Image Watermarking Scheme Using LSB and Image Gradient

被引:16
|
作者
Bin Faheem, Zaid [1 ]
Ali, Mubashir [2 ]
Raza, Muhammad Ahsan [3 ]
Arslan, Farrukh [4 ]
Ali, Jehad [5 ,6 ]
Masud, Mehedi [7 ]
Shorfuzzaman, Mohammad [7 ]
机构
[1] Univ Engn & Technol, Dept Comp Engn, Taxila 47080, Pakistan
[2] Lahore Garrison Univ, Dept Software Engn, Lahore 54000, Pakistan
[3] Bahauddin Zakariya Univ, Dept Informat Technol, Multan 60000, Pakistan
[4] Univ Engn & Technol, Dept Elect Engn, Lahore 54000, Pakistan
[5] Ajou Univ, Dept Comp Engn, Suwon 16499, South Korea
[6] Ajou Univ, Dept AI Convergence Network, Suwon 16499, South Korea
[7] Taif Univ, Dept Comp Sci, Coll Comp & Informat Technol, POB 11099, At Taif 21944, Saudi Arabia
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 09期
关键词
substitution box; chaotic map; piecewise linear chaotic map; least significant bit; image gradient;
D O I
10.3390/app12094202
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
In the modern age, watermarking techniques are mandatory to secure digital communication over the internet. For an optimal technique, a high signal-to-noise ratio and normalized correctional is required. In this paper, a digital watermarking technique is proposed on the basis of the least significant bit through an image gradient and chaotic map. The image is segmented into noncorrelated blocks, and the gradient of each block is calculated. The gradient of the image expresses the rapid changes in an image. A chaotic substitution box (S-Box) is used to scramble the watermark according to a piecewise linear chaotic map (PWLCM). PWLCM has a positive Lyapunov exponent and better balance property as compared to other chaotic maps. This S-Box technique is capable of producing a disperse sequence with high nonlinearity in the generated sequence. Least significant bit is a simple technique for embedding but it has a high payload capacity and direct pixel manipulation. The embedding payload introduces a tradeoff between robustness and imperceptibility; hence, the image gradient is a technique to identify the best-suited place to embed a watermark and avoid image degradation. By modifying the least significant bits of the original image, the watermark signal is embedded according to the image gradient. In the image gradient, the direction and magnitude decide how much embeding can be done. In comparison with other methods, the experimental results show satisfactory progress in robustness against several image processing and geometrical attacks while maintaining the imperceptibility of the watermark signal.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Robustness of a blind image watermarking scheme
    Eggers, JJ
    Su, JK
    Girod, B
    [J]. 2000 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, 2000, : 17 - 20
  • [32] Adaptive reversible image watermarking scheme
    Chen, Chien-Chang
    Tsai, Yao-Hong
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (03) : 428 - 434
  • [33] A Robust Watermarking Scheme for City Image
    Jin, Ruichen
    Kim, Jongweon
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 303 - 314
  • [34] AN EFFICIENT DIGITAL IMAGE WATERMARKING SCHEME
    El-Iskandarani, M. A.
    Saad, Saad M.
    Abubahia, Ahmed. M.
    [J]. 42ND ANNUAL 2008 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2008, : 37 - 42
  • [35] Watermarking scheme for authentication of compressed image
    Hsieh, TH
    Li, CT
    Wang, S
    [J]. MULTIMEDIA SYSTEMS AND APPLICATIONS VI, 2003, 5241 : 1 - 9
  • [36] A wavelet based image watermarking scheme
    Huo, Feifei
    Gao, Xinbo
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP 2006, PROCEEDINGS, 2006, : 2573 - +
  • [37] Digital watermarking scheme for image authentication
    Priya, Lakshmi C., V
    Raj, Nelwin N. R.
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 2026 - 2030
  • [38] Fragile watermarking scheme for image authentication
    Lu, HT
    Shen, RM
    Chung, FL
    [J]. ELECTRONICS LETTERS, 2003, 39 (12) : 898 - 900
  • [39] Fragile Watermarking Scheme for Image Authentication
    Betancourth, Gerardo Pineda
    [J]. 2012 5TH INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTIONS (HSI 2012), 2012, : 168 - 174
  • [40] A cryptographically secure image watermarking scheme
    Ren, Jian
    Li, Tongtong
    [J]. MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 1013 - 1018