SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING 1 Maulik Srivastava, 2 Anuradha Sharma 1,2 Department of Computer Science & Engineering, Amity University, Uttar Pradesh Abstract: As we all know that Internet has revolutionized the process of attaining, transmitting and sharing the information and ideas via multiple tools available today in the era of Information Technology. Now, due to this security apprehensions are raised up and the content owners worried about their unique contents they need a safeguard technique for transmitting the information and avoiding the misusage of the information. Digital Watermarking is a modus operandi that pertains to the process of embedding digital data directly onto referred Multimedia objects such that watermark can be detected and extracted as per the requirements[1]. This paper embraces invisible Image Watermarking that uses Least Significant Bit for embedding the message / logo into the target image, the task has been accomplished using MATLAB. Index Terms: Least Significant Bit (LSB), JPEG, Watermarking, Cryptography. I. INTRODUCTION The era of internet holds a pool of information about everything we just have to find what we need. It is very much easy to create a replica of the necessary data or information creating problems for the people who do genuine work. Through Watermarking the integrity of data or information is maintained. Watermarking a method that refers to the procedure of entrenching digital data onto multimedia items such as it can be extracted or identified later as per the necessities. Corresponding Author: [1] 1. Ms. Maulik Srivastava, Department of Computer Science & Engineering, Amity University, Uttar Pradesh Email Id: moulik0017@gmail.com 2. Ms. Anuradha Sharma, Department of Computer Science & Engineering, Amity University, Uttar Pradesh Email Id: anuradhamisra1@gmail.com Our main focus would be on watermarking of images, though audio, video and documents are commonly watermarked [2]. Watermarking tactics and methodology is used for securing the data and information by including untraceable identifying marks, such as copyright information as well as author s information. The presentment information embedded cannot be easily extracted from the data by third party. The actual bits validating the watermark are to be speckled throughout the data in such a method that they cannot be distinguished and meddled. Thus, the watermarking must be vigorous enough so that it can endure normal variations made to the file such as confronting the data by adding noise. It is due to watermarking the matters of Copyright and distribution of data can be done without comprising the Integrity and security can be maintained Research in Media watermarking research is very promising and active area and in present scenario digital image watermarking became an stimulating protection measure of one s own data and information and got the attention of many researchers[3]. II. TYPES OF WATERMARKING Digital Watermarking techniques can be enumerated as: 1. Text Watermarking 2. Image Watermarking 3. Audio Watermarking 4. Video Watermarking Text/ Image/ Audio Watermarking can be described as embedding watermarks in the form of text/image/audio in imperative to safeguard the image from illegitimate replication and to detect manipulations.
Video watermarking refers as entrenching of watermarks in video series in order to safeguard the video from illegitimate stealing and detect any possible manipulations made to it. Based upon visibility through eyes and the transformations made to the watermarks, the digital watermarks can be enumerated into three different types as follows: I. Visible watermark II. Invisible-Robust watermark III. Invisible-Fragile watermark A visible watermark is a perceptible glowing image which is covered on the primary or cover image. Possibly containing the emblem or stamp of the association which clenches the rights to the main or cover image, it allows the main image to be viewed, but still marks it undoubtedly as the assets of the preserving association [4]. A gray scale image can be represented through 1 byte that means I byte contains 8 bits into it and that may represent 256 colors between white and black i.e. 255 and 0. If data is to be encoded to last two least significant bits of each color it would me almost having lowest probability of getting detected. The human eye i.e. retina would not detect that. This paper unites the survey of the least significant bit method that is used for the Digital Image watermarking [7]. IV.PROPOSED METHOD Below block diagram explains the process of image watermarking: Cover Image Watermark / Embedder Invisible Robust watermark refers to the watermark that resists various transformations made to it during the some possible attacks. Invisible Fragile watermark to Watermark / Logo that watermark that it seems to be get no positive result to be perceived after the slenderest amendment. III. LEAST SIGNIFICANT BIT Noise Communication Channel Attacks There are various algorithms that are available for image watermarking. Among all of the algorithms one of the simplest algorithms is Least Significant Bit algorithm. As we know that images can be converted to digital images and in digital image the data and information can be inserted into various single bits of digital image. The algorithm was introduced by McHughes & Kurah. Inserting data directly into the digital image was known as image downgrading. The concept is here is simple and most importantly it is effective for example if we have a bitmap gray scale bitmap image that is around 8 bit and we should first read it and then add the information or important data to least significant bit of each pixel[5-6]. Watermar k Detector Recovered Watermark Fig 1: Block Diagram for Image Watermarking. Watermarking includes Watermark embedder and Watermark detector to insert and Watermark Detector to detect and extract watermark. Some of the times a key is used for watermarking during the process of embedding and extracting. The key is known to users only for maintaining the integrity. The Communication channel is noisy and intimidating hence the embed watermark
must be robust enough to withhold the attacks [8-10]. First of all a watermark or logo is chosen and the cover image into which the logo is embedded through watermark embedder. Then the watermarked image is then transmitted through communication channel that leads to various distortion i.e. addition of noise and attacks on watermarked image. After transmission the watermark can be identified or extracted through watermark detector that detects and extracts the watermark or logo [11]. The figure 2 represents our cover image which is used to transmit the data or as a carrier where we can hide our message or data image and figure 2 represents its histogram. V. SIMULATION AND RESULTS The simulations have been performed in MATLAB and are shown by the following images. Fig 4: Hidden Message Fig 2: Cover Image Fig: 3 Histogram of the cover image Fig: 5 Watermarked Image Figure 4 represents our message or data image and figure 5 is the resultant image after the process of watermarking. We can see that there is no much
difference between figure 2 and figure 5 as seen by normal human eye. Figure 8 shows the recovered watermark in binary form. Once the watermark is recovered, it can be converted to grayscale form by another algorithm. VI.CONCLUSION This paper examines the classification, attacks and procedures of image watermarking and estimates LSB based digital watermarking scheme with different bit substitution from LSB to MSB in image. After we have embedded the watermark in the first bit i.e. LSB in the image we got Watermarked Image without noticeable distortion on it. Fig; 6 Histogram of Watermarked Image However as shown in figure 6 the histogram of watermarked image have differences than the histogram of original cover image. Fig:7 Watermarked image after reception at the other end of channel REFERENCES [1]. Avani Bhatia, Mrs. Raj Kumari Digital Watermarking Techniques. [2]. BSurekha, Dr GN Swamy, A Spatial Domain Public Image Watermarking, International Journal of Security and Its Applications Vol. 5 No. 1, January, 2011 [3]. Brigitte Jellinek, Invisible Watermarking of Digital Images for Copyright Protection University Salzburg, pp. 9 17, Jan 2000. [4]. Chiou- Ting Hsu; Ja-Ling Wu; Consumer Electronics DCTbased watermarking for video, IEEE Transactions on Volume 44, Issue 1, Feb. 1998 Page(s):206 216 [5]. Cox, Miller and Bloom, Digital watermarking, 1st edition 2001, San Fransisco: Morgan Kaufmann Publisher. [6]. DarshanaMistry Comparison of Digital Water Marking methods (IJCSE) International Journal on Computer Science and EngineeringVol. 02, No. 09, 2010, 2905-2909. [7]. Dr. Martin Kutter and Dr. Frederic Jordan, Digital Watermarking Technology, AlpVision, Switzerland, pp 1 4M Ozaki, Y. Adachi, Y. Iwahori, and N. Ishii, 1998, 112-116. [8]. H.Arafat Ali, Qualitative Spatial Image Data Hiding for Secure Data Transmission, GVIP Journal,Volume 7,Issue 2, pages 35-37, 2, August 2007 [9]. Max Sobell LSB Digital Watermarking,CPE 462. [10]. Preeti Gupta, Cryptography based digital image watermarking algorithm to increase security of watermark data, International Journal of Scientific & Engineering Research, Volume 3, Issue 9 (September 2012) ISSN 2229-5518 [11]. R.AARTHI, 2V. JAGANYA, &3S.POONKUNTRAN Modified Lsb Watermarking For Image Authentication International Journal of Computer & Communication Technology (IJCCT) ISSN (ONLINE): 2231-0371 ISSN (PRINT): 0975 7449 Vol-3, Iss-3, 2012 Fig:8 Recovered Watermark at the reception
[12]. Robert, L., and T. Shanmugapriya, A Study on Digital Watermarking Techniques, International Journal of Recent Trends in Engineering, vol. 1, no. 2, pp. 223-225, 2009.