Research for Robust Watermarking Algorithm Using Least Significant Bit


Article Preview

An image watermarking algorithm using Least Significant Bit is presented. Firstly, Logistic chaotic map is utilized to generate embedding bits for the watermark. Then, the discrete cosine transform is performed on the host image, and the hiding bit is embedded in the coefficient of discrete cosine transform by replacing Least Significant Bit, which causes minimal distortion of the host image.The original host image is not required when extracting the watermark . Experimental results show that the watermarked image almost has no difference from the original host image, and the quality of the extracted image is satisfying, the capacity of this algorithm is high. This algorithm is robust to many attacks, such as noise attack, JPEG Compression attack. Introduction



Advanced Materials Research (Volumes 268-270)

Edited by:

Feng Xiong






J. J. Wang et al., "Research for Robust Watermarking Algorithm Using Least Significant Bit", Advanced Materials Research, Vols. 268-270, pp. 1697-1700, 2011

Online since:

July 2011




[1] G. Langelaar, I. Setyawan, R. Lagendijk: Watermarking digital image and video data. a state- of-art overview, IEEE Signal Process. Mag. 17 (September 2000) 20–46.

DOI: 10.1109/79.879337

[2] P. Moulin, M. Mihcak: A framework for evaluating the data-hiding capacity of image sources, IEEE Trans. Image Process. 11 (9) (September 2002) 1029–1042.

DOI: 10.1109/tip.2002.802512

[3] R. Liu, T. Tan: A SVD-based watermarking scheme for protecting rightful ownership, IEEE Trans. Multimedia 4 (1) (March 2002) 121–128.

DOI: 10.1109/6046.985560

[4] I. Cox, M. Miller: Electronic watermarking: the first 50 years. Proc. 4th IEEE Workshop on Multimedia Signal Processing, Cannes, France, October 2001, pp.225-230.

[5] F. Hartung, M. Kutter: Multimedia Watermarking Techniques. Proceedings of the IEEE, Vol. 87, No. 7, July 1999, pp.1709-1107.

[6] C. Yeh, C. Kuo: Digital Watermarking through Quasi m Arrays. Proc. IEEE Workshop on Signal Processing Systems, Taipei, Taiwan, October 1999, pp.456-461.

DOI: 10.1109/sips.1999.822351

[7] T. Cedric, R. Adi, I. Mcloughlin: Data concealment in audio using a nonlinear frequency distribution of PRBS coded data and frequency-domain LSB insertion. Proc. IEEE Region 10 International Conference on Electrical and Electronic Technology, Kuala Lumpur, Malaysia, September 2000, pp.275-278.

DOI: 10.1109/tencon.2000.893586

[8] Cheng-Yaw Low, Andrew Beng-Jin Teoh, Connie Tee: Fusion of LSB and DWT Biometric Watermarking for Offline Handwritten Signature, IEEE, 2008 Congress on Image and Signal Processing, pp.702-708.

DOI: 10.1109/cisp.2008.713

[9] Guang-ming Yang, Yang Zhou: LSB Algorithm Research Based on Chaos. IEEE, 2009 Ninth International Conference on Hybrid Intelligent Systems, pp.427-430.

DOI: 10.1109/his.2009.201

In order to see related information, you need to Login.