Abstract
Digital image watermarking techniques are suitable for integrity authentication, watermark security, and copyright protection. Further, the number of embedding bits and the process of watermarking also play a crucial role in deciding the effectiveness of any watermarking process. In this regard, to achieve better security without producing noticeable artifacts in the watermarked image, this paper proposes a dual image-based watermarking technique using an exclusive-or (XOR) operation. The proposed technique utilizes a modified least significant bit (LSB) substitution strategy in the host image (HI) pixel to substitute the watermark bits with a maximum of ±1 modification to each pixel. Each HI pixel embeds two watermark bits by producing two different watermarked pixels each. The proposed technique has better watermark bit embedding capacity, higher perceptual transparency, and security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
K. Sreenivas, V.K. Prasad, Fragile watermarking schemes for image authentication: a survey. Int. J. Mach. Learn. Cybern. 9(7), 1193–1218 (2018)
L. Rakhmawati, W. Wirawan, S. Suwadi, A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability. EURASIP J. Image Video Process. 2019(1), 61 (2019)
C. Rey, J.L. Dugelay, A survey of watermarking algorithms for image authentication. EURASIP J. Adv. Signal Process. 2002(6), 1–9 (2002)
M. Begum, M.S. Uddin, Digital image watermarking techniques: a review. Information 11(2), 110 (2020)
W.L. Tai, Z.J. Liao, Image self-recovery with watermark self-embedding. Signal Process.: Image Commun. 65, 11–25 (2018)
H. Zhang, C. Wang, X. Zhou, Fragile watermarking based on LBP for blind tamper detection in images. J. Inf. Process. Syst. 13(2), 385–399 (2017)
P.W. Wong, A public key watermark for image verification and authentication, in Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No. 98CB36269), Vol. 1, pp. 455–459. IEEE (1998)
W.C. Chen, M.S. Wang, A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Syst. Appl. 36(2), 1300–1307 (2009)
L. Teng, X. Wang, X. Wang, Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme. AEU-Int. J. Electron. Commun. 67(6), 540–547 (2013)
J. Molina-Garcia, B.P. Garcia-Salgado, V. Ponomaryov, R. Reyes-Reyes, S. Sadovnychiy, C. Cruz-Ramos, An effective fragile watermarking scheme for color image tampering detection and self-recovery. Signal Process.: Image Commun. 81, 115725 (2020)
T.Y. Lee, S.D. Lin, Dual watermark for image tamper detection and recovery. Pattern Recogn. 41(11), 3497–3506 (2008)
J. Mielikainen, LSB matching revisited. IEEE Signal Process. Lett. 13(5), 285–287 (2006)
P. Pal, B. Jana, J. Bhaumik, Watermarking scheme using local binary pattern for image authentication and tamper detection through dual image. Secur. Priv. 2(2), e59 (2019)
A.K. Sahu, M. Sahu, Digital image steganography techniques in spatial domain: a study. Int. J. Pharm. Technol. 8(4), 5205–5217 (2016)
S. Trivedy, A.K. Pal, A logistic map-based fragile watermarking scheme of digital images with tamper detection. Iran. J. Sci. Technol. Trans. Electr. Eng. 41(2), 103–113 (2017)
T. Daniya, K. Suresh Kumar, B. Santhosh Kumar, C. Sekhar Kolli, A survey on anomaly based intrusion detection system. Mater. Today Proc. (2021)
B.S. Kumar, T. Daniya, N. Sathya, R. Cristin, Investigation on privacy preserving using K-anonymity techniques. Int. Conf. Comput. Commun. Inform. (ICCCI) 2020, 1–7 (2020)
B. Maram, S.K. Gorripati, N. Supriya, A framework work for data security using cryptography and video steganography. Int. J. Sci. Technol. Res. 9(4), 56–60. ISSN 2277-8616 (2020)
B. Maram, G.K.D. Gopisetty, P.S. Rao, A framework work for data security using cryptography and image steganography. Int. J. Innov. Technol. Explor. Eng. 8(11), 1066–1070. ISSN:2278-3075 (Online) (2019)
B. Maram, J.M. Gnanasekar, G. Manogaran, M. Balaanand, Intelligent security algorithm for unicode data privacy and security in IoT. Serv. Orient. Comput. Appl. (SPRINGER) (2018). ISSN:1863-2386 (Print) 1863-2394 (Online)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Srinadh, V., Maram, B., Daniya, T. (2023). Dual Image-Based High Quality Digital Image Watermarking. In: Dash, R.N., Rathore, A.K., Khadkikar, V., Patel, R., Debnath, M. (eds) Smart Technologies for Power and Green Energy. Lecture Notes in Networks and Systems, vol 443. Springer, Singapore. https://doi.org/10.1007/978-981-19-2764-5_14
Download citation
DOI: https://doi.org/10.1007/978-981-19-2764-5_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-2763-8
Online ISBN: 978-981-19-2764-5
eBook Packages: EngineeringEngineering (R0)