Comparison between improved histogram shifting and LSB (bit-plan mapping) in digital watermarking techniques

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Editing, reproduction and delivery of the digital multimedia are becoming particularly easier and closer with the existence of the internet and the availability of pervasive and strongly multimedia tools. Digital watermarking has emerged as a possible method to address these issues. For the proposed Histogram Shifting, modification of the histogram and shifting is applied for embedding the stage; furthermore the contribution in this method incorporated the threshold concept to improve the visual quality of the host image. The performance of the proposed watermarking schemes has been evaluated by using the watermarked images (standard images) of size 512×512 (gray scale) with a different amount of variables "random bit streams" used in the histogram sniffing. The simulations are performed in MATLAB 7 software environment and the visual quality of output image measured by PSNR metric. A comparison is made between the results of the proposed algorithm with the best method namely LSB (Bit Plane Mapping) method and demonstrates that the proposed method is superior in performance in visual quality factor.

     

     

  • Keywords


    Digital Watermarking Concepts; Histogram Shifting (HS); Human Visual Quality; LSB Method.

  • References


      [1] Sabu M Thampi “Information Hiding Techniques: A Tutorial Review”. Proceeding of ISTE- STTP on Network Security & Cryptography, LBSCE 2004.

      [2] Bender, W., Gruhl, D., Morimoto, N., & Lu, A. (1996). Techniques for data hiding. IBM Systems Journal, 35(3.4), 313-336. https://doi.org/10.1147/sj.353.0313.

      [3] Raja’S. A., Ahmed A., “A Fragile Watermarking Algorithm for Content Authentication”, International Journal of Computing & Information Sciences. Vol.2, No.1, April 2004.

      [4] F. Deguillaume, S. Voloshynovskiy, and T. Pun, "Secure hybrid robust watermarking resistant against tampering and copy attack", presented at Signal Processing, 2003, pp.2133-2170.

      [5] Awrangjeb, M. and M. S. Kankanhalli, "Reversible watermarking using a perceptual model," Electronic Imaging, 14(1), 013014-1-8, 2005. (Pubitemid 40773601).

      [6] X. Luo, D. Wang, P. Wang and F. Liu "A review on blind detection for image steganography", Signal Process., vol. 88, pp.2138, 2008. https://doi.org/10.1016/j.sigpro.2008.03.016.

      [7] Juergen, S. (2005). Digital Watermarking for Digital Media. University of Cooperative Education Heidenheim, Germany.

      [8] Ahmet, B. (2002). Watermarking Capacity Improvement by Low Density Parity Check Codes.Masterthesis.Bogazici University, Turkey.

      [9] Gulati, K. (2003). Information Hiding Using Fractal Encoding. Master Thesis. Indian Institute of Technology Bombay, Mumbai.

      [10] Shelby, P. (2000). Robust Digital Image Watermarking. Ph.D. Thesis. University of Geneve, Faculty of Science, Canada.

      [11] Voyatzis, G and Pitas, I. (1999). Protecting Digital-Image Copyrights: A Framework. IEEE Trans. On Computer Graphics and Application. 19(1): 18-24.

      [12] Voyatzis, G and Pitas, I. (1999). Protecting Digital-Image Copyrights: A Framework. IEEE Trans. On Computer Graphics and Application. 19(1): 18-24.

      [13] Y. K. Seong, "Scene-based Video Indexing and Watermarking for Digital Broadcast Receivers ", Department of Mechatronics vol. Doctor of Philosophy Kwangju, Republic of Korea Kwangju Institute of Science and Technology 2003, p. 150.

      [14] M. A. H. A. M. E.-b. Bourennane, "A Watermarking of Medical Image-New Approach Based on Multi-Layer Method," International Journal of Computer Science Issues, vol. 8, pp. 33-41, 2011.

      [15] Viterbi, A. (1995). CDMA: principles of spread spectrum communication. Redwood City, CA, USA: Addison Wesley Longman Publishing Co. Inc.

      [16] C. K. Chan and L. M. Chen. "Hiding data in images by simple LSB substitution", Pattern Recognit., vol. 37, pp.469 2004. https://doi.org/10.1016/j.patcog.2003.08.007.

      [17] Wu, D. C. and Tsai, W. H. (2003). A steganographic method for images by pixel- value differencing. Pattern Recognition Letters. 24(9-10): 1613–1626. https://doi.org/10.1016/S0167-8655(02)00402-6.

      [18] Chen, W. Y. (2003). A Comparative Study of Information Hiding Schemes Using Amplitude, Frequecy and Phase Embeddings. Ph.D. dissertation.Department of Electrical Engineering, National Cheng Kung University, Tainan, Taiwan, R.O.C.

      [19] R. Caldelli, F. Filippini, and R. Becarelli, "Reversible watermarking techniques: An overview and a classification," EURASIP J. Inf. Security, vol.2010, 2010.

      [20] Habes, A. (2006). Information Hiding in BMP image Implementation, Analysis and Evaluation. Information Transmissions in Computer Networks.6 (1): 1-10.

      [21] Wu, M. and Liu, B. (1999). Watermarking for image authentication.Proceedings of the IEEE International Conference on Image Processing.

      [22] Maniccam, S. S., and Bourbakis, N. (2004). Lossless compression and information hiding in images.Pattern Recognition. 37(3): 475–486. https://doi.org/10.1016/j.patcog.2003.08.010.

      [23] Joachim, J., Eggers, J., and Bernd, G. (2000). Robustness of a blind image watermarking scheme. ICIP 2000, Special Session on WM. Sep. 10–13. Canada.

      [24] Wu, N. (2004). A Study on Data Hiding for Gray-Level and Binary Images. Master Thesis. Chaoyang University of Technology, Taiwan.

      [25] Cheung, W. N. (2000). Digital image watermarking in spatial and transform domains.TENCON Proceedings. 3: 374-378. https://doi.org/10.1109/TENCON.2000.892292.

      [26] Hosinger, C., and Rabbani, M. (2000). Data embedding using phase dispersion. Presented at International Conference on Information Technology: Coding and Computing (ITCC2000).., vol.2.Oxford: Clarendon, pp.68–731892.

      [27] Ahmed Sabeeh Y, Omar Ahmed M, and zaidomar (2018).Improved Implementation of Histogram Shifting In digital watermarking image Using Threshold.presented at Eighth International Conference on advances in computing, electronics and electrical technology Malaysia, Kuala-lumpur–CEET –18-121.


 

View

Download

Article ID: 15300
 
DOI: 10.14419/ijet.v7i4.15300




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.