Digital Watermarking Using Least Significant Bit Algorithm

advertisement
International Journal of Emerging Technologies and Engineering (IJETE)
Volume 2 Issue 3, March 2015, ISSN 2348 – 8050
Digital Watermarking Using Least Significant Bit Algorithm
Neha Jadhav, Suverna Kharat, Punam Nagare.
Guided By Prof. Harsha Sarode
Nutan Maharashtra Institue of Engineering and Technology, Pune.
ABSTRACT:
Digital watermarking is one of the types of
digital signal which hidden directly in digital
content. It helps to make the distribution of
digital
material
more
secure.
Digital
watermarking has the properties like strongness,
security, transparency, complexity, capacity, and
verification. A Digital Watermarking is a form
of steganography in which copy-move and other
source information is hidden inside a document,
image or sound file without the user‟s
knowledge. Many companies involved in digital
watermarking activities with different types of
watermarks. It discusses different techniques for
images, text and other applications of digital
watermarking.
KEYWORDS: Digital watermarking, LSB
1. INTRODUCTION:
Steganography is a method of hiding digital
information.Steganography can be applied to
many types of data, like audio, video, and
images and can hide any kind of digital
information.For security steganography consists
of a significant challenge as it hides the act of
communication; LSB steganography, in which
the lowest bit plane of a bitmap image is used to
convey the secret data, has long been known to
steganographers. Because the eye cannot detect
the very small perturbations it introduces into an
image and because it is extremely simple to
implement,1 LSB methods are commonly used
among the many free steganography tools
available on the internet. There are two types of
LSB steganography: LSB replacement and LSB
matching.In the LSB matching first split the
RGB channel of an input image into LSB and
non LSB(MSB).Then calculate the parity of non
LSB. Then set digital data(0,1) for even parity or
odd parity.Then in last compare the LSB with
the calculated part of non-LSB.And detect the
hidden part of an image.LSB replacement is
very similar, except that the LSBs of the cover
pixels are simply overwritten by the secret bit
stream.
2. PREVIOUS SYSTEM:
In this section a literature survey of digital
Watermarkings technique used for images is
presented. It shows the previous work which had
been done on digital watermarks and their
results.
1] Ersin Elbasi et al enclosed the watermark
in the Discrete Wavelet Transform domain. For
watermark enclosing, the two level DWT
decomposition of an NxN gray scale image I is
computed.
2] Gil-Je Lee et al , represented a simple and
strong watermarking technique
by using
random mapping function.The proposed
algorithm is watermark enclosing which can be
very strong than the simple watermarking
algorithm.
3] Saeid Fazli et al ,searched the trade-off
between unobservable and strongness of LSB
watermarking. In this algorithm, instead of
lower bit planes significant bit-planes of the
watermark image are put in picture. So, they
analyse the effect of image compression on the
watermark, and estimate the strongness and
unobserveability by calculating the distortion
occures due to watermarking.
4] Gaurav Bhatnagar et al , represented a new
semiblind reference watermarking scheme based
on discrete wavelet transform (DWT) and
singular value decomposition (SVD) for
copyright protection and authenticity.
3. PROPOSED SYSTEM:
43
www.ijete.org
International Journal of Emerging Technologies and Engineering (IJETE)
Volume 2 Issue 3, March 2015, ISSN 2348 – 8050
We proposed a new digital algorithm depends on
LSB techniques. Most of authers has proposed
the third and forth LSB but our proposed
watermarking algorithm is using first LSB for
hiding the data for security purpose. So, no one
will know that there is some data is hidden in
the image. To hide information in a cover
images, least significant bit technique is used.In
LSB techniques,pixels are changed by bits of
hidden message inside the image.To hide the
message inside image least bits needed to be
changed from eight bytes of grids. Only few
bits needed in an image to modify or hide a
secret message. Because the quality of the
Watermarked image is very low, less than 4-bit
LSB. While changing the LSB of a pixel,it
results in small changes in the intensity of the
colors.So these changes cannot be visible for
naked human eye.Only professional tracker
solve which type of information hidden inside
the image. For example,Figure 1 shows the 1-bit
LSB. In Figure 1, the pixel value of the cover
image is(11000101)2 and the secret data is 0. It
is stored into LSB-1 therefore, the changed pixel
value of thepixel is (11000100)2. LSB can store
1-bit in each pixel. If the cover image size is 256
x 256 pixel image, it can thus store a total
amount of 65,536 bits or 8,192 bytes of hidden
data in an image
1
1
1
1
0
0
0
0
1
0
0
Pixel value
1
1
0
Secret data
0
1
0
0
Fig.2.Block Diagram Of LSB Watermarking.
3.2
WORKING
OF
LSB
WATERMARKING:
1.Take color image as a input.
2.separate RGB values of image.
3.Separate MSB and LSB of input image.
4.Calculate parities from MSB.
5.For even parity set „1‟ into LSB and for odd
parity set „0‟ into LSB.
6.Compare LSB.
7.If any change occurs then forgery detected.
3.3
FLOWCHART
WATERMARKING:
OF
LSB
1
Change pixel value
Fig.1.An example of 1 bit LSB
3.1
BLOCK DIAGRAM
WATERMARKING:
OF
LSB
44
www.ijete.org
International Journal of Emerging Technologies and Engineering (IJETE)
Volume 2 Issue 3, March 2015, ISSN 2348 – 8050
offers the promise of better protecting their
multimedia content from piracy.
It is
transparent in use, does not increase files sizes,
and yet is highly robust and secure. The
understanding of the theory behind digital
watermarking will lead to the design of more
reliable systems for more applications.LSB may
be detected simply through visual inspection of
an image and its bit-planes, or more reliably
through methods which use statistical metrics to
identify the likelihood an image contains hidden
data. Steganography proves to be a significant
technique for detection when communicating.
The detection issues with steganography create
challenges for security systems in attempting to
preventthe transmission of steganographic
content.
4. RESULTS:
Modified image
Modified image
Output image
Output image
REFERANCES:
Modified image
Output image
Modified image
Output image
Modified image
Output image
5. CONCLUSION:
For secure intelleactual property is currently a
very important topic for media, for university
administrators and for the publishing industries.
In digital watermarking robustness describes
whether the watermark can be reliably detected
after any changes in the original image like
rotation, scaling or cropping. It exists for
entertainment companies and libraries because it
1]S. Lyu and H. Farid, “Steganalysis using color
wavelet statistics and oneclassvector support
machines,”
in
Proc.
SPIE
Security,
Steganography,Watermarking
Multimedia
Contents, vol. 5306, E. J. Delp III and P.
W.Wong, Eds., 2004, pp. 35–45.
2]J. Fridrich, “Feature-based steganalysis for
JPEG images and its implicationsfor future
design of steganographic schemes,” in Proc. Inf.
HidingWorkshop, Springer LNCS, vol. 3200,
2004, pp. 67–81.
3] Gonzalez, Rafael C., and Paul A. Wintz.
"Image Compression Standards."Digital Image
Processing. 2nd ed. Upper Saddle River, NJ:
Prentice-Hall, 2002.492-510. Print.
4] Lyu, S., & Farid, H.(2006).Steganalysis using
higher-order image statistics.Forensics and
Security, IEEE Transactions on, 1(1), 111-119.
5]Kundur, Deepa. Watermarking with diversity:
Insightsand implications. IEEE Multimedia,
2001, 8(4), 46-52.
6] Page, Thomas. Rights management:
Digitalwatermarking as a form of copyright
protection. Computer Law & Sec. Rep., 1998,
14(6), 390-92.
7] Rao,N.V.& Pandit, S.N.N. Multimedia digital
rightsprotection using watermarking techniques.
Inform.Sys. Sec., 2007, September, 93-99.
8] Rosenblatt, Bill. DRM, law and technology:
AnAmerican perspective. Online Inform. Rev.,
2007
45
www.ijete.org
International Journal of Emerging Technologies and Engineering (IJETE)
Volume 2 Issue 3, March 2015, ISSN 2348 – 8050
46
www.ijete.org
Download