Fusion of Watermarking and Steganography for Protecting Image Ownership
Abstract
The use of digital images has become very common because of the rapid increase of the internet over time. Moving digital images over the internet is easy, but keeping ownership is complex, and serious issues have emerged. Forgery, fraud, and pirating of this content are rising. Different techniques used to protect images, like watermarking and steganography, but these methods are not enough toprotect. So, providing new techniques is essential for protecting image ownership. We have proposed a fusion method of steganography and watermarking in this work. First, the secret message is encoded within the original image using the LSB technique to obtain the stego image. Secondly, the watermarking process is applied on the stego image using text watermarking or image watermarking to provide stego-watermarked-image. The proposed fusion watermarking and steganography method is very useful for protecting image ownership over insecure communication channels. An attacker cannot get the desired watermarked image from the stego-watermarked-image without knowing the secret message hiding inside it using the LSB technique. The proposed method is efficient, simple and secure; it provides significant protection for image ownership.
References
- Abraham, J., & Paul, V. (2019). An imperceptible spatial domain color image watermarking scheme. Journal of King Saud University - Computer and Information Sciences,31(1), 125–133. https://doi.org/10.1016/j.jksuci.2016.12.004
- Abusham, E. A. (2014c). Face verification using local graph stucture (LGS). In 2014 International Symposium on Biometrics and Security Technologies (ISBAST) (pp. 79-83). IEEE.
- Abusham, E. E., & Wong, E. K. (2009). Locally linear discriminate embedding for face recognition. Discrete Dynamics in Nature and Society, 2009.
- Abusham, E. A. (2021d). Image Processing Technique for the Detection of Alberseem Leaves Diseases Based on Soft Computing. Artificial Intelligence & Robotics Development Journal, 103-115.
- Abusham, E. A., & Zaabi, A. M. A. (2021e). Smartphone application for Self-Management Diabetes: A review. Applied computing Journal, 25-37.
- Bashier, H. K., Abusham, E. E., Abdullah, M. F. A., Liew, T. H., Yusof, I., & Lau, S. H. (2013b). Real time face tracker based on local graph structure threshold (LGS-TH). Australian Journal of Basic and Applied Sciences, 7(2), 632-638.
- AL-Balushi, A. I., Yousif, J., & Al-Shezawi, M. (2017). Car accident notification based on Mobile cloud computing. International Journal of Computation and Applied Sciences IJOCAAS, Volume2, (2).
- [Al-Hatmi, M. O., & Yousif, J. H. (2017). A review of Image Enhancement Systems and a case study of Salt &pepper noise removing. International Journal of Computation and Applied Sciences (IJOCAAS), 2(3), 171-176.
- Watermarking,
- Steganography,
- Image ownership,
- Image processing
Copyright (c) 2022 Author(s) of this work retain copyright and grant the journal right, publishing license of first publication with the work simultaneously licensed under Creative Commons Attribution International License (CC BY 4.0). Author(s) and ACAA permit unrestricted use, distribution, and reproduction in any medium, provided the original work with proper citation. ACAA publishing house is located in Oman / Sohar , Zip code 311. ISNI 0000 0004 9361 5767

This work is licensed under a Creative Commons Attribution 4.0 International License.