Email: info@ijps.in | Mob: +91-9555269393

Submit Manuscript

Abstract

Spatial-Fields Techniques for Image Authentication

Abbas Mones Faraj Thajeli

Department of Computer Techniques Engincering, Imam Alkadhim University College, Baghdad, Iraq orcid:0009-0008-4082-1731

Hayder Adnan Saleh

Baghdad Directorate of Education, Rusafa III, Ministry of Education, Baghdad, Iraq Orcid:0000-0003-3672-6287

Marwa Jamal Hadi

Diyala Education Directorate, Ministry of Education, Iraq Orcid: 0009-0003-0400-843X

244 - 254
Vol.20, Issue 1, Jul-Dec , 2025
Receiving Date: 2025-08-07
Acceptance Date: 2025-09-19
Publication Date: 2025-10-09
Download PDF

http://doi.org/10.37648/ijps.v20i01.018

Abstract

Digital watermarking is a technique used to hide information within digital content (such as text, images, videos, or audio files) that can be used to identify the owner of a work, verify authenticity, or protect copyright. It resembles a traditional watermark on paper, but it is embedded within the digital data to make it unnoticeable to the average user. In the proposed method, An optimal color bit is embedded in binary watermark subbands. This leads to the creation of the least significant bit (LSB), which conceals a most significant bits in the samble by using the least preferred pixels. The pixels can be randomly selected using a key. This methodology presents a streamlined and efficient solution for digital watermarking based on the least significant third and fourth bit (LSB) techniques. Compared to the traditional LSB method, the proposed algorithm is more effective for data embedding within digital images. Show that the tan enhancement in the watermarked image is improved by the autcome. To use LSB-based image watermarking, load both the host image and the watermark that needs to be protected. Next, replace the LSBs of the host image with the watermark bits. The model must endure deliberate attacks while preserving superior image quality, assessing image authenticity, and detecting any tampering. A range of consistency criteria and watermark removal assaults are utilized to assess the methods within a pilot setting.The results show that the model has high attack resistance and supports discrete watermarking..


Keywords: Watermark; Binary Image; Spatial Domain; Authentication; Least Significant Bit (LSB); PSO; Color Images.


References
  1. Abdullatif, M., Jalab, H., Obaidat, M., & others. (2013). Properties of digital image watermarking. Proceedings of the IEEE 9th International Colloquium on Signal Processing and its Applications. IEEE.
  2. Al-Otum, H. M. (2014). Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique. Journal of Visual Communication and Image Representation, 25(5), 1064–1081.
  3. Awad, J. H., & Majeed, B. D. (2021). Image watermarking based on IWT and parity bit checking. Iraqi Journal of Science, 2726–2739.
  4. Bamatraf, A., Ibrahim, R., & Salleh, M. N. B. M. (2010). Digital watermarking algorithm using LSB. 2010 International Conference on Computer Applications and Industrial Electronics, IEEE.
  5. Chen, C. (2018). Study on information hiding technology based on digital image. IOP Conference Series: Materials Science and Engineering, 394(3). IOP Publishing.
  6. Chuang, J.-C., & Hu, Y.-C. (2011). An adaptive image authentication scheme for vector quantization compressed image. Journal of Visual Communication and Image Representation, 22(5), 440–449.
  7. Cox, I. J., & Miller, M. (2002). The first 50 years of electronic watermarking. EURASIP Journal of Applied Signal Processing, 2002(2), 126–132.
  8. El-Shazly, E. H. M. (2012). Digital image watermarking in transform domains [Unpublished manuscript].
  9. Fridrich, J. (n.d.). Robust digital watermarking based on key-dependent basis function [Unpublished manuscript].
  10. Hong, W., Li, X., Chen, S., & Lin, Y. (2020). A color image authentication scheme with grayscale invariance. IEEE Access.
  11. Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), 973–993. https://doi.org/10.1016/j.jcss.2014.02.005
  12. Kashyap, N., & Sinha, G. R. (2012). Image watermarking using 3-level discrete wavelet transform (DWT). International Journal of Modern Education and Computer Science, 4(3), 50–56.
  13. Khatua, S., & Rana, D. (n.d.). DWT based image watermarking for information security [Unpublished manuscript].
  14. Li, M., Xiao, D., & Zhang, Y. (2016). Attack and improvement of the fidelity preserved fragile watermarking of digital images. Arabian Journal for Science and Engineering, 41(3), 941–950. https://doi.org/10.1007/s13369-015-1880-x
  15. Marakumbi, P., & Khanapuri, J. V. (2018). Particle swarm optimization. International Research Journal of Engineering and Technology (IRJET), 5(12), 2395–0056.
  16. Mohanty, S. P. (1999). Digital watermarking: A tutorial review. Retrieved from http://www.csee.usf.edu/~smohanty/research/Reports/WMSurvey1999Mohanty.pdf
  17. Mousavi, S. M., Naghsh, A., & Abu-Bakar, S. A. R. (2014). Watermarking techniques used in medical images: A survey. Journal of Digital Imaging, 27(6), 714–729. https://doi.org/10.1007/s10278-014-9710-3
  18. Muyco, S. D., & Hernandez, A. A. (2019). Least significant bit hash algorithm for digital image watermarking authentication. Proceedings of the 2019 5th International Conference on Computing and Artificial Intelligence.
  19. Nikam, B. D., & Gaikwade, S. B. (n.d.). Review on digital watermarking techniques [Unpublished manuscript].
  20. Pal, P., Jana, B., & Bhaumik, J. (2019). Watermarking scheme using local binary pattern for image authentication and tamper detection through dual image. Security and Privacy, 2(2), e59.
  21. Sarkar, R., Hemavathy, R., & Shobha, G. (2012). An invisible watermarking technique for image verification [Unpublished manuscript].
  22. Singh, B. K., & Dua, T. (2015). Image authentication using digital watermarking. International Journal of Computational Engineering Research (IJCER), 5(4), 2250–3005
  23. Sui, L., Zhang, Q., Wang, Y., Zhang, M., & He, W. (2019). An optical multiple-image authentication based on transport of intensity equation. Optics and Lasers in Engineering, 116, 116–124. https://doi.org/10.1016/j.optlaseng.2018.12.015
  24. Tao, H., Chongmin, H., Li, X., & others. (2014). Robust image watermarking theories and techniques: A review. Journal of Applied Research and Technology, 12(1), 122–138.
  25. Yazdi, H. S. (2025). CSRWA: Covert and severe attacks resistant watermarking algorithm. International Journal, 82(1), 1027–1047.
  26. Zhao, X., Bateman, P., & Ho, A. T. S. (2011). Image authentication using active watermarking and passive forensics techniques. In Multimedia analysis, processing and communications (pp. 139–183). Springer, Berlin, Heidelberg.
Back
SUPERJP
BOOSTERJP
WINSTRIKE69
ELANG212
ELANG212
ELANG212
GORI77
GORI77
CLAN4D
GORI77
VIRAL88
viral88 login link alternatif
VIRAL88
VIRAL88
PAKONG86
WINSTRIKE69
winstrike69 link alternatif
BOOSTERJP
WINSTRIKE69
WINSTRIKE69
SLOT GACOR
VIRAL4D
WINSTRIKE69
VIRAL88
WINSTRIKE69
viral88
WINSTRIKE69
WINSTRIKE69
CLAN4D
VIRAL88
WINSTRIKE69
SAMSONBET86
winstrike69
winstreak 69
winstreak69
winstrik69
winstrike 69
winstreak 69 login
winstrike69
linabet69
GORI77
viral88
linabet69
LINABET69
winstrike69
gori77
gojekpot
gojekpot
gojekpot
kaptenjackpot
superjp
pakong86
winstrike69