• Title/Summary/Keyword: least-significant-bit

Search Result 102, Processing Time 0.024 seconds

Wavelet-Based Watermarking using Threshold Values and PN-Code for Copyright Protection (저작권 보호를 위한 임계값과 PN-Code를 이용한 웨이블릿 영역에서의 워터마킹)

  • 정용훈;오휘빈;최영규;이준환;이상범
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.4
    • /
    • pp.561-568
    • /
    • 2003
  • This paper suggests that watermarking technique make use of Threshold Values and PN code for preservation of copyright. To protect copyright, six binary images that are generated by a Dynamic Threshold Value to LSB(least significant bit) of wavelet coefficient through wavelet conversion and watermark image use PN code to each frequency sphere-HL1, LH1, HL2, LH2, HL3, LH3, decide coordinates, operate XOR, and insert watermark. They put the sphere except from low frequency which has much image deterioration and high frequency which has weak loss compression in watermark. As an experimental result, we acquired watermark inserting image that has little image deterioration and extract watermark strongly.

  • PDF

Adaptive Watermarking Using Wavelet Transform & Spread Spectrum Method (확산스펙트럼 방식과 웨이브렛 변환을 이용한 적응적인 워터마킹)

  • 김현환;김두영
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.2
    • /
    • pp.389-395
    • /
    • 2000
  • Digital Watermarking is a research area which aims at hiding secret information in digital multimedia content such as images, audio, and video. In this paper, we propose a new watermarking method with visually recognizable symbols into the digital images using wavelet transform, spread spectrum method and multilevel threshold value in considering the wavelet coefficients. The information of watermark can be extracted by subtracting wavelet coefficients with the original image and the watermarked image. The results of this experiment show that the proposed algorithm was superior to other similar watermarking algorithms. We showed Watermarking algorithm in JPEG lossy compression, resizing, LSB(Least Significant Bit) masking, and filtering.

  • PDF

DWT Based Watermarking for Authentication and Detection of Image Modification (이미지 인증 및 변형 검출을 위한 DWT기반 워터마킹)

  • Jang Ho-Hyun;Kang Tae-Hwan;Kim Dong-Seo;Joo Nak-Keun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.181-185
    • /
    • 2005
  • In this paper, the DWT(Discrete Wavelet Transform) based watermarking method for authentication and detection of image modification was proposed. The proposed algorithm inserts watermark into high frequency domain after 1-level wavelet transform by exchanging wavelet coefficients and embeds the characteristic values of high frequency domain of original image into the LSB part of watermarked image. Therefore, By extracting LSB values and watermark in the high frequency domain from the watermarked image, we can authenticate the image and detect modified positions.

  • PDF

DWT Based Multiwatermarking for Authentication and Detection of Image Modification (이미지 인증과 변형 검출을 위한 DWT기반 다중워터마킹)

  • Kang Tae-Hwan;Jang Ho-Hyun;Kim Dong-Seo;Joo Nak-Keun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.480-484
    • /
    • 2005
  • In this paper, the multiwatermarking method to make it possible to the authentication, modification detection and copyright protection of the digital image was proposed. After the original image is transformed by the DWT(Discrete Wavelet Transform), the encrypted watermark information is embedded into the LSB(Least Significant Bit) of LL band on the low frequence domain for authenticating and detecting modified position in the image. And watermark information is embedded by exchanging the wavelet coefficient for the copyright protection. Thereby, we can authenticate the modification and detect the modified location by extracting the values of LSB on the low frequence domain. And we can perceive the copyright information of original image by extracting the embedded watermark on the high frequence domain.

  • PDF

Hybrid-Watermarking for DWT Based Authentication and Detection of Image Modification (DWT기반 이미지 인증 및 변형 검출을 위한 혼합 워터마킹)

  • Kim Dong-Seo;Joo Nak-Keun;Kang Tae-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.1
    • /
    • pp.170-178
    • /
    • 2006
  • In this paper, the hybrid-watermarking method to make it possible to the authentication, modification detection and copyright protection of the digital image was proposed. After the original image is transformed by the DWT(Discrete Wavelet Transform), the encrypted watermark information is embedded into the LSB(Least Significant Bit) of LL band on the low frequence domain for authenticating and detecting modified position in the image. And watermark information is embedded by exchanging the wavelet coefficient for the copyright protection. Thereby, we can authenticate the modification and detect the modified location by extracting the values of LSB on the low frequence domain. And we can perceive the copyright information of original image by extracting the embedded watermark on the high frequence domain.

  • PDF

Multi-Watermarking for Image Authentication Based on DWT Coefficients (이미지 인증을 위한 DWT 계수기반 다중 워터마킹)

  • Lee Hye-Ran;Rhee Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.113-122
    • /
    • 2005
  • In this paper, we propose a multi-watermarking algorithm to satisfy two purposes: fragility against malicious attacks and robustness against non-malicious attacks. The algorithm can be used for image authentication using coefficients of Discrete Wavelet Transform(DWT). In the proposed method, watermarks are generated by combining binary image with some features extracted from the subband LL3, and then they are embedded into both the spatial and frequency domain. That is, on the spatial domain they are embedded into the Least Significant Bit(LSB) of all pixels of image blocks, and on the frequency domain the coefficients of the subband LH2 and HL2 are adjusted according to the watermarks. Thus the algorithm not only resists malicious attack but also permits non-malicious attacks such as blurring, sharpening, and JPEG compression.

Adaptive LSB Steganography for High Capacity in Spatial Color Images (컬러이미지 대상 고용량 적응형 LSB 스테가노그라피)

  • Lee, Haeyoung
    • Journal of the Korea Computer Graphics Society
    • /
    • v.24 no.1
    • /
    • pp.27-33
    • /
    • 2018
  • This paper presents a new adaptive LSB steganography for high capacity in spatial color images. The number of least signi ficant bit (LSB) of each RGB component in a color image pixel, to replace with the data bits to be hidden, was determine d through analysis of the worst case peak signal noise ratio (PSNR). In addition, the combination of the number of bits is determined adaptively according to image content. That is, 70% of the data to be hidden is proposed to be replaced with 3 bit LSB of two components, 2 bit LSB of the rest component, and 30% be replaced with 4 bit LSB of each RGB compon ent. To find edge areas in an image, delta sorting in local area is also suggested. Using the proposed method, the data cap acity is 9.2 bits per pixel (bpp). The average PSNR value of the tested images with concealed data of up to 60Kbyte was 43.9 db and also natural histograms were generated.

Low-Complexity Watermarking into SAO Offsets for HEVC Videos

  • Wu, Xiangjian;Jo, Hyun-Ho;Sim, Donggyu
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.4
    • /
    • pp.243-249
    • /
    • 2016
  • This paper proposes a new watermarking algorithm to embed watermarks in thr process of sample adaptive offsets (SAO) for high efficiency video coding (HEVC) compressed videos. The proposed method embeds two-bit watermark into the SAO offsets for each coding tree unit (CTU). To minimize visual quality degradation caused by embedding watermark, watermark bits are embedded into SAO offset depending on the SAO types of block. Furthermore, the embedded watermark can be extracted by simply adding four offsets and checking their least significant bits (LSB) at the decoder side. The experimental results show that the proposed method achieves 0.3% BD-rate increase without much visual quality degradation. Two-bit watermark for each CTU is embedded for more bit watermarking. In addition, the proposed method requires negligible computational load for watermark insertion and extraction.

Data Hiding in NTFS Timestamps for Anti-Forensics

  • Cho, Gyu-Sang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.3
    • /
    • pp.31-40
    • /
    • 2016
  • In this paper, we propose a new anti-forensic method for hiding data in the timestamp of a file in the Windows NTFS filesystem. The main idea of the proposed method is to utilize the 16 least significant bits of the 64 bits in the timestamps. The 64-bit timestamp format represents a number of 100-nanosecond intervals, which are small enough to appear in less than a second, and are not commonly displayed with full precision in the Windows Explorer window or the file browsers of forensic tools. This allows them to be manipulated for other purposes. Every file has $STANDARD_INFORMATION and $FILE_NAME attributes, and each attribute has four timestamps respectively, so we can use 16 bytes to hide data. Without any changes in an original timestamp of "year-month-day hour:min:sec" format, we intentionally put manipulated data into the 16 least significant bits, making the existence of the hidden data in the timestamps difficult to uncover or detect. We demonstrated the applicability and feasibility of the proposed method with a test case.

Enhancing LSB Method Performance Using Secret Message Segmentation

  • Khrisat, Mohammad S.;Alqadi, Ziad A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.383-388
    • /
    • 2022
  • Many methods used for secret data steganography are based on least significant bit method, which is suffering from security and the embedded message can be easily hacked. In this paper research a proposed method of adding security issues will be introduced, a complex private key will be constructed, the contents of this key will depend on the results of secrete message segmentation. The proposed method will be implemented and the obtained experimental results will be compared with least significant method results to prove that the proposed method raises the image quality parameters.