scispace - formally typeset
Proceedings ArticleDOI

An efficient spatial domain based image watermarking using shell based pixel selection

Reads0
Chats0
TLDR
A new algorithm in spatial domain with shell based pixel selection for watermark embedding and extraction gives sensitivity and converting watermark to logical matrix and storing it in each component of pixel gives higher capacity than traditional methods.
Abstract
In this paper, we implemented a new algorithm in spatial domain with shell based pixel selection for watermark embedding and extraction. Here, the watermark is first converted into binary image by local thresholding and then converted into a logical matrix. Before embedding, each value of logical matrix is XOR-ed using a random 8-bit key to generate modified logical matrix. Next, the pixel of host image is selected by shell-based technique along row and column alternatively, starting from position (2, 2) and moving diagonally. To prevent duplicate selection of pixel two direct-address tables are maintained. Each pixel is sliced into red, green, blue and alpha components and bits from modified logical matrix are embedded into LSB of each component and finally an extraction key is generated. To detect tampering in an image, watermark is extracted using key and compared with original watermark. The proposed method is evaluated with benchmark dataset and we obtained a favorable result in terms of PSNR and BER. We reported the results of various kinds of image manipulation to assess the performance of the proposed method by drawing a comparative study of the original watermark and the watermark extracted from a manipulated image. Shell based pixel selection gives sensitivity and converting watermark to logical matrix and storing it in each component of pixel gives higher capacity than traditional methods.

read more

Citations
More filters
Journal ArticleDOI

Performance comparison of various watermarking techniques

TL;DR: A comparative study of various techniques used in the field of watermarking is provided here by measuring their performance in terms of various characteristics and a number of performance measures used by various researchers are discussed here along with possible attacks.
Journal ArticleDOI

RST invariant robust video watermarking algorithm using quaternion curvelet transform

TL;DR: The experimental results prove that the proposed method is promising in terms of robustness, imperceptibility and security to most notable image processing attacks, geometrical attacks, and video processing attacks among the various conventional watermarking algorithms.
Book

Essential PhotoShop 6 for Web Professionals

TL;DR: In this article, the authors present a method for making images Web-ready by adding color to black and white images using color contrast and contrast adjustment, along with other methods of color adjustment.
Book ChapterDOI

Secure and Robust Watermarking Scheme in Frequency Domain Using Chaotic Logistic Map Encoding

TL;DR: Performance evaluations show that the proposed watermarking scheme for stereo images is highly secure as well as strongly robust against different kinds of attacks.
Book ChapterDOI

Comparative Analysis: Role of Meta-Heuristic Algorithms in Image Watermarking Optimization

TL;DR: In this article, a DCT and DWT based hybrid watermarking system is implemented to provide copyright protection to the content and is secured by using Arnold transform, which shows good performance in terms of PSNR, NC, and BER values.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Book

Digital Watermarking and Steganography

TL;DR: This new edition now contains essential information on steganalysis and steganography, and digital watermark embedding is given a complete update with new processes and applications.
Journal ArticleDOI

Detection of LSB steganography via sample pair analysis

TL;DR: In this article, the authors introduce a new approach to detecting least significant bit (LSB) steganography in digital signals such as images and audio, which is based on some statistical measures of sample pairs that are highly sensitive to LSB embedding operations.
Journal ArticleDOI

High capacity image steganographic model

TL;DR: An image steganographic model is proposed that is based on variable-size LSB insertion to maximise the embedding capacity while maintaining image fidelity and two methods are provided to deal with the security issue when using the proposed model.