Abstract
Digital watermarking is a direct embedding of additional information into the original content or host image, this study is overcome the problems existing in the classic LSB method by adapting the method to intermediate significant bits (ISB), which improve the robustness and maintain the quality of the image. Enhancing the proposed method has been done by repeating the watermark data certain number of times (3, 5, 7, and 9 times) in order to improve the robustness of the watermarking technique, correspondingly, a majority criterion is used in the watermark detecting procedure, which makes the algorithm more robust, especially to the geometric transform attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chen, P.C.: On the Study of Watermarking Application in WWW – Modelling, Performance Analysis, and Applications of Digital Image Watermarking Systems. Ph.D. Thesis, Monash University (1999)
Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recognition, 469–474 (March 2004)
Chang, C.C., Hsiao, J.Y., Chan, C.S.: Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognition 36(7), 1583–1595 (2003)
Chang, C.C., Tseng, H.W.: A Steganographic method for digital images using side match. Pattern Recognition Letters 25, 1431–1437 (2004)
Lin, C.C., Tsai, W.H.: Secret image sharing with steganography and authentication. Journal of Systems and Software 73, 405–414 (2004)
Lou, D.C., Liu, J.L.: Steganographic method for secure communications. Computers and Security 21, 449–460 (2002)
Marvel, L.M., Boncelet, C.G., Retter, C.T.: Spread spectrum image steganography. IEEE Transactions on Image Processing 8, 1075–1083 (1999)
Thien, C.C., Lin, J.C.: A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition 36(12), 2875–2881 (2003)
Wang, R.Z., Lin, C.F., Lin, J.C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern Recognition 34(3), 671–683 (2001)
Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel-value differencing. Pattern Recognition Letters 24(9-10), 1613–1626 (2003)
Wu, H.C., Wu, N.I., Tsai, C.S., Hwang, M.S.: Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proceedings of Visual Image Signal Process 152, 611–615 (2005)
Yu, Y.H., Chang, C.C., Hu, Y.C.: Hiding secret data in images via predictive coding. Pattern Recognition 38, 691–705 (2005)
Zhang, X., Wang, S.: Steganography using multiple-base notational system and human vision sensitivity. IEEE Signal Processing Letters 12, 67–70 (2005)
Barni, M., Bartolini, F., Cappellini, V.: A DCT-domain System for Robust Image Watermarking. Signal Processing (Special Issue on Watermarking) 66(3), 357–372 (1998)
Hsu, C.T., Wu, J.L.: DCT-Based Watermarking for Video. IEEE Transactions on Consumer Electronics 44(1), 206–215 (1998)
Langelaar, G.C., Lagendijk, R.L.: Optimal Differential Energy Watermarking of DCT Encoded Images and Video. IEEE Transactions on Image Processing 10(1), 148–158 (2001)
O’Ruanaidh, J., Pun, T.: Rotation, Scale and Translation Invariant Digital Image Watermarking. In: Proceedings of IEEE Int. Conf. Image Processing., vol. 1, pp. 536–538 (1997)
Voloshynovskiy, S., Deguillaume, F., Pereira, S., Pun, T.: Optimal Adaptive Diversity Watermarking with Channel State Estimation. In: Proceedings of SPIE: Security and Watermarking of Multimedia Contents III, vol. 4314(74) (2001)
Zeki, A.M., Manaf, A.A.: A Novel Digital Watermarking Technique Based on ISB (Intermediate Significant Bit). In: Akram, M. (ed.) ICACEM 2009 - International Conference on Applied Computing and Engineering Mathematics. WCSET 2009. World Congress on Science, Engineering and Technology, Penang. Malaysia, February 25-27 (2009)
Niu, X.: A Survey of Digital Vector Map Watermarking. International Journal of Innovative Computing, Information and Control 2(6), 1301–1316 (2006)
Venkatraman, S., Abraham, A., Paprzycki, M.: Significance of Steganography on Data Security. In: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC 2004), IEEE Computer Society Press, Los Alamitos (2004)
Hsieh, C.T., Lu, Y.L., Luo, C.P., Kuo, F.J.: A Study of Enhancing the Robustness of Watermark. In: ISMSE Conference, pp. 325–327 (2000)
Ohbuchi, R., Ueda, H., Endoh, S.: Robust Watermarking of Vector Digital Maps. In: Proceedings of the IEEE International Conference on Multimedia and Expo 2002 (ICME 2002), Lausanne, Switzerland, August 26-29 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
M. Zeki, A., A. Manaf, A., S. Mahmod, S. (2011). Improving the Robustness of ISB Watermarking Techniques by Repetition of the Embedding. In: Mohamad Zain, J., Wan Mohd, W.M.b., El-Qawasmeh, E. (eds) Software Engineering and Computer Systems. ICSECS 2011. Communications in Computer and Information Science, vol 179. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22170-5_51
Download citation
DOI: https://doi.org/10.1007/978-3-642-22170-5_51
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22169-9
Online ISBN: 978-3-642-22170-5
eBook Packages: Computer ScienceComputer Science (R0)