Proceedings ArticleDOI
An efficient spatial domain based image watermarking using shell based pixel selection
Shubham Mathur,Akshay Dhingra,M. Prabukumar,L. Agilandeeswari,K. Muralibabu +4 more
- pp 2696-2702
Reads0
Chats0
TLDR
A new algorithm in spatial domain with shell based pixel selection for watermark embedding and extraction gives sensitivity and converting watermark to logical matrix and storing it in each component of pixel gives higher capacity than traditional methods.Abstract:
In this paper, we implemented a new algorithm in spatial domain with shell based pixel selection for watermark embedding and extraction. Here, the watermark is first converted into binary image by local thresholding and then converted into a logical matrix. Before embedding, each value of logical matrix is XOR-ed using a random 8-bit key to generate modified logical matrix. Next, the pixel of host image is selected by shell-based technique along row and column alternatively, starting from position (2, 2) and moving diagonally. To prevent duplicate selection of pixel two direct-address tables are maintained. Each pixel is sliced into red, green, blue and alpha components and bits from modified logical matrix are embedded into LSB of each component and finally an extraction key is generated. To detect tampering in an image, watermark is extracted using key and compared with original watermark. The proposed method is evaluated with benchmark dataset and we obtained a favorable result in terms of PSNR and BER. We reported the results of various kinds of image manipulation to assess the performance of the proposed method by drawing a comparative study of the original watermark and the watermark extracted from a manipulated image. Shell based pixel selection gives sensitivity and converting watermark to logical matrix and storing it in each component of pixel gives higher capacity than traditional methods.read more
Citations
More filters
Journal ArticleDOI
Performance comparison of various watermarking techniques
TL;DR: A comparative study of various techniques used in the field of watermarking is provided here by measuring their performance in terms of various characteristics and a number of performance measures used by various researchers are discussed here along with possible attacks.
Journal ArticleDOI
RST invariant robust video watermarking algorithm using quaternion curvelet transform
L. Agilandeeswari,K. Ganesan +1 more
TL;DR: The experimental results prove that the proposed method is promising in terms of robustness, imperceptibility and security to most notable image processing attacks, geometrical attacks, and video processing attacks among the various conventional watermarking algorithms.
Book
Essential PhotoShop 6 for Web Professionals
TL;DR: In this article, the authors present a method for making images Web-ready by adding color to black and white images using color contrast and contrast adjustment, along with other methods of color adjustment.
Book ChapterDOI
Secure and Robust Watermarking Scheme in Frequency Domain Using Chaotic Logistic Map Encoding
TL;DR: Performance evaluations show that the proposed watermarking scheme for stereo images is highly secure as well as strongly robust against different kinds of attacks.
Book ChapterDOI
Comparative Analysis: Role of Meta-Heuristic Algorithms in Image Watermarking Optimization
Preeti Garg,R. Rama Kishore +1 more
TL;DR: In this article, a DCT and DWT based hybrid watermarking system is implemented to provide copyright protection to the content and is secured by using Arnold transform, which shows good performance in terms of PSNR, NC, and BER values.
References
More filters
Journal ArticleDOI
Secure spread spectrum watermarking for multimedia
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Book
Digital Watermarking and Steganography
TL;DR: This new edition now contains essential information on steganalysis and steganography, and digital watermark embedding is given a complete update with new processes and applications.
Advances in Computing, Communications and Informatics (ICACCI)
Sabu M. Thampi,Michal Wozniak,Oge Marques,Dilip Krishnaswamy,Christian Callegari,Hideyuki Takagi,Zoran Bojkovic,Neeli R. Prasad,Jose M. Alcaraz Calero,Joel J. P. C. Rodrigues,Natarajan Meghanathan,Ravi Sandhu +11 more
Journal ArticleDOI
Detection of LSB steganography via sample pair analysis
TL;DR: In this article, the authors introduce a new approach to detecting least significant bit (LSB) steganography in digital signals such as images and audio, which is based on some statistical measures of sample pairs that are highly sensitive to LSB embedding operations.
Journal ArticleDOI
High capacity image steganographic model
TL;DR: An image steganographic model is proposed that is based on variable-size LSB insertion to maximise the embedding capacity while maintaining image fidelity and two methods are provided to deal with the security issue when using the proposed model.
Related Papers (5)
Watermark embedding and detecting methods, systems devices and components
Xiao-Ping Zhang,Kan Li +1 more