Robust Digital Data Hiding in Low Coefficient Region of Image

Authors

  • Nomaan Jaweed Mohammed Business Analyst, University of the Cumberlands, Naperville, Illinois, USA Author
  • Mohamed Manzoor Ul H assan Business Analyst, Briggs & Stratton University of the Cumberlands Milwaukee, Wisconsin, USA Author

Keywords:

Data Hiding, DIP, Information Embedding, Information Extraction, LSB, MSB

Abstract

Digital images have many uses in the field of  health, research, military, art, etc. Digital Images need  annotation for retrieval and protection from piracy, attacks, and modification. To perform this retrieval and protection, some of the information was hidden in the image matrix. This  paper proposes a data embedding and extraction algorithm.  Low-frequency regions of the image are identified to embed  secret information in LSV (Least Significant Value) and MSV (Most Significant Value) of a selected coefficient once the data hiding in the embedding section of the proposed model  image gets retransformed in the original image structure as per  the number of bits used in LSV and MSV for data hiding  image gets secured from different spatial attacks. The  experiment is performed on real images. A comparison of the  proposed model is done on PSNR, MSE, evaluation  parameters. It is shown that the proposed model is better as  compared to the existing model. 

Downloads

Download data is not yet available.

References

Priya Porwal1, Tanvi Ghag2, Nikita Poddar3, Ankita Tawde Digital Video Watermarking Using Modified Lsb And Dct Technique. International Journal of Research in Engineering and Technology eISSN: 2319-1163.

Kazuki Yamato, Madoka Hasegawa, Yuichi Tanaka‡ and Shigeo Kato. “DIGITAL IMAGE WATERMARKING METHOD USING BETWEEN-CLASS VARIANCE”. 978-1- 4673-2533-2/12/$26.00 ©2012 IEEE.

Ashwary Rajpoot, Ranjana Batham, Navin Chourasia “Spatial Domain base Image Watermarking by Edge Features”. IJCSEC International Journal of Computer Science and Engineering Communications. Vol.2, Issue 5, Oct 2014, ISSN: 2347–8586

Mr. Mohan A Chimanna 1, Prof.S.R.Kho “Digital Video Watermarking Techniques for Secure Multimedia Creation and Delivery” Vol. 3, Issue 2, March -April 2013, pp.839-844839.

Paweł Korus, Student Member, IEEE, and Andrzej Dziech. “Efficient Method for Content ReconstructionWith Self Embedding”. IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 22, NO. 3, MARCH 2013.

HaniehKhalilian, Student Member, IEEE, And Ivan V. Bajic Video “Watermarking With Empirical PCA-Based Decoding” Ieee Transactions On Image Processing, Vol. 22, No. 12, December 2013.

S. Huang, W. Zhang, W. Feng and H. Yang, Blind watermarking scheme based on neural network, Proceedings of the 7th IEEE World Congress on Intelligent Control and Automation (2008), 5985–5989.

H. Peng, J. Wang and W. Wang, Image watermarking method in multiwavelet domain based on support vector machines, Journal of Systems and Software 83(8) (2010), 1470–1477.

H.Y. Yang, X.Y. Wang and C.P. Wang, A robust digital watermarking algorithm in the undecimated discrete wavelet transform domain, Computers and Electrical Engineering 39(3) (2013), 893–906.

MohiulIslama,∗, AmarjitRoyb and RabulHussainLaskar. “Neural network based robust image watermarking technique in LWT domain”. Journal of Intelligent & Fuzzy Systems 34 (2018) 1691–1700.

Ahmed A. Abd El-Latif, BassemAbd-El-Atty, M. Shamim Hossain, Md. Abdur Rahman, AtifAlamri, B. B. Gupta. “Efficient quantum information hiding for remote medical image sharing”. Digital Object Identifier 10.1109/ACCESS.2017.

Donghui Hu, Dan Zhao, ShuliZheng. “A New Robust Approach for Reversible Database Watermarking With Distortion Control”. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2019.

Qingtang Su, Decheng Liu, Zihan Yuan, Gang Wang, Xiaofeng Zhang, Beijing Chen, And Tao Yao. “New Rapid and Robust Color Image Watermarking Technique in Spatial Domain”. IEEE Access March 25, 2019.

Downloads

Published

2021-01-30

How to Cite

Robust Digital Data Hiding in Low Coefficient Region of Image. (2021). International Journal of Innovative Research in Computer Science & Technology, 9(1), 11–14. Retrieved from https://acspublisher.com/journals/index.php/ijircst/article/view/11697