On the implementation of a secured watermarking mechanism based on cryptography and bit pairs matching

被引:15
作者
Bal, Sanjeev Narayan [1 ]
Nayak, Manas Ranjan [1 ]
Sarkar, Subir Kumar [1 ]
机构
[1] Jadavpur Univ, Dept ETCE, Kolkata 32, India
关键词
Watermarking; Cryptography; Least significant bit; Bit pairs similarity; Matching; STEGANOGRAPHIC METHOD; SUBSTITUTION; ALGORITHM; SCHEME; IMAGES;
D O I
10.1016/j.jksuci.2018.04.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Watermarking is one of the most vital digital information hiding technique, which can be used with cryptography mechanism for providing more security to digital data. In image watermarking mechanism mostly LSB substitution is used on the cover image for hiding the secret watermark. In this paper, a novel technique based on the matching of bit pairs and symmetric key cryptography is proposed. Pixel bits of original image and encrypted watermark image are arranged in pairs. The pixel bits are represented in pairs following the proposed algorithm, then the encrypted watermark pixel bit pairs are compared with all bit pairs of original image and accordingly the replacement of bit pairs takes place with the respective matched pair assigned number binary equivalent. If no match is found then go for replacing the 0th pair with watermark bits and replace the two LSB with the value of pair number 0. The proposed mechanism shows good quality of watermarked image along with good PSNR values with a good payload. By comparing the results with some existing algorithms, the proposed scheme shows the valuable results. (c) 2018 The Authors. Production and hosting by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:552 / 561
页数:10
相关论文
共 48 条
  • [1] Abu-Marie W., 2010, International Journal of Signal and Image Processing, V1, P196
  • [2] Acken JM, 1998, COMMUN ACM, V41, P74, DOI 10.1145/278476.278489
  • [3] An LSB Substitution with Bit Inversion Steganography Method
    Akhtar, Nadeem
    [J]. PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS (ICACNI 2015), VOL 1, 2016, 43 : 515 - 521
  • [4] Al-Otaibi Nouf A., 2014, Lecture Notes on Information Theory, V2, P151, DOI 10.12720/lnit.2.2.151-157
  • [5] [Anonymous], 2007, 4 IEEE GCC C EXH GUL
  • [6] [Anonymous], 2014, INT C ADV ENG TECHN
  • [7] Celik MU, 2002, 2002 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, P157
  • [8] A steganographic method for digital images using side match
    Chang, CC
    Tseng, HW
    [J]. PATTERN RECOGNITION LETTERS, 2004, 25 (12) : 1431 - 1437
  • [9] Circular interpretation of histogram for reversible watermarking
    De Vleeschouwer, C
    Delaigle, JF
    Macq, B
    [J]. 2001 IEEE FOURTH WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 2001, : 345 - 350
  • [10] Ghouti L, 2007, INT C SEC CRYPT SEC