Spatial-Fields Techniques for Image Authentication
Abbas Mones Faraj Thajeli
Department of Computer Techniques Engincering, Imam Alkadhim University College, Baghdad, Iraq orcid:0009-0008-4082-1731
Hayder Adnan Saleh
Baghdad Directorate of Education, Rusafa III, Ministry of Education, Baghdad, Iraq Orcid:0000-0003-3672-6287
Marwa Jamal Hadi
Diyala Education Directorate, Ministry of Education, Iraq Orcid: 0009-0003-0400-843X
Download PDF http://doi.org/10.37648/ijps.v20i01.018
Abstract
Digital watermarking is a technique used to hide information within digital content (such as text, images, videos, or audio files) that can be used to identify the owner of a work, verify authenticity, or protect copyright. It resembles a traditional watermark on paper, but it is embedded within the digital data to make it unnoticeable to the average user. In the proposed method, An optimal color bit is embedded in binary watermark subbands. This leads to the creation of the least significant bit (LSB), which conceals a most significant bits in the samble by using the least preferred pixels. The pixels can be randomly selected using a key. This methodology presents a streamlined and efficient solution for digital watermarking based on the least significant third and fourth bit (LSB) techniques. Compared to the traditional LSB method, the proposed algorithm is more effective for data embedding within digital images. Show that the tan enhancement in the watermarked image is improved by the autcome. To use LSB-based image watermarking, load both the host image and the watermark that needs to be protected. Next, replace the LSBs of the host image with the watermark bits. The model must endure deliberate attacks while preserving superior image quality, assessing image authenticity, and detecting any tampering. A range of consistency criteria and watermark removal assaults are utilized to assess the methods within a pilot setting.The results show that the model has high attack resistance and supports discrete watermarking..
Keywords:
Watermark; Binary Image; Spatial Domain; Authentication; Least Significant Bit (LSB); PSO; Color Images.
References
- Abdullatif, M., Jalab, H., Obaidat, M., & others. (2013). Properties of digital image watermarking. Proceedings of the IEEE 9th International Colloquium on Signal Processing and its Applications. IEEE.
- Al-Otum, H. M. (2014). Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique. Journal of Visual Communication and Image Representation, 25(5), 1064–1081.
- Awad, J. H., & Majeed, B. D. (2021). Image watermarking based on IWT and parity bit checking. Iraqi Journal of Science, 2726–2739.
- Bamatraf, A., Ibrahim, R., & Salleh, M. N. B. M. (2010). Digital watermarking algorithm using LSB. 2010 International Conference on Computer Applications and Industrial Electronics, IEEE.
- Chen, C. (2018). Study on information hiding technology based on digital image. IOP Conference Series: Materials Science and Engineering, 394(3). IOP Publishing.
- Chuang, J.-C., & Hu, Y.-C. (2011). An adaptive image authentication scheme for vector quantization compressed image. Journal of Visual Communication and Image Representation, 22(5), 440–449.
- Cox, I. J., & Miller, M. (2002). The first 50 years of electronic watermarking. EURASIP Journal of Applied Signal Processing, 2002(2), 126–132.
- El-Shazly, E. H. M. (2012). Digital image watermarking in transform domains [Unpublished manuscript].
- Fridrich, J. (n.d.). Robust digital watermarking based on key-dependent basis function [Unpublished manuscript].
- Hong, W., Li, X., Chen, S., & Lin, Y. (2020). A color image authentication scheme with grayscale invariance. IEEE Access.
- Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), 973–993. https://doi.org/10.1016/j.jcss.2014.02.005
- Kashyap, N., & Sinha, G. R. (2012). Image watermarking using 3-level discrete wavelet transform (DWT). International Journal of Modern Education and Computer Science, 4(3), 50–56.
- Khatua, S., & Rana, D. (n.d.). DWT based image watermarking for information security [Unpublished manuscript].
- Li, M., Xiao, D., & Zhang, Y. (2016). Attack and improvement of the fidelity preserved fragile watermarking of digital images. Arabian Journal for Science and Engineering, 41(3), 941–950. https://doi.org/10.1007/s13369-015-1880-x
- Marakumbi, P., & Khanapuri, J. V. (2018). Particle swarm optimization. International Research Journal of Engineering and Technology (IRJET), 5(12), 2395–0056.
- Mohanty, S. P. (1999). Digital watermarking: A tutorial review. Retrieved from http://www.csee.usf.edu/~smohanty/research/Reports/WMSurvey1999Mohanty.pdf
- Mousavi, S. M., Naghsh, A., & Abu-Bakar, S. A. R. (2014). Watermarking techniques used in medical images: A survey. Journal of Digital Imaging, 27(6), 714–729. https://doi.org/10.1007/s10278-014-9710-3
- Muyco, S. D., & Hernandez, A. A. (2019). Least significant bit hash algorithm for digital image watermarking authentication. Proceedings of the 2019 5th International Conference on Computing and Artificial Intelligence.
- Nikam, B. D., & Gaikwade, S. B. (n.d.). Review on digital watermarking techniques [Unpublished manuscript].
- Pal, P., Jana, B., & Bhaumik, J. (2019). Watermarking scheme using local binary pattern for image authentication and tamper detection through dual image. Security and Privacy, 2(2), e59.
- Sarkar, R., Hemavathy, R., & Shobha, G. (2012). An invisible watermarking technique for image verification [Unpublished manuscript].
- Singh, B. K., & Dua, T. (2015). Image authentication using digital watermarking. International Journal of Computational Engineering Research (IJCER), 5(4), 2250–3005
- Sui, L., Zhang, Q., Wang, Y., Zhang, M., & He, W. (2019). An optical multiple-image authentication based on transport of intensity equation. Optics and Lasers in Engineering, 116, 116–124. https://doi.org/10.1016/j.optlaseng.2018.12.015
- Tao, H., Chongmin, H., Li, X., & others. (2014). Robust image watermarking theories and techniques: A review. Journal of Applied Research and Technology, 12(1), 122–138.
- Yazdi, H. S. (2025). CSRWA: Covert and severe attacks resistant watermarking algorithm. International Journal, 82(1), 1027–1047.
- Zhao, X., Bateman, P., & Ho, A. T. S. (2011). Image authentication using active watermarking and passive forensics techniques. In Multimedia analysis, processing and communications (pp. 139–183). Springer, Berlin, Heidelberg.