Research for Robust Watermarking Algorithm Using Least Significant Bit

Article Preview

Abstract:

An image watermarking algorithm using Least Significant Bit is presented. Firstly, Logistic chaotic map is utilized to generate embedding bits for the watermark. Then, the discrete cosine transform is performed on the host image, and the hiding bit is embedded in the coefficient of discrete cosine transform by replacing Least Significant Bit, which causes minimal distortion of the host image.The original host image is not required when extracting the watermark . Experimental results show that the watermarked image almost has no difference from the original host image, and the quality of the extracted image is satisfying, the capacity of this algorithm is high. This algorithm is robust to many attacks, such as noise attack, JPEG Compression attack. Introduction

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 268-270)

Pages:

1697-1700

Citation:

Online since:

July 2011

Export:

Price:

[1] G. Langelaar, I. Setyawan, R. Lagendijk: Watermarking digital image and video data. a state- of-art overview, IEEE Signal Process. Mag. 17 (September 2000) 20–46.

DOI: 10.1109/79.879337

Google Scholar

[2] P. Moulin, M. Mihcak: A framework for evaluating the data-hiding capacity of image sources, IEEE Trans. Image Process. 11 (9) (September 2002) 1029–1042.

DOI: 10.1109/tip.2002.802512

Google Scholar

[3] R. Liu, T. Tan: A SVD-based watermarking scheme for protecting rightful ownership, IEEE Trans. Multimedia 4 (1) (March 2002) 121–128.

DOI: 10.1109/6046.985560

Google Scholar

[4] I. Cox, M. Miller: Electronic watermarking: the first 50 years. Proc. 4th IEEE Workshop on Multimedia Signal Processing, Cannes, France, October 2001, pp.225-230.

DOI: 10.1109/mmsp.2001.962738

Google Scholar

[5] F. Hartung, M. Kutter: Multimedia Watermarking Techniques. Proceedings of the IEEE, Vol. 87, No. 7, July 1999, pp.1709-1107.

Google Scholar

[6] C. Yeh, C. Kuo: Digital Watermarking through Quasi m Arrays. Proc. IEEE Workshop on Signal Processing Systems, Taipei, Taiwan, October 1999, pp.456-461.

DOI: 10.1109/sips.1999.822351

Google Scholar

[7] T. Cedric, R. Adi, I. Mcloughlin: Data concealment in audio using a nonlinear frequency distribution of PRBS coded data and frequency-domain LSB insertion. Proc. IEEE Region 10 International Conference on Electrical and Electronic Technology, Kuala Lumpur, Malaysia, September 2000, pp.275-278.

DOI: 10.1109/tencon.2000.893586

Google Scholar

[8] Cheng-Yaw Low, Andrew Beng-Jin Teoh, Connie Tee: Fusion of LSB and DWT Biometric Watermarking for Offline Handwritten Signature, IEEE, 2008 Congress on Image and Signal Processing, pp.702-708.

DOI: 10.1109/cisp.2008.713

Google Scholar

[9] Guang-ming Yang, Yang Zhou: LSB Algorithm Research Based on Chaos. IEEE, 2009 Ninth International Conference on Hybrid Intelligent Systems, pp.427-430.

DOI: 10.1109/his.2009.201

Google Scholar