Text and Image Watermarking Using Random Significant Bit
Y. Pahadiya1 , R. Khatri2
- Dept. of Cyber Security, VITM, Indore, India.
- Dept. of Cyber Security, VITM, Indore, India.
Correspondence should be addressed to: amw.yasha@gmail.com.
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-2 , Page no. 352-355, Feb-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i2.352355
Online published on Feb 28, 2018
Copyright © Y. Pahadiya, R. Khatri . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Y. Pahadiya, R. Khatri, “Text and Image Watermarking Using Random Significant Bit,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.2, pp.352-355, 2018.
MLA Style Citation: Y. Pahadiya, R. Khatri "Text and Image Watermarking Using Random Significant Bit." International Journal of Computer Sciences and Engineering 6.2 (2018): 352-355.
APA Style Citation: Y. Pahadiya, R. Khatri, (2018). Text and Image Watermarking Using Random Significant Bit. International Journal of Computer Sciences and Engineering, 6(2), 352-355.
BibTex Style Citation:
@article{Pahadiya_2018,
author = {Y. Pahadiya, R. Khatri},
title = {Text and Image Watermarking Using Random Significant Bit},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2018},
volume = {6},
Issue = {2},
month = {2},
year = {2018},
issn = {2347-2693},
pages = {352-355},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1751},
doi = {https://doi.org/10.26438/ijcse/v6i2.352355}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i2.352355}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1751
TI - Text and Image Watermarking Using Random Significant Bit
T2 - International Journal of Computer Sciences and Engineering
AU - Y. Pahadiya, R. Khatri
PY - 2018
DA - 2018/02/28
PB - IJCSE, Indore, INDIA
SP - 352-355
IS - 2
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
771 | 523 downloads | 328 downloads |
Abstract
Security of Multimedia is very challenging task in today because data move over Internet. Anyone can easily hack or misuse the data specially images. So hide data such as text document, images, and audio, video in to digital images. In this paper, we proposed random significant bit (RSB) method for text or image watermarking. Random significant bit method and least significant method implemented using java. Compare random significant bit method and Least Significant method on the basis of time. Found that random significant bit method take less time compare to Least Significant method.
Key-Words / Index Term
Information security, Image watermarking, Digital watermarking, LSB, RSB
References
[1] C.Y. Chang and S.J. Su, “The Application of a Full Counter propagation Neural Network to Image Watermarking”, Conference on Networking, Sensing and Control IEEE, March 2005.
[2] Wai C. Chu, “DCT-Based Image Watermarking Using Subsampling”, IEEE Trans. on multimedia, vol. 5, no. 1, pp.34-38, March 2003.
[3] Gurpreet Kaur and Kamaljeet kaur, “Image Watermarking Using LSB(Least Significant Bit)”, in Proc. of International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 4, April 2013, pp. 858-861.
[4] Maher EL’ARBI, Chokri BEN AMAR and Henri NICOLAS, “Video Watermarking Based On Neural Networks”, IEEE Proc. of ICME, pp. 1577-1580, 2006.
[5] F.M. Boland , J.J.K. O`Ruanaidh , C. Dautzenberg, “Watermarking digital images for copyright protection”, Fifth International Conference on Image Processing and its Applications, pp. 250 – 256, August 1996.
[6] Martin F. H. Schuurmans., “Keynote Speech III Digital Watermarking”, 15th International Conference on VLSI Design. Proceedings, August 2002.
[7] Yogesh Jadav, “Comparison of LSB and Sub band DCT Technique for Image Watermarking,” in Proc. of Conference on Advances in Communication and Control Systems (CAC2S 2013), pp. 398-401, 2013.
[8] M. D. Swanson, M. Kobayashi and A. H. Tewfik, “Multimedia data-embedding and watermarking techniques”, Proc. of IEEE, vol. 86, no. 6, pp. 1064-1087, 1998.
[9] Zhang Zhi-Ming, Li Rang-Yan, Wang Lei, “Adaptive Watermark Scheme with RBF Neural Networks,”, International Conference on Neural Networks and Signal Processing, pp. 1517-1520, Dec 2003.
[10] J.W Bae, S.H. Lee and J.S. Yoo “an efficient wavelet based motion estimation algorithm”, IEEE Trans. INF & SYST, vol. E88-D, no. 1,January 2005.
[11] Puneet Kr Sharma and Rajni, "Information security through Image Watermarking using Least Significant Bit Algorithm," Computer Science & Information Technology, vol. 2, no. 2, pp. 61-67, May 2012.
[12] Malihe Soleimani, Faezeh Sanaei Nezhad, Hadi Mahdipour and Morteza Khademi, "A Robust Digital Blind Image Watermarking Based on Spread Spectrum in DCT Domain," Science Academy Transactions on Computer and Communication Network, vol. 2, no. 2, pp. 122-126, June 2012.
[13] Thanuja T C, P Nagaraju, Vinay J, Kavya N Bhushan and Naren S Vasanad, "Hardware Implementation of a Robust Modulo Watermarking Algorithm," ME Journal of Technology and Management, vol. 2, no. 1, pp. 51-56, 2011.
[14] S. Craver, N. Memon, “Resolving Rightful Ownership with Invisible Watermarking Techniques: Limitations, Attacks and Implications”, IEEE Journal on Selected Areas in Communications, vol 16, no. 4, pp. 573-586, 1998.