Skip to main content

Improving the Robustness of ISB Watermarking Techniques by Repetition of the Embedding

  • Conference paper
Software Engineering and Computer Systems (ICSECS 2011)

Abstract

Digital watermarking is a direct embedding of additional information into the original content or host image, this study is overcome the problems existing in the classic LSB method by adapting the method to intermediate significant bits (ISB), which improve the robustness and maintain the quality of the image. Enhancing the proposed method has been done by repeating the watermark data certain number of times (3, 5, 7, and 9 times) in order to improve the robustness of the watermarking technique, correspondingly, a majority criterion is used in the watermark detecting procedure, which makes the algorithm more robust, especially to the geometric transform attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chen, P.C.: On the Study of Watermarking Application in WWW – Modelling, Performance Analysis, and Applications of Digital Image Watermarking Systems. Ph.D. Thesis, Monash University (1999)

    Google Scholar 

  2. Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recognition, 469–474 (March 2004)

    Google Scholar 

  3. Chang, C.C., Hsiao, J.Y., Chan, C.S.: Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognition 36(7), 1583–1595 (2003)

    Article  Google Scholar 

  4. Chang, C.C., Tseng, H.W.: A Steganographic method for digital images using side match. Pattern Recognition Letters 25, 1431–1437 (2004)

    Article  Google Scholar 

  5. Lin, C.C., Tsai, W.H.: Secret image sharing with steganography and authentication. Journal of Systems and Software 73, 405–414 (2004)

    Article  Google Scholar 

  6. Lou, D.C., Liu, J.L.: Steganographic method for secure communications. Computers and Security 21, 449–460 (2002)

    Article  Google Scholar 

  7. Marvel, L.M., Boncelet, C.G., Retter, C.T.: Spread spectrum image steganography. IEEE Transactions on Image Processing 8, 1075–1083 (1999)

    Article  Google Scholar 

  8. Thien, C.C., Lin, J.C.: A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition 36(12), 2875–2881 (2003)

    Article  MATH  Google Scholar 

  9. Wang, R.Z., Lin, C.F., Lin, J.C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern Recognition 34(3), 671–683 (2001)

    Article  MATH  Google Scholar 

  10. Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel-value differencing. Pattern Recognition Letters 24(9-10), 1613–1626 (2003)

    Article  MATH  Google Scholar 

  11. Wu, H.C., Wu, N.I., Tsai, C.S., Hwang, M.S.: Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proceedings of Visual Image Signal Process 152, 611–615 (2005)

    Article  Google Scholar 

  12. Yu, Y.H., Chang, C.C., Hu, Y.C.: Hiding secret data in images via predictive coding. Pattern Recognition 38, 691–705 (2005)

    Article  Google Scholar 

  13. Zhang, X., Wang, S.: Steganography using multiple-base notational system and human vision sensitivity. IEEE Signal Processing Letters 12, 67–70 (2005)

    Article  Google Scholar 

  14. Barni, M., Bartolini, F., Cappellini, V.: A DCT-domain System for Robust Image Watermarking. Signal Processing (Special Issue on Watermarking) 66(3), 357–372 (1998)

    MATH  Google Scholar 

  15. Hsu, C.T., Wu, J.L.: DCT-Based Watermarking for Video. IEEE Transactions on Consumer Electronics 44(1), 206–215 (1998)

    Article  Google Scholar 

  16. Langelaar, G.C., Lagendijk, R.L.: Optimal Differential Energy Watermarking of DCT Encoded Images and Video. IEEE Transactions on Image Processing 10(1), 148–158 (2001)

    Article  MATH  Google Scholar 

  17. O’Ruanaidh, J., Pun, T.: Rotation, Scale and Translation Invariant Digital Image Watermarking. In: Proceedings of IEEE Int. Conf. Image Processing., vol. 1, pp. 536–538 (1997)

    Google Scholar 

  18. Voloshynovskiy, S., Deguillaume, F., Pereira, S., Pun, T.: Optimal Adaptive Diversity Watermarking with Channel State Estimation. In: Proceedings of SPIE: Security and Watermarking of Multimedia Contents III, vol. 4314(74) (2001)

    Google Scholar 

  19. Zeki, A.M., Manaf, A.A.: A Novel Digital Watermarking Technique Based on ISB (Intermediate Significant Bit). In: Akram, M. (ed.) ICACEM 2009 - International Conference on Applied Computing and Engineering Mathematics. WCSET 2009. World Congress on Science, Engineering and Technology, Penang. Malaysia, February 25-27 (2009)

    Google Scholar 

  20. Niu, X.: A Survey of Digital Vector Map Watermarking. International Journal of Innovative Computing, Information and Control 2(6), 1301–1316 (2006)

    Google Scholar 

  21. Venkatraman, S., Abraham, A., Paprzycki, M.: Significance of Steganography on Data Security. In: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC 2004), IEEE Computer Society Press, Los Alamitos (2004)

    Google Scholar 

  22. Hsieh, C.T., Lu, Y.L., Luo, C.P., Kuo, F.J.: A Study of Enhancing the Robustness of Watermark. In: ISMSE Conference, pp. 325–327 (2000)

    Google Scholar 

  23. Ohbuchi, R., Ueda, H., Endoh, S.: Robust Watermarking of Vector Digital Maps. In: Proceedings of the IEEE International Conference on Multimedia and Expo 2002 (ICME 2002), Lausanne, Switzerland, August 26-29 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

M. Zeki, A., A. Manaf, A., S. Mahmod, S. (2011). Improving the Robustness of ISB Watermarking Techniques by Repetition of the Embedding. In: Mohamad Zain, J., Wan Mohd, W.M.b., El-Qawasmeh, E. (eds) Software Engineering and Computer Systems. ICSECS 2011. Communications in Computer and Information Science, vol 179. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22170-5_51

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22170-5_51

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22169-9

  • Online ISBN: 978-3-642-22170-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics