International Journal of Emerging Technologies and Engineering (IJETE) Volume 2 Issue 3, March 2015, ISSN 2348 – 8050 Digital Watermarking Using Least Significant Bit Algorithm Neha Jadhav, Suverna Kharat, Punam Nagare. Guided By Prof. Harsha Sarode Nutan Maharashtra Institue of Engineering and Technology, Pune. ABSTRACT: Digital watermarking is one of the types of digital signal which hidden directly in digital content. It helps to make the distribution of digital material more secure. Digital watermarking has the properties like strongness, security, transparency, complexity, capacity, and verification. A Digital Watermarking is a form of steganography in which copy-move and other source information is hidden inside a document, image or sound file without the user‟s knowledge. Many companies involved in digital watermarking activities with different types of watermarks. It discusses different techniques for images, text and other applications of digital watermarking. KEYWORDS: Digital watermarking, LSB 1. INTRODUCTION: Steganography is a method of hiding digital information.Steganography can be applied to many types of data, like audio, video, and images and can hide any kind of digital information.For security steganography consists of a significant challenge as it hides the act of communication; LSB steganography, in which the lowest bit plane of a bitmap image is used to convey the secret data, has long been known to steganographers. Because the eye cannot detect the very small perturbations it introduces into an image and because it is extremely simple to implement,1 LSB methods are commonly used among the many free steganography tools available on the internet. There are two types of LSB steganography: LSB replacement and LSB matching.In the LSB matching first split the RGB channel of an input image into LSB and non LSB(MSB).Then calculate the parity of non LSB. Then set digital data(0,1) for even parity or odd parity.Then in last compare the LSB with the calculated part of non-LSB.And detect the hidden part of an image.LSB replacement is very similar, except that the LSBs of the cover pixels are simply overwritten by the secret bit stream. 2. PREVIOUS SYSTEM: In this section a literature survey of digital Watermarkings technique used for images is presented. It shows the previous work which had been done on digital watermarks and their results. 1] Ersin Elbasi et al enclosed the watermark in the Discrete Wavelet Transform domain. For watermark enclosing, the two level DWT decomposition of an NxN gray scale image I is computed. 2] Gil-Je Lee et al , represented a simple and strong watermarking technique by using random mapping function.The proposed algorithm is watermark enclosing which can be very strong than the simple watermarking algorithm. 3] Saeid Fazli et al ,searched the trade-off between unobservable and strongness of LSB watermarking. In this algorithm, instead of lower bit planes significant bit-planes of the watermark image are put in picture. So, they analyse the effect of image compression on the watermark, and estimate the strongness and unobserveability by calculating the distortion occures due to watermarking. 4] Gaurav Bhatnagar et al , represented a new semiblind reference watermarking scheme based on discrete wavelet transform (DWT) and singular value decomposition (SVD) for copyright protection and authenticity. 3. PROPOSED SYSTEM: 43 www.ijete.org International Journal of Emerging Technologies and Engineering (IJETE) Volume 2 Issue 3, March 2015, ISSN 2348 – 8050 We proposed a new digital algorithm depends on LSB techniques. Most of authers has proposed the third and forth LSB but our proposed watermarking algorithm is using first LSB for hiding the data for security purpose. So, no one will know that there is some data is hidden in the image. To hide information in a cover images, least significant bit technique is used.In LSB techniques,pixels are changed by bits of hidden message inside the image.To hide the message inside image least bits needed to be changed from eight bytes of grids. Only few bits needed in an image to modify or hide a secret message. Because the quality of the Watermarked image is very low, less than 4-bit LSB. While changing the LSB of a pixel,it results in small changes in the intensity of the colors.So these changes cannot be visible for naked human eye.Only professional tracker solve which type of information hidden inside the image. For example,Figure 1 shows the 1-bit LSB. In Figure 1, the pixel value of the cover image is(11000101)2 and the secret data is 0. It is stored into LSB-1 therefore, the changed pixel value of thepixel is (11000100)2. LSB can store 1-bit in each pixel. If the cover image size is 256 x 256 pixel image, it can thus store a total amount of 65,536 bits or 8,192 bytes of hidden data in an image 1 1 1 1 0 0 0 0 1 0 0 Pixel value 1 1 0 Secret data 0 1 0 0 Fig.2.Block Diagram Of LSB Watermarking. 3.2 WORKING OF LSB WATERMARKING: 1.Take color image as a input. 2.separate RGB values of image. 3.Separate MSB and LSB of input image. 4.Calculate parities from MSB. 5.For even parity set „1‟ into LSB and for odd parity set „0‟ into LSB. 6.Compare LSB. 7.If any change occurs then forgery detected. 3.3 FLOWCHART WATERMARKING: OF LSB 1 Change pixel value Fig.1.An example of 1 bit LSB 3.1 BLOCK DIAGRAM WATERMARKING: OF LSB 44 www.ijete.org International Journal of Emerging Technologies and Engineering (IJETE) Volume 2 Issue 3, March 2015, ISSN 2348 – 8050 offers the promise of better protecting their multimedia content from piracy. It is transparent in use, does not increase files sizes, and yet is highly robust and secure. The understanding of the theory behind digital watermarking will lead to the design of more reliable systems for more applications.LSB may be detected simply through visual inspection of an image and its bit-planes, or more reliably through methods which use statistical metrics to identify the likelihood an image contains hidden data. Steganography proves to be a significant technique for detection when communicating. The detection issues with steganography create challenges for security systems in attempting to preventthe transmission of steganographic content. 4. RESULTS: Modified image Modified image Output image Output image REFERANCES: Modified image Output image Modified image Output image Modified image Output image 5. CONCLUSION: For secure intelleactual property is currently a very important topic for media, for university administrators and for the publishing industries. In digital watermarking robustness describes whether the watermark can be reliably detected after any changes in the original image like rotation, scaling or cropping. It exists for entertainment companies and libraries because it 1]S. Lyu and H. Farid, “Steganalysis using color wavelet statistics and oneclassvector support machines,” in Proc. SPIE Security, Steganography,Watermarking Multimedia Contents, vol. 5306, E. J. Delp III and P. W.Wong, Eds., 2004, pp. 35–45. 2]J. Fridrich, “Feature-based steganalysis for JPEG images and its implicationsfor future design of steganographic schemes,” in Proc. Inf. HidingWorkshop, Springer LNCS, vol. 3200, 2004, pp. 67–81. 3] Gonzalez, Rafael C., and Paul A. Wintz. "Image Compression Standards."Digital Image Processing. 2nd ed. Upper Saddle River, NJ: Prentice-Hall, 2002.492-510. Print. 4] Lyu, S., & Farid, H.(2006).Steganalysis using higher-order image statistics.Forensics and Security, IEEE Transactions on, 1(1), 111-119. 5]Kundur, Deepa. Watermarking with diversity: Insightsand implications. IEEE Multimedia, 2001, 8(4), 46-52. 6] Page, Thomas. Rights management: Digitalwatermarking as a form of copyright protection. Computer Law & Sec. Rep., 1998, 14(6), 390-92. 7] Rao,N.V.& Pandit, S.N.N. Multimedia digital rightsprotection using watermarking techniques. Inform.Sys. Sec., 2007, September, 93-99. 8] Rosenblatt, Bill. DRM, law and technology: AnAmerican perspective. Online Inform. Rev., 2007 45 www.ijete.org International Journal of Emerging Technologies and Engineering (IJETE) Volume 2 Issue 3, March 2015, ISSN 2348 – 8050 46 www.ijete.org