Abstract

The current paper presents a new digital watermarking method through bit replacement technology, which stores mul-tiple copies of the same data that is to be hidden in a scrambled form in the cover image. In this paper an indigenous approach is described for recovering the data from the damaged copies of the data under attack by applying a majority algorithm to find the closest twin of the embedded information. A new type of non-oblivious detection method is also proposed. The improvement in performance is supported through experimental results which show much enhancement in the visual and statistical invisibility of hidden data.

Highlights

  • Recent history has witnessed the rapid development in information technologies that has given an extended and easy access to digital information

  • The current paper presents a new digital watermarking method through bit replacement technology, which stores multiple copies of the same data that is to be hidden in a scrambled form in the cover image

  • The following results describe that the proposed algorithm is quite efficient for salt and pepper noise up to 40% and JPEG compression resulting in image quality distortion = 95%

Read more

Summary

Introduction

Recent history has witnessed the rapid development in information technologies that has given an extended and easy access to digital information. In this paper we utilize the invisible watermarking technique. This is used in public information settings such as digital image libraries, museums, and art galleries and in defense communication where data security is of prime importance [4]. Copyright protection is achieved by robust watermarking [6] while image authentication is usually achieved by fragile watermarking techniques [7,8,9]. Robust watermarking technique ensures the quality of the hidden information by several protection algorithms. Invertible watermarking is a new process which enables the exact recovery of the original image upon extraction of the embedded information. Confidentiality means that only the entitled persons have access to the images. Availability is the capacity that an image is available to the entitled persons in the normal conditions of access and exercise [13]

LSB Watermarking and Its Limitation
Attack and Distortion
Proposed Watermarking Technique for Data Authentication
Embedding the Digital Watermark
Recovery of the Embedded Watermark
Image Quality Metrics
Results and Discussions
Embedding of Watermark into Cover Image and Quality Metrics
Recovery of Watermark from Watermarked Image without Any Attack
Recovery of Watermark from Watermarked Image under Attacks
Construction of Different Recovered Logo Using Majority Algorithm Technique
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.