scholarly journals Information Security Through Image Watermarking Using Least Significant Bit Algorithm

Author(s):  
Puneet Kr Sharma
Author(s):  
Hristo Terziev

Internet of Things is a new world for connecting object space in the real world with virtual space in a computer environment. To build IoT as an effective service platform, end users need to trust the system. With the growing quantity of information and communication technologies, the need to ensure information security and improve data security is increasing. One of the potential solutions for this are steganographic methods. Steganography based on the least significant bit (LSB) is a popular and widely used method in the spatial domain.


2019 ◽  
Vol 8 (2S11) ◽  
pp. 3801-3808

‘Privacy, privacy everywhere but not a safety method to implement it’: a harsh reality of today’s world. With the precipitation of more data (2 x 1019 bits of data is created in every 86400 seconds) in computer networks, involvement of meta-data in the form of images is essential. To keep data safe and secure in order to inculcate privacy, to eradicate any kind of eavesdropping, and to maintain confidentiality, integrity and availability of it, certain security measures are needed to make in account for. So in order to make it available, we required a technique through which we can securely transfer any kind of data over a network. In practise the information security can be achieved either by using Cryptography or Steganography. The process described in this paper is not a mediocre it is more scrupulous towards the security because it involves image encryption, steganography and image stitching. Initially we are encrypting an image using Blowfish algorithm then we are embedding the secret text into this encrypted image by modifying the least significant bit (LSB) of the image by our data. Moreover, to enhance the privacy and security we are stitching the above resultant image with the red, green and blue (RGB) components of a host image and thereby producing an image more secure than the one which the existing systems can form for data transmission..


Author(s):  
Youssef Zaz ◽  
Lhoussain El Fadil ◽  
Mohamed El Kayyali

This paper demonstrates new methodology to improve security and avoid data overlapping between patients records which are defined as Electronic Patient Records (EPR), a combination of digital watermarking techniques and cryptography are used to ensure the non-separation of EPR and medical images during communications within open networks. The EPR data is encrypted, by a symmetric key algorithm based on an Elliptic Curve Cryptosystem (ECC), and inserted in liberated zone of the Least Significant Bit plan (LSB) of the medical image by compressing the original one using the Huffman coding. The proposed method improves security issues and reduces the computation cost related to data encryption and decryption.


2020 ◽  
Vol 29 (1) ◽  
pp. 30-39 ◽  
Author(s):  
Farah Deeba ◽  
She Kun ◽  
Fayaz Ali Dharejo ◽  
Hira Memon

2018 ◽  
Vol 16 (03) ◽  
pp. 1850021 ◽  
Author(s):  
Ri-Gui Zhou ◽  
Wenwen Hu ◽  
Ping Fan ◽  
Gaofeng Luo

In this paper, a quantum color image watermarking scheme is proposed through twice-scrambling of Arnold transformations and steganography of least significant bit (LSB). Both carrier image and watermark images are represented by the novel quantum representation of color digital images model (NCQI). The image sizes for carrier and watermark are assumed to be [Formula: see text] and [Formula: see text], respectively. At first, the watermark is scrambled into a disordered form through image preprocessing technique of exchanging the image pixel position and altering the color information based on Arnold transforms, simultaneously. Then, the scrambled watermark with [Formula: see text] image size and 24-qubit grayscale is further expanded to an image with size [Formula: see text] and 6-qubit grayscale using the nearest-neighbor interpolation method. Finally, the scrambled and expanded watermark is embedded into the carrier by steganography of LSB scheme, and a key image with [Formula: see text] size and 3-qubit information is generated at the meantime, which only can use the key image to retrieve the original watermark. The extraction of watermark is the reverse process of embedding, which is achieved by applying a sequence of operations in the reverse order. Simulation-based experimental results involving different carrier and watermark images (i.e. conventional or non-quantum) are simulated based on the classical computer’s MATLAB 2014b software, which illustrates that the present method has a good performance in terms of three items: visual quality, robustness and steganography capacity.


2021 ◽  
Vol 2129 (1) ◽  
pp. 012015
Author(s):  
N Imran ◽  
S Hameed ◽  
Z Hafeez ◽  
Z Faheem ◽  
M Waseem ◽  
...  

Abstract With the growth of information technologies, E-industry safety has recently become the mutual attention of education and business firms. Digital image watermarking is a technique that refers to the security of multimedia data. It is a process referred to the security and authentication of a digital image, video, and audio by embedding a watermark. Watermarking technique applies a number of variable editions to the host content, where the addition is related to embed information. In the past, researchers develop multiple simple watermarking techniques, today race is to find a region where the watermark is imperceptible and have a high payload. In this paper, an invisible image watermarking technique based on the least significant bit (LSB) and laplacian filter is proposed. The original image is divided into blocks and the laplacian filter is applied on each block. Laplacian is a derivative filter that uses the second derivate to find out the area of rapid changes in the image and the least significant bit is a technique to embed a watermark into the bit positions. Watermark is embedded on these regions which is favourable in achieving high desirable properties. This technique shows strong robustness against image processing and geometrical attacks. In evaluation with state of art methods, the proposed technique shows satisfactory progress.


2020 ◽  
Vol 4 (6) ◽  
pp. 15-26
Author(s):  
Abdullah Abdullah ◽  
Sardar Ali ◽  
Ramadhan Mstafa ◽  
Vaman Haji

Digital communication has become a vital part of daily life nowadays, many applications are using internet-based communication and here the importance of security rose to have a secure communication between two parties to prevent authorized access to sensitive data. These requirements led to a number of research in information security that has been done in the past two decades. Cryptography and steganography are the two main methods that are being used for information security. Cryptography refers to techniques that encrypt a message to be sent to a destination using different methods to be done. On the other hand, steganography is the science of hiding information from others using another cover message or media such as image, audio, video, and DNA sequence. This paper proposed a new method to hide information in an image using the least significant bit (LSB) based on Deoxyribonucleic Acid (DNA) sequence. To accomplish this, the proposed scheme used properties of DNA sequence when codons that consist of three nucleotides are translated to proteins. The LSB of two pixels from the image are taken to represent a codon and then translate them to protein. The secret message bits are injected into codons before the translation process which slightly distorts the image and makes the image less suspicious and hard to detect the hidden message. The experimental results indicate the effeteness of the proposed method.


Sign in / Sign up

Export Citation Format

Share Document