SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.4, July 2012
DOI : 10.5121/ijist.2012.2409 95
ANALYSIS OF IMAGE WATERMARKING USING LEAST
SIGNIFICANT BIT ALGORITHM
Puneet Kr Sharma1
and Rajni2
1
Research Scholar, Deptt. of ECE, SBSCET, Ferozepur
puneet22.1981@rediffmail.com
2
Assistant Professor, Deptt. of ECE, SBSCET, Ferozepur
rajni_c123@yahoo.co.in
ABSTRACT
The rapid advancement of internet has made it easier to send the data/image accurate and faster to the
destination. But thisadvantage is also accompanied with the disadvantage of modifying and misusing the
valuable information through intercepting or hacking.So In order to transfer the data/image to the intended
user at destination without anyalterations or modifications, there are many approaches like Cryptography,
Watermarking and Steganography. This paper presents the general overview of image watermarking and
different security issues. In this paper, Image Watermarking using Least Significant Bit (LSB) algorithm
has been used for embedding the message/logo into the image. This work has been implemented through
MATLAB.
KEYWORDS
Least Significant Bit (LSB), JPEG (Joint Photographic Experts Group), MPEG (Moving Picture Experts
Group), Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR)
1. INTRODUCTION
The concept of Image watermarking mainly came into existence in 1990s because of the
widespread of the Internet. At that time an invisible watermark message was inserted into a image
which is to be transfered such that the invisible message will survive intended or unintended
attacks. The first example of a technology similar to digital watermarking is a patent filed in 1954
by Emil Hembrooke for identifying music works. In year 1988, Komatsu and Tominaga was
probably the first to use the term “digital watermarking” [1]. The purpose of digital watermarks is
to provide copyright protection for intellectual property that's in digital format. The
information/logo are embedded in image is called a digital image watermark. The
information/logo where the watermark is to be embedded is called the host image [2, 3].
Digital image watermarking technique provides perceptibility. A watermarking system is of no
importance to anyone if it degeade or distract the cover image to the extent that it being useless,
or highly distracting to its intended user.An ideal watermarked imaged should appear
indistinguishable from the original image even if one uses highest quality equipment. The ideal
watermark must be highly robust so as to be highly resistant to any distortion that can be
introduced during normal use (unintentional attack), or a deliberate effort to remove or alter the
watermark present in the data/image being transferred (intentional attack). Integrity and Security
are also two essential requirements of ideal watermarking [4, 5]. A robust watermark is onewhich
can withstand a wide variety of attacks both incidental (Means modifications applied with a
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.4, July 2012
96
purpose other than to hamper the watermark) and malicious (attacks aimed typically to remove or
weaken the watermark) [6].
In the current trends of the world, due to the advancement in technologies, most of the individuals
prefer to use the internet as the primary medium to transfer data from one end to another across
the world. The data transmission is made very simple, fast and accurate using the internet.
However, security threat is the main issue while sending data over the internet. The
private/confidential data can be hacked in many ways. Therefore it becomes mandatory to take
data security into consideration. Data security basically means protection of data from
unauthorized users or hackers and providing high security to prevent data alteration. This area of
data security has gained more attention over the recent period of time due to the massive increase
in data transfer rate over the internet [1, 2]. Information security consists of the measures adopted
to prevent the unauthorized use or change of data or capabilities [3, 4]. Information security is the
protection of information, system and hardware that use, store, and transmits this information.
The data is transmitted from source to destination to the intended user but the hackers might hack
the same data in order to access or manipulate the original data. These types of attacks are
formally known as Security Attacks. In order to circumvent the problem of the security attacks in
data transfers over the internet, many techniques have been developed like: Cryptography,
Stegnography and Digital Image Watermarking.
Digital Image Watermarking is one of the prominent method to fulfill the gap between copyright
issues and digital distribution of data. It is mainly based on Steganographic techniques and
enables useful safety mechanisms. It acts as a very good medium for copyright issues as it
embeds a symbol or a logo in the form of a Watermark, which cannot be altered manually. One
critical factor, which is to be kept in mind while using Watermarking, is to avert any alterations to
the originality of the image after embedding the data. When the image with the secret data is
transmitted over the internet, unauthorized parties may want to hack the data hidden over the
image or change it. If the originality of the image has been altered, then it will be easier to hack
the information by unauthorized persons. In order to improve the security, the Digital Watermarks
are predominantly inserted as transformed digital signal into the source data using key based
embedding algorithm and pseudo noise pattern. The best known Watermarking method that
works in the spatial domain is the Least Significant Bit (LSB), which replaces the least significant
bits of pixels selected to hide the information.
2. Process of Watermarking
The process of watermarking begins when the encoder inserts watermark into image, producing
watermarked image. The decoder extracts and validates the presence of watermarked input or
unmarked input. If the watermark is visible, the decoder is not needed. Otherwise, the decoder
may or may not require a copy of decoder to do this job. If input image and/or watermarked
image are used, the watermarking system is called a private or restricted-key system; otherwise,
the system is public or unrestricted-key system.
The decoder is so designed to process both marked as well as unmarked image. Finally, the
decoder needs to correlate the extracted watermark with original image and compare the result to
a predefined threshold that sets the degree of similarity accepted as a match. If the correlation
matches the threshold value, then watermark is detected i.e. original image belong to the user
otherwise the data does not belong to the user [8, 9].
Digital image watermarking is similar to the concept of watermarking physical objects with the
difference that the watermarking technique is used for digital content instead of physical objects.
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.4, July 2012
97
In digital image watermarking a secret information or logo is embedded in another image in an
impercitible manner. This secret information or logo is called watermark and it contains some
metadata, like security or copyright information about the main data/image. The main image in
which the watermark is embedded is known as cover image since it covers the watermark. The
digital image watermarking system essentially consists of a watermark embedder and a
watermark detector as shown in figure 1.1.
Figure 1.1 Digital Image Watermarking
The watermark embedder inserts a watermark onto the cover image and the watermark detector
detects the presence of watermark information/logo. Sometime a watermark key is also used
during the process of embedding and detecting watermarks. The watermark key has a one-to-one
relation with watermark information. The watermark key is private and known to only intended
users and it ensures that only desirable set of users can detect the watermark. Further, note that
the communication channel can be noisy and hostile (i.e., prone to security attacks) and hence the
digital image watermarking techniques should be resilient to both noise and security attacks [7].
3. Least Significant Bit Modification
The most common method of watermark embedding is to to embed the watermark into the least-
significant-bits of the cover object [6]. Despite being a simple method, LSB substitution suffers
from many drawbacks. Although it can survive transformations like cropping, any addition of
undesirable noise or lossy compression but a more sophesticated attack thatcould simply set the
LSB bits of each pixel to one can fully defeat the Watermark with negligible impact on the cover
object.Once the algorithm is known to a hacker, the embedded watermark could be easily
modified by him without any difficulty.
A more sophesticated approach over conventional LSB method would be to use a pseudo-
random number generator which determine the pixels to be used for embedding watermark based
on a given key[6]. Security of the watermark would be enhanced greatly as the Watermark could
now be no longer is easily viewable to the hackers or any other unintended user. Although this
algorithm is still vulnerable to replacing the LSB’s with a constant value.
4. Results
The result shown below are of the large watermark embedded into a original image using LSB
embedding algorithm, which uses the logo as watermark and spreads it out to full image size.
Results from LSB substitution closely match with the expected one. The watermarked image
shows slight but unnoticeable degradation, while the watermark(logo) was recovered perfectly.
In this method consider the binary value of an image pixel as
00100111 11101001 11001000 00100111 11001000 11101001
11001000 00100111
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.4, July 2012
98
We will hide a binary value for say 10000011 by changing only the LSB of the above mentioned
image pixel value. The result will be as following
00100111 11101000 11001000 00100110 11001000 11101000
11001001 00100111
In this way a watermark is being embedded in the image data by changing only the LSB of the
image data. The Mean Square Error (MSE) and the Peak Signal to Noise Ratio (PSNR) are the
two error measurement methods which are used to compare image compression quality. This ratio
is used as a quality measurement benchmark between the original and a compressed image. The
MSE represents the cumulative squared error between the compressed and the original image,
whereas PSNR represents a measure of the peak error. The lower the value of MSE, the lower
will be the error. To compute the PSNR, the mean-squared error is first calculated using the
following equation:
 =	
∑ 		
, 
 − 
, 

,
 ∗ 
Where M and N are the number of rows and columns in the input images, respectively and I1
(m, n) is the original image, I2 (m, n) is the Watermarked image. The PSNR is calculated using
the following equation:
 = 10	 log	 


	
Where R represents maximum fluctuation or value in the image, its value is 255 for 8 bit
unsigned number.
TABLE 1. PSNR  MSE for Different Bit Subsitution
Method PSNR MSE
LSB or 1st Bit Substitution 55.8784 0.1680
2nd
Bit Substitution 49.7986 0.6811
3rd
Bit Substitution 43.9396 2.6249
4th
Bit Substitution 37.8535 10.6593
5th
Bit Substitution 31.9717 41.2961
6th
Bit Substitution 26.0475 161.5588
7th
Bit Substitution 19.8117 679.0598
MSB or 8th
Bit Substitution 14.3467 2.3900e+003
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.4, July 2012
99
Figure1.Logo to be embedded in image Figure.2.Watermarked Image with LSB
[
Figure.3.Watermarked Image 2nd
bit substitution Figure.4.Watermarked Image 3rd
bit substitution
Figure.5.Watermarked Image 4th
bit substitution Figure.6.Watermarked Image 5th
bit substitution
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.4, July 2012
100
Figure.7.Watermarked Image 6th
bit substitution Figure.8.Watermarked Image 7th
bit substitution
Figure.9.Watermarked Image 8th
bit substitution Figure.10. Recovered logo/ Watermark
6. CONCLUSIONS
This paper investigates the classification, attacks and methods of image watermarking and
evaluates LSB based digital watermarking scheme with different bit substitution from LSB to
MSB in image. After we have embedded the secret data in the first bit i.e. LSB in the image we
got Watermarked Image without noticeable distortion on it. However when we embed the data in
the consequent bits i.e. second towards last MSB bit, the image start distorted. The PSNR and
MSE values are calculated and shown in Table1.
REFERENCES
[1] Bender, W., Gruhl, D., Morimoto, N. and Lu, A(1996).: Techniques for data hiding. IBM Systems
Journal, vol. 35, nos. 34.
[2] Saraju Prasad Mohanty(,January 1999 )“Watermarking of Digital Images”, Submitted at Indian
Institute of Science Bangalore, pp. 1.3 – 1.6,.
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.4, July 2012
101
[3] Katzenbeisser, S. and Petitcolas, F(1999).: Information hiding techniques for steganography and
digital watermarking. Artech House Books.
[4] Van Dijk, M. and Willems, F(May 15-16, 2001).: Embedding information in grayscale images. Proc.
22
nd
Symposium on Information and Communication Theory in the Benelux, pp. 147-154, Enschede,
the Netherlands.
[5] A. Nikolaidis, S. Tsekeridou, A. Tefas, V Solachidi(Oct. 2001), “A survey on watermarking
application scenarios and related attacks”, IEEE international Conference on Image Processing, Vol.
3, pp. 991– 993.
[6] Frank Hartung, Martin Kutter(July 1999), “Multimedia Watermarking Techniques”, Proceedings of
The IEEE, Vol. 87, No. 7, pp. 1085 – 1103.
[7] Brigitte Jellinek( Jan 2000), “Invisible Watermarking of Digital Images for Copyright Protection”
submitted at University Salzburg, pp. 9 – 17.
[8] K. Watermarking digital Image and video data. IEEE Signal Processing Magazine, 17:20–46, 2000
[9] C. Rey and J.L. Dugelay(2002). A survey of watermarking algorithms for image authentication.
EURASIP Journal on Applied Signal Processing, 6:613–621.
Authors
Mrs. Rajni is currently Assistant Professor at SBS College of Engineering and Technology, Punjab, India.
She has been pursuing PhD from SLIET, Longowal. She has completed her M.E. from NITTTR,
Chandigarh, India, B.Tech. from NIT, Kurukshetra, India. She has about fourteen years of academic
experience and two years industrial experience. Her areas of interest includes Wireless communication,
Antenna design.
Mr. Puneet Sharma is student at SBS College of Engineering and Technology, Punjab. He has done
M.B.A from G.J.U, Hissar ,Haryana ,B.tech from P.T.U, Jalandhar,India. He has about nine years of
academic experience and two years of industrial experience. His area of interest includes Image
processing. Digital design.

More Related Content

What's hot

Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computingeSAT Publishing House
 
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...IRJET Journal
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
 
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...IRJET Journal
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterkingeSAT Publishing House
 
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET-  	  Lossless Encryption Technique for Finger Biometric ImagesIRJET-  	  Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric ImagesIRJET Journal
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemIJSRD
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyIRJET Journal
 
Digital water marking
Digital water markingDigital water marking
Digital water markingMd Aktar
 
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...IRJET Journal
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationIJTET Journal
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET Journal
 
A robust and secure visible watermarking scheme based on multi
A robust and secure visible watermarking scheme based on multiA robust and secure visible watermarking scheme based on multi
A robust and secure visible watermarking scheme based on multiIAEME Publication
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 

What's hot (18)

Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
 
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A Survey
 
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterking
 
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET-  	  Lossless Encryption Technique for Finger Biometric ImagesIRJET-  	  Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure Communication
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
 
A robust and secure visible watermarking scheme based on multi
A robust and secure visible watermarking scheme based on multiA robust and secure visible watermarking scheme based on multi
A robust and secure visible watermarking scheme based on multi
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 

Similar to ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM

INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...cscpconf
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageIOSR Journals
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingEditor IJMTER
 
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...Editor Jacotech
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.IRJET Journal
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET Journal
 
Digital watermarking on medical images using dwt
Digital watermarking on medical images using dwtDigital watermarking on medical images using dwt
Digital watermarking on medical images using dwtIAEME Publication
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...IRJET Journal
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterkingeSAT Journals
 

Similar to ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM (20)

INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
 
1709 1715
1709 17151709 1715
1709 1715
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale Image
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image Watermarking
 
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
 
G1803063741
G1803063741G1803063741
G1803063741
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud Computing
 
Digital watermarking on medical images using dwt
Digital watermarking on medical images using dwtDigital watermarking on medical images using dwt
Digital watermarking on medical images using dwt
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterking
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 

More from ijistjournal

Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...ijistjournal
 
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINijistjournal
 
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDYDECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDYijistjournal
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...ijistjournal
 
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...ijistjournal
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...ijistjournal
 
Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...ijistjournal
 
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWSTOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWSijistjournal
 
Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...ijistjournal
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
 
Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...ijistjournal
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...ijistjournal
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
 
Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...ijistjournal
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)ijistjournal
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...ijistjournal
 
Design and Implementation of LZW Data Compression Algorithm
Design and Implementation of LZW Data Compression AlgorithmDesign and Implementation of LZW Data Compression Algorithm
Design and Implementation of LZW Data Compression Algorithmijistjournal
 
Online Paper Submission - 5th International Conference on Soft Computing, Art...
Online Paper Submission - 5th International Conference on Soft Computing, Art...Online Paper Submission - 5th International Conference on Soft Computing, Art...
Online Paper Submission - 5th International Conference on Soft Computing, Art...ijistjournal
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...ijistjournal
 
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTK
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTKPUNJABI SPEECH SYNTHESIS SYSTEM USING HTK
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTKijistjournal
 

More from ijistjournal (20)

Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...
 
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
 
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDYDECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDY
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
 
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...
 
Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...
 
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWSTOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
 
Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
 
Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...
 
Design and Implementation of LZW Data Compression Algorithm
Design and Implementation of LZW Data Compression AlgorithmDesign and Implementation of LZW Data Compression Algorithm
Design and Implementation of LZW Data Compression Algorithm
 
Online Paper Submission - 5th International Conference on Soft Computing, Art...
Online Paper Submission - 5th International Conference on Soft Computing, Art...Online Paper Submission - 5th International Conference on Soft Computing, Art...
Online Paper Submission - 5th International Conference on Soft Computing, Art...
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...
 
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTK
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTKPUNJABI SPEECH SYNTHESIS SYSTEM USING HTK
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTK
 

Recently uploaded

Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoĂŁo Esperancinha
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 

Recently uploaded (20)

Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 

ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM

  • 1. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.4, July 2012 DOI : 10.5121/ijist.2012.2409 95 ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM Puneet Kr Sharma1 and Rajni2 1 Research Scholar, Deptt. of ECE, SBSCET, Ferozepur puneet22.1981@rediffmail.com 2 Assistant Professor, Deptt. of ECE, SBSCET, Ferozepur rajni_c123@yahoo.co.in ABSTRACT The rapid advancement of internet has made it easier to send the data/image accurate and faster to the destination. But thisadvantage is also accompanied with the disadvantage of modifying and misusing the valuable information through intercepting or hacking.So In order to transfer the data/image to the intended user at destination without anyalterations or modifications, there are many approaches like Cryptography, Watermarking and Steganography. This paper presents the general overview of image watermarking and different security issues. In this paper, Image Watermarking using Least Significant Bit (LSB) algorithm has been used for embedding the message/logo into the image. This work has been implemented through MATLAB. KEYWORDS Least Significant Bit (LSB), JPEG (Joint Photographic Experts Group), MPEG (Moving Picture Experts Group), Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR) 1. INTRODUCTION The concept of Image watermarking mainly came into existence in 1990s because of the widespread of the Internet. At that time an invisible watermark message was inserted into a image which is to be transfered such that the invisible message will survive intended or unintended attacks. The first example of a technology similar to digital watermarking is a patent filed in 1954 by Emil Hembrooke for identifying music works. In year 1988, Komatsu and Tominaga was probably the first to use the term “digital watermarking” [1]. The purpose of digital watermarks is to provide copyright protection for intellectual property that's in digital format. The information/logo are embedded in image is called a digital image watermark. The information/logo where the watermark is to be embedded is called the host image [2, 3]. Digital image watermarking technique provides perceptibility. A watermarking system is of no importance to anyone if it degeade or distract the cover image to the extent that it being useless, or highly distracting to its intended user.An ideal watermarked imaged should appear indistinguishable from the original image even if one uses highest quality equipment. The ideal watermark must be highly robust so as to be highly resistant to any distortion that can be introduced during normal use (unintentional attack), or a deliberate effort to remove or alter the watermark present in the data/image being transferred (intentional attack). Integrity and Security are also two essential requirements of ideal watermarking [4, 5]. A robust watermark is onewhich can withstand a wide variety of attacks both incidental (Means modifications applied with a
  • 2. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.4, July 2012 96 purpose other than to hamper the watermark) and malicious (attacks aimed typically to remove or weaken the watermark) [6]. In the current trends of the world, due to the advancement in technologies, most of the individuals prefer to use the internet as the primary medium to transfer data from one end to another across the world. The data transmission is made very simple, fast and accurate using the internet. However, security threat is the main issue while sending data over the internet. The private/confidential data can be hacked in many ways. Therefore it becomes mandatory to take data security into consideration. Data security basically means protection of data from unauthorized users or hackers and providing high security to prevent data alteration. This area of data security has gained more attention over the recent period of time due to the massive increase in data transfer rate over the internet [1, 2]. Information security consists of the measures adopted to prevent the unauthorized use or change of data or capabilities [3, 4]. Information security is the protection of information, system and hardware that use, store, and transmits this information. The data is transmitted from source to destination to the intended user but the hackers might hack the same data in order to access or manipulate the original data. These types of attacks are formally known as Security Attacks. In order to circumvent the problem of the security attacks in data transfers over the internet, many techniques have been developed like: Cryptography, Stegnography and Digital Image Watermarking. Digital Image Watermarking is one of the prominent method to fulfill the gap between copyright issues and digital distribution of data. It is mainly based on Steganographic techniques and enables useful safety mechanisms. It acts as a very good medium for copyright issues as it embeds a symbol or a logo in the form of a Watermark, which cannot be altered manually. One critical factor, which is to be kept in mind while using Watermarking, is to avert any alterations to the originality of the image after embedding the data. When the image with the secret data is transmitted over the internet, unauthorized parties may want to hack the data hidden over the image or change it. If the originality of the image has been altered, then it will be easier to hack the information by unauthorized persons. In order to improve the security, the Digital Watermarks are predominantly inserted as transformed digital signal into the source data using key based embedding algorithm and pseudo noise pattern. The best known Watermarking method that works in the spatial domain is the Least Significant Bit (LSB), which replaces the least significant bits of pixels selected to hide the information. 2. Process of Watermarking The process of watermarking begins when the encoder inserts watermark into image, producing watermarked image. The decoder extracts and validates the presence of watermarked input or unmarked input. If the watermark is visible, the decoder is not needed. Otherwise, the decoder may or may not require a copy of decoder to do this job. If input image and/or watermarked image are used, the watermarking system is called a private or restricted-key system; otherwise, the system is public or unrestricted-key system. The decoder is so designed to process both marked as well as unmarked image. Finally, the decoder needs to correlate the extracted watermark with original image and compare the result to a predefined threshold that sets the degree of similarity accepted as a match. If the correlation matches the threshold value, then watermark is detected i.e. original image belong to the user otherwise the data does not belong to the user [8, 9]. Digital image watermarking is similar to the concept of watermarking physical objects with the difference that the watermarking technique is used for digital content instead of physical objects.
  • 3. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.4, July 2012 97 In digital image watermarking a secret information or logo is embedded in another image in an impercitible manner. This secret information or logo is called watermark and it contains some metadata, like security or copyright information about the main data/image. The main image in which the watermark is embedded is known as cover image since it covers the watermark. The digital image watermarking system essentially consists of a watermark embedder and a watermark detector as shown in figure 1.1. Figure 1.1 Digital Image Watermarking The watermark embedder inserts a watermark onto the cover image and the watermark detector detects the presence of watermark information/logo. Sometime a watermark key is also used during the process of embedding and detecting watermarks. The watermark key has a one-to-one relation with watermark information. The watermark key is private and known to only intended users and it ensures that only desirable set of users can detect the watermark. Further, note that the communication channel can be noisy and hostile (i.e., prone to security attacks) and hence the digital image watermarking techniques should be resilient to both noise and security attacks [7]. 3. Least Significant Bit Modification The most common method of watermark embedding is to to embed the watermark into the least- significant-bits of the cover object [6]. Despite being a simple method, LSB substitution suffers from many drawbacks. Although it can survive transformations like cropping, any addition of undesirable noise or lossy compression but a more sophesticated attack thatcould simply set the LSB bits of each pixel to one can fully defeat the Watermark with negligible impact on the cover object.Once the algorithm is known to a hacker, the embedded watermark could be easily modified by him without any difficulty. A more sophesticated approach over conventional LSB method would be to use a pseudo- random number generator which determine the pixels to be used for embedding watermark based on a given key[6]. Security of the watermark would be enhanced greatly as the Watermark could now be no longer is easily viewable to the hackers or any other unintended user. Although this algorithm is still vulnerable to replacing the LSB’s with a constant value. 4. Results The result shown below are of the large watermark embedded into a original image using LSB embedding algorithm, which uses the logo as watermark and spreads it out to full image size. Results from LSB substitution closely match with the expected one. The watermarked image shows slight but unnoticeable degradation, while the watermark(logo) was recovered perfectly. In this method consider the binary value of an image pixel as 00100111 11101001 11001000 00100111 11001000 11101001 11001000 00100111
  • 4. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.4, July 2012 98 We will hide a binary value for say 10000011 by changing only the LSB of the above mentioned image pixel value. The result will be as following 00100111 11101000 11001000 00100110 11001000 11101000 11001001 00100111 In this way a watermark is being embedded in the image data by changing only the LSB of the image data. The Mean Square Error (MSE) and the Peak Signal to Noise Ratio (PSNR) are the two error measurement methods which are used to compare image compression quality. This ratio is used as a quality measurement benchmark between the original and a compressed image. The MSE represents the cumulative squared error between the compressed and the original image, whereas PSNR represents a measure of the peak error. The lower the value of MSE, the lower will be the error. To compute the PSNR, the mean-squared error is first calculated using the following equation: = ∑ , − , , ∗ Where M and N are the number of rows and columns in the input images, respectively and I1 (m, n) is the original image, I2 (m, n) is the Watermarked image. The PSNR is calculated using the following equation: = 10 log Where R represents maximum fluctuation or value in the image, its value is 255 for 8 bit unsigned number. TABLE 1. PSNR MSE for Different Bit Subsitution Method PSNR MSE LSB or 1st Bit Substitution 55.8784 0.1680 2nd Bit Substitution 49.7986 0.6811 3rd Bit Substitution 43.9396 2.6249 4th Bit Substitution 37.8535 10.6593 5th Bit Substitution 31.9717 41.2961 6th Bit Substitution 26.0475 161.5588 7th Bit Substitution 19.8117 679.0598 MSB or 8th Bit Substitution 14.3467 2.3900e+003
  • 5. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.4, July 2012 99 Figure1.Logo to be embedded in image Figure.2.Watermarked Image with LSB [ Figure.3.Watermarked Image 2nd bit substitution Figure.4.Watermarked Image 3rd bit substitution Figure.5.Watermarked Image 4th bit substitution Figure.6.Watermarked Image 5th bit substitution
  • 6. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.4, July 2012 100 Figure.7.Watermarked Image 6th bit substitution Figure.8.Watermarked Image 7th bit substitution Figure.9.Watermarked Image 8th bit substitution Figure.10. Recovered logo/ Watermark 6. CONCLUSIONS This paper investigates the classification, attacks and methods of image watermarking and evaluates LSB based digital watermarking scheme with different bit substitution from LSB to MSB in image. After we have embedded the secret data in the first bit i.e. LSB in the image we got Watermarked Image without noticeable distortion on it. However when we embed the data in the consequent bits i.e. second towards last MSB bit, the image start distorted. The PSNR and MSE values are calculated and shown in Table1. REFERENCES [1] Bender, W., Gruhl, D., Morimoto, N. and Lu, A(1996).: Techniques for data hiding. IBM Systems Journal, vol. 35, nos. 34. [2] Saraju Prasad Mohanty(,January 1999 )“Watermarking of Digital Images”, Submitted at Indian Institute of Science Bangalore, pp. 1.3 – 1.6,.
  • 7. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.4, July 2012 101 [3] Katzenbeisser, S. and Petitcolas, F(1999).: Information hiding techniques for steganography and digital watermarking. Artech House Books. [4] Van Dijk, M. and Willems, F(May 15-16, 2001).: Embedding information in grayscale images. Proc. 22 nd Symposium on Information and Communication Theory in the Benelux, pp. 147-154, Enschede, the Netherlands. [5] A. Nikolaidis, S. Tsekeridou, A. Tefas, V Solachidi(Oct. 2001), “A survey on watermarking application scenarios and related attacks”, IEEE international Conference on Image Processing, Vol. 3, pp. 991– 993. [6] Frank Hartung, Martin Kutter(July 1999), “Multimedia Watermarking Techniques”, Proceedings of The IEEE, Vol. 87, No. 7, pp. 1085 – 1103. [7] Brigitte Jellinek( Jan 2000), “Invisible Watermarking of Digital Images for Copyright Protection” submitted at University Salzburg, pp. 9 – 17. [8] K. Watermarking digital Image and video data. IEEE Signal Processing Magazine, 17:20–46, 2000 [9] C. Rey and J.L. Dugelay(2002). A survey of watermarking algorithms for image authentication. EURASIP Journal on Applied Signal Processing, 6:613–621. Authors Mrs. Rajni is currently Assistant Professor at SBS College of Engineering and Technology, Punjab, India. She has been pursuing PhD from SLIET, Longowal. She has completed her M.E. from NITTTR, Chandigarh, India, B.Tech. from NIT, Kurukshetra, India. She has about fourteen years of academic experience and two years industrial experience. Her areas of interest includes Wireless communication, Antenna design. Mr. Puneet Sharma is student at SBS College of Engineering and Technology, Punjab. He has done M.B.A from G.J.U, Hissar ,Haryana ,B.tech from P.T.U, Jalandhar,India. He has about nine years of academic experience and two years of industrial experience. His area of interest includes Image processing. Digital design.