Volume 1 , Issue 4 , October 2021

Fusion of Watermarking and Steganography for Protecting Image Ownership

Eimad Abdu Abusham
Sohar University
Dr. Mahmood Al-Bahri
Faculty of Computing & Information Technology, University of Sohar, 311, Oman
Maryam G. Aljabri
Faculty of Computing and Information Technology, Sohar University, Sohar 311, Oman

Abstract

The use of digital images has become very common because of the rapid increase of the internet over time. Moving digital images over the internet is easy, but keeping ownership is complex, and serious issues have emerged. Forgery, fraud, and pirating of this content are rising. Different techniques used to protect images, like watermarking and steganography, but these methods are not enough toprotect. So, providing new techniques is essential for protecting image ownership. We have proposed a fusion method of steganography and watermarking in this work. First, the secret message is encoded within the original image using the LSB technique to obtain the stego image. Secondly, the watermarking process is applied on the stego image using text watermarking or image watermarking to provide stego-watermarked-image. The proposed fusion watermarking and steganography method is very useful for protecting image ownership over insecure communication channels. An attacker cannot get the desired watermarked image from the stego-watermarked-image without knowing the secret message hiding inside it using the LSB technique. The proposed method is efficient, simple and secure; it provides significant protection for image ownership.

References

  1. Abraham, J., & Paul, V. (2019). An imperceptible spatial domain color image watermarking scheme. Journal of King Saud University - Computer and Information Sciences,31(1), 125–133. https://doi.org/10.1016/j.jksuci.2016.12.004
  2. Abusham, E. A. (2014c). Face verification using local graph stucture (LGS). In 2014 International Symposium on Biometrics and Security Technologies (ISBAST) (pp. 79-83). IEEE.
  3. Abusham, E. E., & Wong, E. K. (2009). Locally linear discriminate embedding for face recognition. Discrete Dynamics in Nature and Society, 2009.
  4. Abusham, E. A. (2021d). Image Processing Technique for the Detection of Alberseem Leaves Diseases Based on Soft Computing. Artificial Intelligence & Robotics Development Journal, 103-115.
  5. Abusham, E. A., & Zaabi, A. M. A. (2021e). Smartphone application for Self-Management Diabetes: A review. Applied computing Journal, 25-37.
  6. Bashier, H. K., Abusham, E. E., Abdullah, M. F. A., Liew, T. H., Yusof, I., & Lau, S. H. (2013b). Real time face tracker based on local graph structure threshold (LGS-TH). Australian Journal of Basic and Applied Sciences, 7(2), 632-638.
  7. AL-Balushi, A. I., Yousif, J., & Al-Shezawi, M. (2017). Car accident notification based on Mobile cloud computing. International Journal of Computation and Applied Sciences IJOCAAS, Volume2, (2).
  8. [Al-Hatmi, M. O., & Yousif, J. H. (2017). A review of Image Enhancement Systems and a case study of Salt &pepper noise removing. International Journal of Computation and Applied Sciences (IJOCAAS), 2(3), 171-176.
Published January 5, 2022
Keywords
  • Watermarking,
  • Steganography,
  • Image ownership,
  • Image processing
How to Cite
Abusham, E. A., Al-Marzouqi , A. A. M., Al-Bahri, M., & Aljabri , M. G. (2022). Fusion of Watermarking and Steganography for Protecting Image Ownership. Applied Computing Journal, 1(Issue 4), 152-164. https://doi.org/10.52098/acj.202145