journal article Open Access Apr 21, 2022

Image Watermarking Scheme Using LSB and Image Gradient

Applied Sciences Vol. 12 No. 9 pp. 4202 · MDPI AG
View at Publisher Save 10.3390/app12094202
Abstract
In the modern age, watermarking techniques are mandatory to secure digital communication over the internet. For an optimal technique, a high signal-to-noise ratio and normalized correctional is required. In this paper, a digital watermarking technique is proposed on the basis of the least significant bit through an image gradient and chaotic map. The image is segmented into noncorrelated blocks, and the gradient of each block is calculated. The gradient of the image expresses the rapid changes in an image. A chaotic substitution box (S-Box) is used to scramble the watermark according to a piecewise linear chaotic map (PWLCM). PWLCM has a positive Lyapunov exponent and better balance property as compared to other chaotic maps. This S-Box technique is capable of producing a disperse sequence with high nonlinearity in the generated sequence. Least significant bit is a simple technique for embedding but it has a high payload capacity and direct pixel manipulation. The embedding payload introduces a tradeoff between robustness and imperceptibility; hence, the image gradient is a technique to identify the best-suited place to embed a watermark and avoid image degradation. By modifying the least significant bits of the original image, the watermark signal is embedded according to the image gradient. In the image gradient, the direction and magnitude decide how much embeding can be done. In comparison with other methods, the experimental results show satisfactory progress in robustness against several image processing and geometrical attacks while maintaining the imperceptibility of the watermark signal.
Topics

No keywords indexed for this article. Browse by subject →

References
29
[1]
Kalivaraprasad, B., Prasad, M., Babu, K.R., Shameem, S., Mohan, S., and Vani, V. (2021). Comparative Analysis of Watermarking Methods on CFRP Sample Thermal Images. Computer Communication, Networking and IoT, Springer. 10.1007/978-981-16-0980-0_42
[2]
Matheswaran "Image Privacy in Social Network Using Invisible Watermarking Techniques" Ann. Rom. Soc. Cell Biol. (2021)
[3]
Wang "Blind optimum detector for robust image watermarking in nonsubsampled shearlet Domain" Inf. Sci. (2016) 10.1016/j.ins.2016.08.076
[4]
Rahmani "A new robust watermarking scheme to increase image security" EURASIP J. Adv. Signal Process. (2010) 10.1155/2010/428183
[5]
Benoraira "Blind image watermarking technique based on differential embedding in DWT and DCT domains" EURASIP J. Adv. Signal Process. (2015) 10.1186/s13634-015-0239-5
[6]
Lam, P., Winkelmeyer, O., Mehdi, S.A., and Kamoosi, N. (2022, April 18). Watermarking Technologies-Analysis and Design Report. Available online: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.630.6293&rep=rep1&type=pdf.
[7]
"Comparison of watermarking methods using DCT transformation" Watermark (2003)
[8]
Communication Theory of Secrecy Systems*

C. E. Shannon

Bell System Technical Journal 1949 10.1002/j.1538-7305.1949.tb00928.x
[9]
Kocarev "Chaos-based cryptography: A brief overview" IEEE Circuits Syst. Mag. (2001) 10.1109/7384.963463
[10]
Khan "A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems" Nonlinear Dyn. (2012) 10.1007/s11071-012-0621-x
[11]
Lang "Blind digital watermarking method in the fractional Fourier transform domain" Opt. Lasers Eng. (2014) 10.1016/j.optlaseng.2013.08.021
[12]
Tun "Digital image watermarking scheme based on LWT and DCT" Int. J. Eng. Technol. (2013) 10.7763/ijet.2013.v5.557
[13]
Su "Robust color image watermarking technique in the spatial domain" Soft Comput. (2018) 10.1007/s00500-017-2489-7
[14]
Parab, A.V. (2019). Improving Confidentiality of Watermark Image through Image Filtering Techniques, National College of Ireland.
[15]
Soualmi "A New Blind Medical Image Watermarking Based on Weber Descriptors and Arnold Chaotic Map" Arab. J. Sci. Eng. (2018) 10.1007/s13369-018-3246-7
[16]
Mittal, M., Kaushik, R., Verma, A., Kaur, I., Goyal, L.M., Roy, S., and Kim, T.-H. (2020). Image Watermarking in Curvelet Domain Using Edge Surface Blocks. Symmetry, 12. 10.3390/sym12050822
[17]
Zhou, X., Zhang, H., and Wang, C. (2018). A Robust Image Watermarking Technique Based on DWT, APDCBT, and SVD. Symmetry, 10. 10.3390/sym10030077
[18]
Zheng "A robust image watermarking scheme in hybrid transform domains resisting to rotation attacks" Multimed. Tools Appl. (2020) 10.1007/s11042-019-08490-4
[19]
Das, A., and Zhong, X. (2021, January 5–8). A Deep Learning-based Audio-in-Image Watermarking Scheme. Proceedings of the 2021 International Conference on Visual Communications and Image Processing (VCIP), Munich, Germany. 10.1109/vcip53242.2021.9675375
[20]
Furon "Are Classification Deep Neural Networks Good for Blind Image Watermarking?" Entropy (2020) 10.3390/e22020198
[21]
Sedik, A., Hammad, M., El-Samie, F.E.A., Gupta, B.B., and El-Latif, A.A.A. (2021). Efficient deep learning approach for augmented detection of Coronavirus disease. Neural Comput. Appl., 1–18. 10.1007/s00521-020-05410-8
[22]
Ge, S., Xia, Z., Fei, J., Sun, X., and Weng, J. (2022). A Robust Document Image Watermarking Scheme using Deep Neural Network. arXiv. 10.1049/ipr2.12653
[23]
Ali, M., Ahn, C.W., Pant, M., Kumar, S., Singh, M.K., and Saini, D. (2020). An optimized digital watermarking scheme based on invariant DC coefficients in spatial domain. Electronics, 9. 10.3390/electronics9091428
[24]
Ahmad, M., Ahmad, F., Nasim, Z., Bano, Z., and Zafar, S. (2015, January 20–22). Designing chaos based strong substitution box. Proceedings of the 2015 Eighth International Conference on Contemporary Computing (IC3), Washington, DC, USA. 10.1109/ic3.2015.7346660
[25]
Meier, W., and Staffelbach, O. (1989). Nonlinearity criteria for cryptographic functions. Workshop on the Theory and Application of Cryptographic Techniques, Springer.
[26]
Webster, A., and Tavares, S.E. (1985). On the design of S-boxes. Conference on the Theory and Application of Cryptographic Techniques, Springer.
[27]
Faheem "Highly dispersive substitution box (S-box) design using chaos" ETRI J. (2020) 10.4218/etrij.2019-0138
[28]
Mokhnache "A Robust Watermarking Scheme Based on DWT and DCT Using Image Gradient" Int. J. Appl. Eng. Res. (2018)
[29]
Bhalerao, S., Ansari, I.A., and Kumar, A. (2021). Security Analysis of SVD-Based Watermarking Schemes and Possible Solutions. Soft Computing: Theories and Applications, Springer. 10.1007/978-981-16-1696-9_50
Cited By
39