Advertisement

A Wavelet-Based Blind Digital Image Watermarking using Dynamic LSB Replacement (DLSBR) and Symmetric Key Cryptography

  • Ananya Ghosh
  • Subhadeep KoleyEmail author
  • Sagnik Acharyya
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 922)

Abstract

With advancement of technology and ease of access of digital information and its creation and transference, protection of copyrights for information security is of the prime concern. Digital watermarking gives copyright protection of digital images by impregnating additional information in the original cover image. Thus, watermarking prevents illegal copying by providing a method of enacting the ownership of a redistributed copy. In this paper, we have proposed a wavelet-based dynamic LSB replacement method, which serves the purpose by providing excellent robustness and imperceptibility. Moreover, the watermark is encrypted by a symmetric key cryptographic algorithm to make it secure from further eavesdropping.

Keywords

Digital watermarking LWT LSB replacement Symmetric Key Cryptography 

References

  1. 1.
    Cox IJ, Kilian J, Leighton T, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687CrossRefGoogle Scholar
  2. 2.
    Basu A, Sarkar SK (2013) On the implementation of robust copyright protection scheme using visual attention model. Inf Secur J Glob Perspect 22(1):10–20CrossRefGoogle Scholar
  3. 3.
    Nayak MR, Tudu B, Basu A, Sarkar SK (2015) On the implementation of a secured digital watermarking frame work. Inf Secur J Glob Perspect 24(1):1–9Google Scholar
  4. 4.
    Tian L, Zheng N, Xue J, Li C, Wang X (2011) An integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection. Signal Process Image Commun 26(8–9):427–437CrossRefGoogle Scholar
  5. 5.
    Reddy AA, Chatterjii BN (2005) A new wavelet based logo watermarking scheme. Pattern RecognLett 26(7):1019–1027CrossRefGoogle Scholar
  6. 6.
    Verma VS, Jha RK (2017) LWT-DSR based new robust framework for watermark extraction under intentional attack conditions. J Franklin Inst, Elsevier 354(14):6422–6449MathSciNetCrossRefGoogle Scholar
  7. 7.
    Menezes AJ, van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, Boca Raton, FLCrossRefGoogle Scholar
  8. 8.
    Sweldens W (1998) The lifting scheme: a construction of second generation wavelets. Soc Ind Appl Math 29(2):511–546MathSciNetzbMATHGoogle Scholar
  9. 9.
    Lee S, Yoo CD, Kalker T (2007) Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans Inf Forensics Secur 2(3):321–330CrossRefGoogle Scholar
  10. 10.
    Thanki R, Dwivedi V, Borisagar K (2017) A hybrid watermarking scheme with CS theory for security of multimedia data. J King Saud Univ Comput Inf Sci 1–10Google Scholar
  11. 11.
    Bal SN, Nayak MR, Sarkar SK (2018) On the implementation of a secured watermarking mechanism based on cryptography and bit pairs matching. J King Saud Univ Comput Inf Sci 1–10Google Scholar
  12. 12.
    Abraham J, Paul V (2017) An imperceptible spatial domain color image watermarking scheme. J King Saud Univ Comput Inf Sci 1–10Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Ananya Ghosh
    • 1
  • Subhadeep Koley
    • 2
    Email author
  • Sagnik Acharyya
    • 2
  1. 1.National Institute of TechnologyDurgapurIndia
  2. 2.RCC Institute of Information TechnologyKolkataIndia

Personalised recommendations