Securing Digital Information through Image Watermarking with LSB Algorithm: A Comprehensive Overview and Implementation using MATLAB
Downloads
Over the years, researchers have been intrigued by the concept of information hiding, which involves concealing secrets and protecting information. Digital watermarking and steganography tools have been developed to achieve this objective, particularly in the realm of digital rights management. Digital watermark technology functions by embedding copyright information into the carrier, with the aim of safeguarding it. The digital watermark serves as a linkage between the hidden data and carrier data. In most instances, the carrier data is distorted during the concealment process, and cannot be restored to its original state. This study provides a comprehensive overview of image watermarking and the various security concerns surrounding it. The Image Watermarking technique using the Least Significant Bit (LSB) algorithm has been adopted in this work for embedding images/messages/logos into images. The study has been executed using MATLAB.
Cox, I. J., Miller, M. L., & Bloom, J. A. (2002). Digital watermarking. Morgan Kaufmann.
Alharbi, A., & Sohail, M. S. (2019). Watermarking: An important technique for digital image authentication. Journal of Electrical Systems and Information Technology, 6(2), 175-184.
Bhattacharya, S., & Debnath, R. (2018). A review on watermarking techniques. Journal of Computer Science and Engineering, 4(2), 48-58
Singh, N., & Kaur, G. (2021). Digital Watermarking Techniques for Secure Data Transmission: A Comprehensive Review. Journal of Ambient Intelligence and Humanized Computing, 12(9), 10251-10274. https://doi.org/10.1007/s12652-021-03552-w
Sharma, S., & Saini, R. (2017). Digital image watermarking: A technical review. Journal of King Saud University-Computer and Information Sciences, 29(4), 454-467. https://doi.org/10.1016/j.jksuci.2016.04.002
B. Huang, G. Xiang, and W. Zhou, "Digital watermarking technology and its application in image protection," in International Conference on Mechatronics and Automation, 2016.
F. Hartung and M. Kutter, "Multimedia watermarking techniques," Proceedings of the IEEE, vol. 87, no. 7, pp. 1079-1107, 1999.
X. Kang, "Just-noticeable difference based video watermarking using motion vector," Journal of Zhejiang University-SCIENCE C (Computers & Electronics), vol. 15, no. 10, pp. 875-882, 2014.
M. H. Shirali-Shahreza and M. Shirali-Shahreza, "A survey of digital image watermarking techniques," in International Conference on Computer and Automation Engineering, 2010.
Kaur, M., & Kaur, P. (2017). Digital watermarking: A review. International Journal of Computer Applications, 170(10), 6-11.
R. Chandramouli and N. Memon, "Digital Watermarking," Proceedings of the IEEE, vol. 87, no. 7, pp. 1167-1180, 1999.
L. Wang and X. Wang, "A novel watermarking algorithm based on digital image
Lian, X., Zhang, D., & Yang, X. (2006). A robust image watermarking scheme in wavelet domain based on chaos. Signal Processing: An International Journal, 86(12), 3653-3663
Khalaf, K. S., Sharif, M. A., & Wahhab, M. S. (2022). Digital Communication Based on Image Security using Grasshopper Optimization and Chaotic Map. International Journal of Engineering, 35(10), 1981-1988.
Sharif, M. A., & Tan, X. (2018, March). IPMC flow sensor exploiting self-generated vortices. In Electroactive Polymer Actuators and Devices (EAPAD) XX (Vol. 10594, pp. 269-277). SPIE.
Sharif, M. A. A. (2022, April). Electro-thermally controllable twisted coiled actuators (TCA) using nylon line. In Electroactive Polymer Actuators and Devices (EAPAD) XXIV (Vol. 12042, pp. 376-381). SPIE.