A New Digital Watermarking Algorithm Using Combination of Least Significant Bit (LSB) and Inverse Bit

11/2011; 3(4).
Source: arXiv

ABSTRACT In this paper, we introduce a new digital watermarking algorithm using least
significant bit (LSB). LSB is used because of its little effect on the image.
This new algorithm is using LSB by inversing the binary values of the watermark
text and shifting the watermark according to the odd or even number of pixel
coordinates of image before embedding the watermark. The proposed algorithm is
flexible depending on the length of the watermark text. If the length of the
watermark text is more than ((MxN)/8)-2 the proposed algorithm will also embed
the extra of the watermark text in the second LSB. We compare our proposed
algorithm with the 1-LSB algorithm and Lee's algorithm using Peak
signal-to-noise ratio (PSNR). This new algorithm improved its quality of the
watermarked image. We also attack the watermarked image by using cropping and
adding noise and we got good results as well.

  • [Show abstract] [Hide abstract]
    ABSTRACT: For any digital watermarking system many requirements should be available. The most important requirements are imperceptibility (quality), and robustness. Many studies have tried to enhance these requirements by using different techniques and methods. In this study, a trade-off between the two requirements to find the optimal value based on the existing Dual Intermediate Significant Bit (DISB) and makes a balance between them. However, this is done by finding the best robustness with an acceptable image quality, so that any change on the pixel by attacks would minimally affect the selected bit. The results show that the trade-off have been done and make a balance between the image quality and robustness.
    2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT); 12/2013
  • [Show abstract] [Hide abstract]
    ABSTRACT: The rapid evolution in data transmission by the wide use of the internet, as provided an urgent need to prevent penetration and maintain the confidentiality of this data through the applying of some techniques to hide data within the carrier for example, text, image, audio and Video. A variety of image watermarking techniques have been published in the last few years which attempts to develop techniques and methods which are used to obtain better results through the fact that the changes that took place after the concealment is visible to the human eye. Digital image watermarking is one of the general information hiding problem. This study is to highlight some of these studies and analysis for use in future research and development to get to the best results.
    Advanced Computer Science Applications and Technologies (ACSAT), 2012 International Conference on; 01/2012
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: A non-secure transmission channel is considered as a major challenge in remote sensing. The commercial value of satellite imagery and the sensitive information it contains led engineers to look for different means to secure the ownership of satellite imagery and preventing the illegal use of these resources. Therefore, a blind multi-watermarking scheme for copyright protection and image authentication is proposed. The multi-watermarking scheme is based on designing two back-to-back encoders. The first encoder embeds a robust ownership watermark in a frequency domain of satellite imagery using Discrete Cosine Transform (DCT) approach. Whereas, the second encoder embeds a fragile authentication information into a spatial domain of a watermarked image using Message Digest Encryption Key algorithm. This study was conducted on DubaiSat-1 satellite imagery owned by Emirates Institution for Advanced Science and Technology (EIAST). The simulation results demonstrate that the proposed scheme is robust against many intentional and unintentional attacks. Moreover, it shows a very high ability for tamper detection.
    Proceedings of SPIE - The International Society for Optical Engineering 09/2013; DOI:10.1117/12.2021855 · 0.20 Impact Factor

Full-text (2 Sources)

Available from
Jun 2, 2014