Secure Watermarking Scheme for Color Image Using Intensity of Pixel and LSB Substitution
@article{Dharwadkar2009SecureWS, title={Secure Watermarking Scheme for Color Image Using Intensity of Pixel and LSB Substitution}, author={Dr. Nagaraj V. Dharwadkar and B. B. Amberker}, journal={ArXiv}, year={2009}, volume={abs/0912.3923} }
In this paper a novel spatial domain LSB based watermarking scheme for color Images is proposed. The proposed scheme is of type blind and invisible watermarking. Our scheme introduces the concept of storing variable number of bits in each pixel based on the actual color value of pixel. Equal or higher the color value of channels with respect to intensity of pixel stores higher number of watermark bits. The Red, Green and Blue channel of the color image has been used for watermark embedding. The…
Figures and Tables from this paper
24 Citations
Robust Watermarking of Color Images under Noise and Cropping Attacks in Spatial Domain
- Computer Science
- 2011
The proposed scheme is of type blind and invisible watermarking, and is found robust to various image processing operations such as salt and pepper noise, and cropping.
The Image Watermarking Scheme Using Edge Information in YCbCr Color Space
- Computer Science
The proposed scheme embeds the watermark into cover image in YCbCr (Luminance, chrominance) components of the color cover image with robustness considering different types of image processing attacks, like blurring and adding noise.
Non-blind watermarking scheme for color images in RGB space using DWT-SVD
- Computer Science2011 International Conference on Communications and Signal Processing
- 2011
This scheme embeds the watermark into cover image in (Red, Green, Blue) RGB space and the combinations of DWT and SVD increases the security, robustness and imperceptibility of the scheme.
DWT-SVD Based Robust Image Watermarking Scheme
- Computer Science
- 2014
A robust watermarking technique using bi-orthogonal wavelet transform with combination of DWT and SVD is presented which increases the security, robustness and imperceptibility of the scheme.
A DCT based Imperceptible Color Image Watermarking Scheme
- Computer Science
- 2016
The objective of this work is to find suitable regions in a color image where the watermark embedding could be effected robustly without significantly degrading the image and at the same time ensuring the impact of embedding will remain imperceptible.
Non Blind Watermarking Scheme for Image and Video using DWT-SVD
- Computer Science
- 2013
This work proposes an effective, robust and imperceptible color image watermarking scheme which embeds the watermark into cover image in (Red, Green, Blue) RGB space and increases the security, robustness and Imperceptibility of the scheme.
Robust Watermarking Scheme Against Multiple Attacks
- Computer Science
- 2013
The present paper found a novel fact that by inserting the watermark using Least Significant Bit (LSB) into three components of the image namely RED GREEN and BLUE, the proposed scheme is found robust against various geometric attacks like cropping, Rotation and salt & pepper noise.
Applying Edge Information in YCbCr Color Space on the Image Watermarking
- Computer Science
- 2017
This paper tends to propose the special domain based mostly watermarking scheme for color pictures that uses the Sobel and canny edge detection strategies to work out edge data of the luminance and chrominance elements of the colour image.
A novel spatial domain technique for digital image watermarking using block entropy
- Computer Science2016 International Conference on Recent Trends in Information Technology (ICRTIT)
- 2016
A new technique for image watermarking in the spatial domain where the concept of information theory is utilized with the popular LSB substation technique to demonstrate the perceptibility and the robustness of the algorithm.
Effect of Embedding Multiple Watermarks in Color Image against Cropping and Salt and Pepper Noise Attacks
- Computer Science
- 2012
The proposed scheme is found robust against various geometric attacks like cropping, and salt & pepper noise and based on the performance of proposed algorithm, MSE (Mean Square Error), RMSE (Root MSE), PSNR (Peak Signal Noise ratio) parameters are used.
References
SHOWING 1-10 OF 10 REFERENCES
Dual Domain Watermarking in the Biological Color Model
- Computer Science2006 International Conference on Information and Automation
- 2006
The proposed method deals with colored images in the biological color model, the Hue, Saturation, and Intensity (HSI), and uses the spatial and the discrete cosine transform (DCT) Domains.
Techniques for Data Hiding
- Computer ScienceIBM Syst. J.
- 1996
This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Cryptology for digital TV broadcasting
- Computer Science
- 1995
The description of a conditional access system is given and it is shown that equitable systems need the use of a trusted third party.
The First 50 Years of Electronic Watermarking
- Computer ScienceEURASIP J. Adv. Signal Process.
- 2002
It is expected that copyright applications will be overshadowed by applications such as broadcast monitoring, authentication, and tracking content distributed within corporations, and a variety of applications emerging that add value to media, such as annotation and linking content to the Web.
Digital rights management in consumer electronics products
- Business, Computer ScienceIEEE Signal Processing Magazine
- 2004
DRM solutions that allow interacceptable exchange of content that is acquired via any of the main distribution channels to the customer, being discs media, broadband, broadcast, and wireless are developed.
OF COMPUTING
- OF COMPUTING
- 2009
His research area of interest is Digital Watermarking and Visual Cryptography
- He has obtained B.E. in Computer Science & EngineeringTech.in Computer Science & Engineering in He is PhD Scholar in Computer Science and Engineering at National Institute of Technology
- 2000
N.Mormoto, and A.Lu, “Techniques for data hiding
- IBM Systems Journal,
- 1996
He obtained his Ph.D from the Department of Computer Science and Automation, IISc. Bangalore, India. He is presently working as Professor in the Department of
- His research areas of interest are Computational Number Theory and Cryptography, Authentication Schemes and Secure Group Communication