scispace - formally typeset
Search or ask a question
Journal ArticleDOI

A Comprehensive Approach to Image Watermarking, Encryption and Steganography

06 Nov 2015-Computer and Information Science-Vol. 8, Iss: 4, pp 32-39
TL;DR: This paper aims to combine the features of watermarking, image encryption as well as image steganography to provide reliable and secure data transmission.
Abstract: Steganography, water marking and encryption are widely used in image processing and communication. A general practice is to use them independently or in combination of two - for e.g. data hiding with encryption or steganography alone. This paper aims to combine the features of watermarking, image encryption as well as image steganography to provide reliable and secure data transmission .The basics of data hiding and encryption are explained. The first step involves inserting the required watermark on the image at the optimum bit plane. The second step is to use an RSA hash to actually encrypt the image. The final step involves obtaining a cover image and hiding the encrypted image within this cover image. A set of metrics will be used for evaluation of the effectiveness of the digital water marking. The list includes Mean Squared Error, Peak Signal to Noise Ratio and Feature Similarity.

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI
TL;DR: This paper will utilize three techniques i.e. Discreet Wavelet Transform, Neural Network and RSA encryption for image watermarking and the performance of the proposed technique will be measured on the basis of PSNR, MSE, BCR, BER and NCC in MATLAB R2010a environment.
Abstract: Image watermarking is the process of the hiding the one image into other image for the copyright protection. The process of watermarking must be done in this way that the pixels of the original image must remain in its original HD form. A lot of work has been done in this context in previous years but some techniques have their own applications, drawbacks as well as advantages. So, this paper will utilize three techniques i.e. Discreet Wavelet Transform (DWT), Neural Network (NN) and RSA encryption for image watermarking. In the end the performance of the proposed technique will be measured on the basis of PSNR, MSE, BCR, BER and NCC in MATLAB R2010a environment.

19 citations


Cites background from "A Comprehensive Approach to Image W..."

  • ...[19] combine the features of watermarking, image encryption in addition to image steganography to give consistent and protected data transmission ....

    [...]

References
More filters
Journal ArticleDOI
Min Wu1, Bede Liu1
TL;DR: The proposed data embedding method can be used to detect unauthorized use of a digitized signature, and annotate or authenticate binary documents, and presents analysis and discussions on robustness and security issues.
Abstract: This paper proposes a new method to embed data in binary images, including scanned text, figures, and signatures. The method manipulates "flippable" pixels to enforce specific block-based relationship in order to embed a significant amount of data without causing noticeable artifacts. Shuffling is applied before embedding to equalize the uneven embedding capacity from region to region. The hidden data can be extracted without using the original image, and can also be accurately extracted after high quality printing and scanning with the help of a few registration marks. The proposed data embedding method can be used to detect unauthorized use of a digitized signature, and annotate or authenticate binary documents. The paper also presents analysis and discussions on robustness and security issues.

395 citations

Journal ArticleDOI
TL;DR: The algorithm can embed efficiently a large amount of data that has been reached to 75% of the image size with high quality of the output and make comparison with the previous Steganography algorithms like S-Tools.
Abstract: This study deals with constructing and implementing new algorithm based on hiding a large amount of data (image, audio, text) file into color BMP image. We have been used adaptive image filtering and adaptive image segmentation with bits replacement on the appropriate pixels. These pixels are selected randomly rather than sequentially by using new concept defined by main cases with their sub cases for each byte in one pixel. This concept based on both visual and statistical. According to the steps of design, we have been concluded 16 main cases with their sub cases that cover all aspects of the input data into color bitmap image. High security layers have been proposed through three layers to make it difficult to break through the encryption of the input data and confuse steganalysis too. Our results against statistical and visual attacks are discussed and make comparison with the previous Steganography algorithms like S-Tools. We show that our algorithm can embed efficiently a large amount of data that has been reached to 75% of the image size with high quality of the output.

172 citations


"A Comprehensive Approach to Image W..." refers background or methods in this paper

  • ...In 2007, Nameer N. EL Emam proposed a type of LSB insertion steganographic method which made it difficult for unauthorised steganography analysis tools to extract the data (Emam, 2007)....

    [...]

  • ...In digital watermarking, the watermark is always related to the content and both the content and the watermark are essential to the receiver....

    [...]

01 May 2001
TL;DR: A web based image authentication method based in digital watermarking can provide more controls to image owners and conveniences to clients who want to get authenticity of image by integrating benefits of using Internet to the watermark system.
Abstract: The demand of security is getting higher in these days due to easy reproduction of digitally created multimedia data. Digital watermark is the emerging technique to embed secret information into content for copyright protection and authentication. Watermark is embedded within an image that alteration and modification to the watermarked image can be detected in a fragile watermark system. Watermark detection is blind that does not require an original image and it is invisible to avoid revealing secret information to malicious attackers. A web based image authentication method based in digital watermarking is described in this paper. It can provide more controls to image owners and conveniences to clients who want to get authenticity of image by integrating benefits of using Internet to the watermark system.

55 citations

Journal Article
TL;DR: A novel approach of image embedding is introduced that embeds three images in one image and includes, as a special case of data embedding, information hiding, identifying and authenticating text embedded within the digital images.
Abstract: In this study, a novel approach of image embedding is introduced. The proposed method consists of three main steps. First, the edge of the image is detected using Sobel mask filters. Second, the least significant bit LSB of each pixel is used. Finally, a gray level connectivity is applied using a fuzzy approach and the ASCII code is used for information hiding. The prior bit of the LSB represents the edged image after gray level connectivity, and the remaining six bits represent the original image with very little difference in contrast. The proposed method embeds three images in one image and includes, as a special case of data embedding, information hiding, identifying and authenticating text embedded within the digital images. Image embedding method is considered to be one of the good compression methods, in terms of reserving memory space. Moreover, information hiding within digital image can be used for security information transfer. The creation and extraction of three embedded images, and hiding text information is discussed and illustrated, in the following sections. Keywords—Image embedding, Edge detection, gray level connectivity, information hiding, digital image compression.

43 citations

Proceedings ArticleDOI
06 Aug 2008
TL;DR: A heuristic approach for Information hiding in the form of multimedia objects or text using Steganography is proposed keeping in mind two considerations - Size and degree of security.
Abstract: The dynamic growth in the field of Information communication has hiked the ease of Information transmission. But this type of real advancement in other sense has explored so many possibilities of information being snooped, at the time of communication in between the sender and the intended receiver. So, day by day Information Security is becoming an inseparable part of Computing and Communication. Various tools are available in order to address those issues and in them Steganography plays a significant role. In this paper, a heuristic approach for Information hiding in the form of multimedia objects or text using Steganography is proposed keeping in mind two considerations - Size and degree of security. Here, the Information is hidden behind an image in the form of an encoded matrix which is obtained from the bit matrix of the embedded object.

18 citations