journal,Volume 7,Issue 2 , pages 35-
37, 2, August 2007
[6] Cox, Miller and Bloom, “Digital watermarking”, 1st edition 2001, San Fransisco: Morgan Kaufmann Publisher
[7] Brigitte Jellinek, “Invisible Watermarking of Digital Images for Copyright Protection” University Salzburg, pp. 9 – 17, Jan 2000.
[8] Lu, C-S., Liao, H-Y., M., Huang, S-K., Sze, C-J., “Cocktail Watermarking on Images”, 3rd International Workshop on Information
Hiding, Dresden, Germany, Sep 29-Oct. 1, 1999
[9] Dr. Martin Kutter and Dr. Frederic Jordan, “Digital Watermarking Technology”, AlpVision, Switzerland, pp 1 – 4M Ozaki, Y.
Adachi, Y. Iwahori, and N. Ishii, Application of fuzzy theory to writer recognition of Chinese characters, International Journal of
Modelling and Simulation, 18(2), 1998, 112-116.
[10] J.J.K.O. Ruanaidh, W.J.Dowling, F.M. Boland, “Watermarking Digital Images for Copyright Protection”, IEEE ProcVis. Image
Signal Process. Vol. 143, No. 4, pp 250 - 254. August 1996.
Thesis:
[11] Mitra Abbasfard “Digital Image Watermarking Robustness: A Comparative Study”, Delft University of Technologyrertre , 2009:
74 pages
[12] Harpuneet Kaur , “Robust Image Watermarking Technique to Increase Security and Capacity of Watermark Data” Thapar
Institute of Engineering & Technology , Patiala , India ,May 2006 : 79 pages
[13] K. Vanwasi, “Digital Watermarking - Steering the future of security” Edition 2001, available at
http://www.networkmagazineindia.com/200108/security1.html
[14] Saraju Prasad Mohanty, “Watermarking of Digital Images”, Indian Institute of Science Bangalore, pp. 1.3 – 1.6, January 1999
Books:
[15] Andreas Koschan, Mongi Abidi, “ Digital Colour Image Processing” Published by John Wiley & Sons, Inc., Hoboken, New
Jersey,Published simultaneously in Canada.

Weitere ähnliche Inhalte

Was ist angesagt?

Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingAnkush Kr
 
Digital Image Processing - Image Compression
Digital Image Processing - Image CompressionDigital Image Processing - Image Compression
Digital Image Processing - Image CompressionMathankumar S
 
Digital Image Watermarking
Digital Image WatermarkingDigital Image Watermarking
Digital Image WatermarkingPralin Pavithran
 
Steganography final report
Steganography final reportSteganography final report
Steganography final reportABHIJEET KHIRE
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure AuthenticationMahesh Gadhwal
 
image compression using matlab project report
image compression  using matlab project reportimage compression  using matlab project report
image compression using matlab project reportkgaurav113
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationshalini singh
 
Adaptive Median Filters
Adaptive Median FiltersAdaptive Median Filters
Adaptive Median FiltersAmnaakhaan
 
Multilevel
MultilevelMultilevel
MultilevelRee Tu
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganographyKamonasish Hore
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarkingBharath
 

Was ist angesagt? (20)

Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital Image Processing - Image Compression
Digital Image Processing - Image CompressionDigital Image Processing - Image Compression
Digital Image Processing - Image Compression
 
Chapter1 2
Chapter1 2Chapter1 2
Chapter1 2
 
Digital Image Watermarking
Digital Image WatermarkingDigital Image Watermarking
Digital Image Watermarking
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Watermarking
WatermarkingWatermarking
Watermarking
 
Fog computing
Fog computingFog computing
Fog computing
 
Steganography final report
Steganography final reportSteganography final report
Steganography final report
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
 
image compression using matlab project report
image compression  using matlab project reportimage compression  using matlab project report
image compression using matlab project report
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Adaptive Median Filters
Adaptive Median FiltersAdaptive Median Filters
Adaptive Median Filters
 
Multilevel
MultilevelMultilevel
Multilevel
 
Histogram Equalization
Histogram EqualizationHistogram Equalization
Histogram Equalization
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Steganography
SteganographySteganography
Steganography
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 

Andere mochten auch

Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic AlgorithmImage Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithmijsrd.com
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingeSAT Journals
 
Operating system introduction to operating system
Operating system   introduction to operating systemOperating system   introduction to operating system
Operating system introduction to operating systemjaydeesa17
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSBSreelekshmi Sree
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingrupareliab14
 
Digital video watermarking using modified lsb and dct technique
Digital video watermarking using modified lsb and dct techniqueDigital video watermarking using modified lsb and dct technique
Digital video watermarking using modified lsb and dct techniqueeSAT Publishing House
 
Chapter 1: Introduction to Operating System
Chapter 1: Introduction to Operating SystemChapter 1: Introduction to Operating System
Chapter 1: Introduction to Operating SystemShafaan Khaliq Bhatti
 
Tactile sensor working and its types
Tactile sensor working and its typesTactile sensor working and its types
Tactile sensor working and its typeselprocus
 
Functions Of Operating Systems
Functions Of Operating SystemsFunctions Of Operating Systems
Functions Of Operating SystemsAkshay Kurup
 
Divide by N clock
Divide by N clockDivide by N clock
Divide by N clockMantra VLSI
 
Synchronous counters
Synchronous countersSynchronous counters
Synchronous countersLee Diaz
 
Counters In Digital Logic Design
Counters In Digital Logic DesignCounters In Digital Logic Design
Counters In Digital Logic DesignSyed Abdul Mutaal
 

Andere mochten auch (19)

Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic AlgorithmImage Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
Basics Counters
Basics Counters Basics Counters
Basics Counters
 
Operating system introduction to operating system
Operating system   introduction to operating systemOperating system   introduction to operating system
Operating system introduction to operating system
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital video watermarking using modified lsb and dct technique
Digital video watermarking using modified lsb and dct techniqueDigital video watermarking using modified lsb and dct technique
Digital video watermarking using modified lsb and dct technique
 
Chapter 1: Introduction to Operating System
Chapter 1: Introduction to Operating SystemChapter 1: Introduction to Operating System
Chapter 1: Introduction to Operating System
 
Tactile sensor working and its types
Tactile sensor working and its typesTactile sensor working and its types
Tactile sensor working and its types
 
Functions Of Operating Systems
Functions Of Operating SystemsFunctions Of Operating Systems
Functions Of Operating Systems
 
Divide by N clock
Divide by N clockDivide by N clock
Divide by N clock
 
Synchronous counters
Synchronous countersSynchronous counters
Synchronous counters
 
Counters In Digital Logic Design
Counters In Digital Logic DesignCounters In Digital Logic Design
Counters In Digital Logic Design
 
Counters
CountersCounters
Counters
 
Counters
CountersCounters
Counters
 
Counters
CountersCounters
Counters
 
Counters
CountersCounters
Counters
 
Chapter 5 counter
Chapter 5 counterChapter 5 counter
Chapter 5 counter
 
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
 

Ähnlich wie Lsb Based Digital Image Watermarking For Gray Scale Image

INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...cscpconf
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingEditor IJMTER
 
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...ijistjournal
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...iosrjce
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingeSAT Publishing House
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking BasicsIOSR Journals
 

Ähnlich wie Lsb Based Digital Image Watermarking For Gray Scale Image (20)

INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A Survey
 
Watermarkingppt
WatermarkingpptWatermarkingppt
Watermarkingppt
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
F010413438
F010413438F010413438
F010413438
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
50120130406038
5012013040603850120130406038
50120130406038
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image Watermarking
 
E04122330
E04122330E04122330
E04122330
 
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
 
B011110614
B011110614B011110614
B011110614
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 

Mehr von IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Kürzlich hochgeladen

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Kürzlich hochgeladen (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Lsb Based Digital Image Watermarking For Gray Scale Image

  • 1. IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 1 (Sep-Oct. 2012), PP 36-41 www.iosrjournals.org www.iosrjournals.org 36 | Page Lsb Based Digital Image Watermarking For Gray Scale Image Deepshikha Chopra1 , Preeti Gupta2 , Gaur Sanjay B.C.3 , Anil Gupta4 1,2 (CSE Department, Jodhpur Institute of Engineering & Technology Jodhpur, RTU, India) 3 (ECE Department, Jodhpur Institute of Engineering & Technology Jodhpur, RTU, India) 4 (CSE Department, M.B.M. Engineering College, JNVU Jodhpur, India) ABSTRACT : In recent years, internet revolution resulted in an explosive growth in multimedia applications. The rapid advancement of internet has made it easier to send the data/image accurate and faster to the destination. Besides this, it is easier to modify and misuse the valuable information through hacking at the same time. Digital watermarking is one of the proposed solutions for copyright protection of multimedia data. A watermark is a form, image or text that is impressed onto paper, which provides evidence of its authenticity. In this paper an invisible watermarking technique (least significant bit) and a visible watermarking technique is implemented. This paper presents the general overview of image watermarking and different security issues. Various attacks are also performed on watermarked images and their impact on quality of images is also studied. In this paper, Image Watermarking using Least Significant Bit (LSB) algorithm has been used for embedding the message/logo into the image. This work has been implemented through MATLAB. Keywords - Watermarking, Least Significant Bit (LSB), JPEG (Joint Photographic Experts Group), Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR). I. INTRODUCTION Watermarking is a technique used to hide data or identifying information within digital multimedia. Our discussion will focus primarily on the watermarking of digital images, though digital video, audio, and documents are also routinely watermarked. Digital watermarking is becoming popular, especially for adding undetectable identifying marks, such as author or copyright information. The digital watermarking process embeds a signal into the media without significantly degrading its visual quality. Digital watermarking is a process to embed some information called watermark into different kinds of media called Cover Work [1, 3]. Digital watermarking is used to hide the information inside a signal, which cannot be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different from the encryption in the sense that it allows the user to access, view and interpret the signal but protect the ownership of the content. Digital watermarking involves embedding a structure in a host signal to “mark” its ownership [4]. Digital watermarks are inside the information so that ownership of the information cannot be claimed by third party [5]. While some watermarks are visible [6], most watermarks are invisible. The best known Watermarking method that works in the Spatial Domain is the Least Significant Bit (LSB), which replaces the least significant bits of pixels selected to hide the information. This method has several implementation versions that improve the algorithm in certain aspects. II. BASIC MODEL Basic model of watermarking with four stages as shown in figure 2.1 below: [5, 8]  Generation  Embedding  Distribution and attacks  Detection and Recovery. Explanation about the Generation, Embedding and Detection stage is presented together. Figure 2.1 Basic Model Generation Embedding Distribution and Attacks Detection and Recovery
  • 2. LSB Based Image Watermarking For Gray Scale Image www.iosrjournals.org 37 | Page In Generation stage watermark is created and its contents should be unique and complex such that it is difficult to extract or damaged from possible attacks. In Embedding stage watermark is embedded in cover media. Embedding is directly related to extraction algorithm. Hence Embedding algorithm is combination of watermark with chosen media, so the result is equivalently: WM= E (CI, WI) Where CI is original image, WI is watermark, E is embedding function and WM is the watermarked media. The Distribution process can be seen as transmission of signal through watermark channel. Possible attacks in broadcast channel may be intentional or accidental. Detection process allows owner to be identified and provides information to the intended recipients. There are two kinds of detection: Informed detection and Blind detection. To insert a watermark we can use spatial domain, transform domain. 2.1 CLASSIFICATION OF WATERMARKING Digital Watermarking techniques can be classified as:  Text Watermarking  Image Watermarking  Audio Watermarking  Video Watermarking In other way, the digital watermarks can be divided into three different types as follows: i. Visible watermark ii. Invisible-Robust watermark iii. Invisible-Fragile watermark 2.2 CLASSIFICATION OF WATERMARKING ATTACKS Many operations may affect the watermarking algorithms and destroy it. Those operations that destroy watermark data are called attacks [7]. Here are some of the best known attacks.  Simple attacks: (other possible names include “waveform attacks” and “noise attacks”) are conceptually simple attacks that attempt to impair the embedded watermark by manipulations of the whole watermarked data (host data plus watermark) without an attempt to identify and isolate the watermark.  Detection-disabling attacks: (other possible names include “synchronization attacks”) are attacks that attempt to break the correlation and to make the recovery of the watermark impossible or infeasible for a watermark detector, mostly by geometric distortion like zooming, shift in (for video) direction, rotation, cropping, pixel permutations, subsampling, removal or insertion of pixels or pixel clusters, or any other geometric transformation of the data.  Ambiguity attacks: (other possible names include “deadlock attacks,” “inversion attacks,” “fake watermark attacks,” and “fake-original attacks”) are attacks that attempt to confuse by producing fake original data or fake watermarked data.  Removal attacks: are attacks that attempt to analyze the watermarked data, estimate the watermark or the host data, separate the watermarked data into host data and watermark and discard only the watermark.  Cryptographic attacks: The above two type of attacks, removal and geometric, do not breach the security of the watermarking algorithm. On the other hand, cryptographic attacks deal with the cracking of the security. III. SPATIAL DOMAIN TECHNIQUES Techniques in spatial domain class generally share the following characteristics:  The watermark is applied in the pixel domain.  No transforms are applied to the host signal during watermark embedding.  Combination with the host signal is based on simple operations, in the pixel domain.  The watermark can be detected by correlating the expected pattern with the received signal. 3.1 REVIEW OF LSB In a digital image, information can be inserted directly into every bit of image information or the more busy areas of an image can be calculated so as to hide such messages in less perceptible parts of an image [4],[7]. Tirkel et. al were one of the first used techniques for image watermarking. Two techniques were presented to
  • 3. LSB Based Image Watermarking For Gray Scale Image www.iosrjournals.org 38 | Page hide data in the spatial domain of images by them. These methods were based on the pixel value‟s Least Significant Bit (LSB) modifications. The algorithm proposed by Kurah and McHughes [9] to embed in the LSB and it was known as image downgrading [2]. An example of the less predictable or less perceptible is Least Significant Bit insertion. This section explains how this works for an 8-bit grayscale image and the possible effects of altering such an image. The principle of embedding is fairly simple and effective. If we use a grayscale bitmap image, which is 8- bit, we would need to read in the file and then add data to the least significant bits of each pixel, in every 8-bit pixel. In a grayscale image each pixel is represented by 1 byte consist of 8 bits. It can represent 256 gray colors between the black which is 0 to the white which is 255. The principle of encoding uses the Least Significant Bit of each of these bytes, the bit on the far right side. If data is encoded to only the last two significant bits (which are the first and second LSB) of each color component it is most likely not going to be detectable; the human retina becomes the limiting factor in viewing pictures [7]. For the sake of this example only the least significant bit of each pixel will be used for embedding information. If the pixel value is 138 which is the value 10000110 in binary and the watermark bit is 1, the value of the pixel will be 10000111 in binary which is 139 in decimal. In this example we change the underline pixel. 3.2 WATERMARK EMBEDDED AND EXTRACTION All images are 256*256 Pixels by 8 bit per pixel gray scale image. Select an image CI to be used as base image or cover image in which watermark will be inserted. Select an image to be used as watermark Reading images WI which will be added to base image. n: integer n=no. of least significant bits to be utilized to hide most significant bits of watermark under the base image Figure 3.1 Watermark Embedded Figure 3.2 Watermark Extraction Watermark Embedded For each pixel in base, watermark, watermarked_image Do Base_image:set n least significant bits to zero Watermark:shift right by 8-n bits Watermarked-image : add values from base and watermark Enddo End Watermark Extraction In watermarked image for each pixel in watermarked image and extracted image Do Watermarked image: Shift left by 8-n bits Extracted image: Set to the shifted value of watermarked image The technique used will be LSB technique which is a form of spatial domain technique. This technique is used to add an invisible and visible watermark in the image by varying the number of bits to be replaced in base image. IV. EXPERIMENTAL RESULTS The Mean Square Error (MSE) and the Peak Signal to Noise Ratio (PSNR) are the two error metrics used to compare image compression quality. This ratio is often used as a quality measurement between the original and Cover Image (CI) Watermark Image (WI) Watermarked Embedding Algorithm Watermarked Image (WM) Cover Image (CI) Watermark Image (WI) Watermarked Extraction Algorithm Watermarked Image (WM)
  • 4. LSB Based Image Watermarking For Gray Scale Image www.iosrjournals.org 39 | Page a watermarked image. If one of the signals is an original signal of acceptable (or perhaps pristine) quality, and the other is a distorted version of it whose quality is being evaluated, then the MSE may also be regarded as a measure of signal quality. MSE is a signal fidelity measure. The goal of a signal fidelity measure is to compare two signals by providing a quantitative score that describes the level of error/distortion between them. Usually, it is assumed that one of the signals is a pristine original, while the other is distorted or contaminated by errors. Suppose that x = { xi |i = 1, 2, · · ·, N} and y = { yi |i = 1, 2, · · · , N} are two finite-length, discrete signals (e.g., visual images), where N is the number of signal samples (pixels, if the signals are images) and xi and yi are the values of the i th samples in x and y, respectively. The MSE between the signals x and y is 2 1 1 ( , ) ( )i i N i MSE x y N   x y In the MSE, we will often refer to the error signal ei,= xi − yi, which is the difference between the original and distorted signals. If one of the signals is an original signal of acceptable (or perhaps pristine) quality, and the other is a distorted version of it whose quality is being evaluated, then the MSE may also be regarded as a measure of signal quality. MSE is often converted into a peak-to-peak signal-to-noise ratio (PSNR) measure 10 2 10log L PSNR MSE  Where L is the dynamic range of allowable image pixel intensities. For example, for images that have allocations of 8 bits/pixel of gray-scale, L = 28 − 1 = 255. The PSNR is useful if images having different dynamic ranges are being compared, but otherwise contains no new information relative to the MSE. Cover Image CI (Flower) Watermark Image WI (logo) 1st bit substitution 2nd bit substitution 3rd bit substitution 4th bit substitution (Invisible Watermarked Image) 5th bit substitution 6th bit substitution 7th bit substitution 8th bit substitution (Visible Watermarked Image) The figure 4.1 shows various images, WI, upon which the algorithm was implemented and their corresponding watermarked copy WM. Values for mean square error (MSE) and peak signal to noise ratio (PSNR) are measured. Table 4.1
  • 5. LSB Based Image Watermarking For Gray Scale Image www.iosrjournals.org 40 | Page Method PSNR MSE LSB or 1st Bit Substitution 54.87 0.21 2nd Bit Substitution 45.54 1.83 3rd Bit Substitution 38.25 9.80 4th Bit Substitution 31.68 44.50 5th Bit Substitution 25.42 188.28 6th Bit Substitution 19.28 772.72 7th Bit Substitution 13.21 3129.01 MSB or 8th Bit Substitution 14.3467 2.3900e+003 TABLE 4.1 PSNR & MSE for Different Bit Substitution V. IMAGES WITH DISTORTIONS Here we have applied different types of distortion to the watermarked image and the Mean Squared Error (MSE) for the images is calculated. The traditional error measuring techniques are mainly MSE and Peak Signal to Noise Ratio (PSNR). These are widely used because they are simple to calculate and are independent of viewing conditions and individual observers. VARIOUS ATTACKS ON THE WATERMARKED IMAGE 1. Salt and Paper Noise Bit Substitution Watermarked Image Salt and Paper Noise PSNR MSE PSNR MSE Bit=1 141.40 142.25 26.63 140.33 Bit=2 143.97 142.11 26.64 137.59 Bit=3 148.73 139.83 26.71 134.84 Bit=4 145.69 136.52 26.53 144.24 Bit=5 143.86 136.65 26.81 149.50 Bit=6 131.87 132.88 26.93 135.00 Bit=7 136.97 133.00 26.93 138.74 Bit=8 184.13 187.42 25.44 180.95 2. Gaussian Noise Bit Substitution Watermarked Image Gaussian Noise PSNR MSE PSNR MSE Bit=1 205.67 203.96 25.07 204.85 Bit=2 206.11 205.22 25.04 203.76 Bit=3 204.74 204.71 25.05 207.45 Bit=4 205.57 205.86 25.03 207.47 Bit=5 205.40 205.40 25.04 207.62 Bit=6 204.45 207.13 25.00 207.14 Bit=7 197.64 198.67 25.18 199.47 Bit=8 193.72 190.94 25.36 194.93 3. Poisson Noise Bit Substitution Watermarked Image Poisson Noise PSNR MSE PSNR MSE Bit=1 34.06 34.57 32.78 33.70 Bit=2 34.27 34.09 32.84 34.74 Bit=3 34.62 34.47 32.79 34.81 Bit=4 34.81 34.89 32.74 34.51 Bit=5 35.78 35.23 32.70 35.39 Bit=6 33.64 33.92 32.86 33.65 Bit=7 37.52 38.00 32.37 38.23 Bit=8 36.24 35.96 32.61 36.28
  • 6. LSB Based Image Watermarking For Gray Scale Image www.iosrjournals.org 41 | Page 4. Speckle Noise Bit Substitution Watermarked Image Speckle Noise PSNR MSE PSNR MSE Bit=1 49.75 49.57 31.21 49.26 Bit=2 49.45 49.83 31.19 49.56 Bit=3 49.70 50.33 31.15 50.11 Bit=4 50.51 50.31 31.15 49.82 Bit=5 50.84 51.13 31.08 51.10 Bit=6 48.52 48.78 31.28 48.75 Bit=7 56.21 55 62 30.71 56.15 Bit=8 75.30 74.26 29.46 74.85 Noise on ‘Bit=1’ Speckle Noise Poisson Noise Gaussian Noise Salt and Paper Noise VI CONCLUSION The increasing amount of digital exchangeable data generates new information security needs. Multimedia documents and specifically images are also affected. Users expect that robust solutions will ensure copyright protection and also guarantee the authenticity of multimedia documents. In the current state of research, it is difficult to affirm which watermarking approach seems most suitable to ensure an integrity service adapted to images and more general way to multimedia documents. The tool used for the execution of this algorithm was „Matlab‟. The aim of the program is to replace the LSB of the base image with the MSB of the watermark. REFERENCES Journal Papers: [1] Preeti Gupta, “Cryptography based digital image watermarking algorithm to increase security of watermark data”, International Journal of Scientific & Engineering Research, Volume 3, Issue 9 (September 2012) ISSN 2229-5518 [2] Manpreet Kaur, Sonika Jindal, Sunny Behal, “A Study of Digital Image Watermarking”, IJREAS ,Volume 2, Issue 2 (Febru ry 2012) pp-126-136 [3] B Surekha, Dr GN Swamy, “A Spatial Domain Public Image Watermarking”, International Journal of Security and Its Applications Vol. 5 No. 1, January, 2011 [4] Robert, L., and T. Shanmugapriya, “A Study on Digital Watermarking Techniques ”, International Journal of Recent Trends in Engineering, vol. 1, no. 2, pp. 223-225, 2009. [5] H.Arafat Ali, “Qualitative Spatial Image Data Hiding for Secure Data Transmission”, GVIP Journal,Volume 7,Issue 2 , pages 35- 37, 2, August 2007 [6] Cox, Miller and Bloom, “Digital watermarking”, 1st edition 2001, San Fransisco: Morgan Kaufmann Publisher [7] Brigitte Jellinek, “Invisible Watermarking of Digital Images for Copyright Protection” University Salzburg, pp. 9 – 17, Jan 2000. [8] Lu, C-S., Liao, H-Y., M., Huang, S-K., Sze, C-J., “Cocktail Watermarking on Images”, 3rd International Workshop on Information Hiding, Dresden, Germany, Sep 29-Oct. 1, 1999 [9] Dr. Martin Kutter and Dr. Frederic Jordan, “Digital Watermarking Technology”, AlpVision, Switzerland, pp 1 – 4M Ozaki, Y. Adachi, Y. Iwahori, and N. Ishii, Application of fuzzy theory to writer recognition of Chinese characters, International Journal of Modelling and Simulation, 18(2), 1998, 112-116. [10] J.J.K.O. Ruanaidh, W.J.Dowling, F.M. Boland, “Watermarking Digital Images for Copyright Protection”, IEEE ProcVis. Image Signal Process. Vol. 143, No. 4, pp 250 - 254. August 1996. Thesis: [11] Mitra Abbasfard “Digital Image Watermarking Robustness: A Comparative Study”, Delft University of Technologyrertre , 2009: 74 pages [12] Harpuneet Kaur , “Robust Image Watermarking Technique to Increase Security and Capacity of Watermark Data” Thapar Institute of Engineering & Technology , Patiala , India ,May 2006 : 79 pages [13] K. Vanwasi, “Digital Watermarking - Steering the future of security” Edition 2001, available at http://www.networkmagazineindia.com/200108/security1.html [14] Saraju Prasad Mohanty, “Watermarking of Digital Images”, Indian Institute of Science Bangalore, pp. 1.3 – 1.6, January 1999 Books: [15] Andreas Koschan, Mongi Abidi, “ Digital Colour Image Processing” Published by John Wiley & Sons, Inc., Hoboken, New Jersey,Published simultaneously in Canada.