Digital Image Watermarking Using LSB Method

Nowadays, the transmision of data is very important and it has been carried out by using digital media (Internet, e-mail). There are some problems that may occur in the transmission of digital media data which is associated with data security level to be sent. Base on that condition, the thought of...

Full description

Saved in:
Bibliographic Details
Main Author: ., Maulidin
Format: Thesis
Language:eng
eng
Published: 2011
Subjects:
Online Access:https://etd.uum.edu.my/2837/1/Maulidin.pdf
https://etd.uum.edu.my/2837/2/1.Maulidin.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-uum-etd.2837
record_format uketd_dc
institution Universiti Utara Malaysia
collection UUM ETD
language eng
eng
advisor Mohamad Tahir, Hatim
topic QA76 Computer software
spellingShingle QA76 Computer software
., Maulidin
Digital Image Watermarking Using LSB Method
description Nowadays, the transmision of data is very important and it has been carried out by using digital media (Internet, e-mail). There are some problems that may occur in the transmission of digital media data which is associated with data security level to be sent. Base on that condition, the thought of doing data concealment are emerge. Digital image is one of the most common media used by the community. Digital watermarking is one of cryptography methods which used to hide data into digital image so that the data sent cannot be identified by the irresponsible people. Data encryption is used to improve the security of data to be sent. Internet as the world's largest network system that connects nearly all computer worlds, making all the c omputers in the world is increasingly easy to exchange data. There are so many digital data falsification has occurred. Digital falsification of data aimed to succeed the counterfeiting syndicate these hidden plans. the falsification problem of digital data will from be resolved by applying the watermarking using LSB method (Least Significant Bit).
format Thesis
qualification_name masters
qualification_level Master's degree
author ., Maulidin
author_facet ., Maulidin
author_sort ., Maulidin
title Digital Image Watermarking Using LSB Method
title_short Digital Image Watermarking Using LSB Method
title_full Digital Image Watermarking Using LSB Method
title_fullStr Digital Image Watermarking Using LSB Method
title_full_unstemmed Digital Image Watermarking Using LSB Method
title_sort digital image watermarking using lsb method
granting_institution Universiti Utara Malaysia
granting_department Awang Had Salleh Graduate School of Arts & Sciences
publishDate 2011
url https://etd.uum.edu.my/2837/1/Maulidin.pdf
https://etd.uum.edu.my/2837/2/1.Maulidin.pdf
_version_ 1747827441214160896
spelling my-uum-etd.28372022-04-10T23:02:54Z Digital Image Watermarking Using LSB Method 2011 ., Maulidin Mohamad Tahir, Hatim Awang Had Salleh Graduate School of Arts & Sciences Awang Had Salleh Graduate School of Sciences QA76 Computer software Nowadays, the transmision of data is very important and it has been carried out by using digital media (Internet, e-mail). There are some problems that may occur in the transmission of digital media data which is associated with data security level to be sent. Base on that condition, the thought of doing data concealment are emerge. Digital image is one of the most common media used by the community. Digital watermarking is one of cryptography methods which used to hide data into digital image so that the data sent cannot be identified by the irresponsible people. Data encryption is used to improve the security of data to be sent. Internet as the world's largest network system that connects nearly all computer worlds, making all the c omputers in the world is increasingly easy to exchange data. There are so many digital data falsification has occurred. Digital falsification of data aimed to succeed the counterfeiting syndicate these hidden plans. the falsification problem of digital data will from be resolved by applying the watermarking using LSB method (Least Significant Bit). 2011 Thesis https://etd.uum.edu.my/2837/ https://etd.uum.edu.my/2837/1/Maulidin.pdf text eng public https://etd.uum.edu.my/2837/2/1.Maulidin.pdf text eng public masters masters Universiti Utara Malaysia Afolabi, M. (1992). The Review of Related Literature in Research. International Journal of Information and Library Research. 4(1), 59-66. Ambler, S. W. (2004). The Object Primer: Agile Modeling-Driven Development With UML 2.0. Cambridge: Cambridge University Press. Anan, T., Kuraki, K., & Nakagata, S. (2007). Watermarking Technologies for Security - Enhanced Printed Document. Fujitsu Sci. Tech. J. 43(2), 197-203. Retrieved from http://www.fujitsu.com/downloads/MAG/vol43-2/paper06.pdf Barreto, P. S. L. M., Kim, H. Y., & Rijmen, V. (2002). Toward Secure Public-Key Blockwise Fragile Authentication Watermarking. Vision, Image and Signal Processing, IEE Proceedings, 149(2), 57-62. doi: 10.1049/ip-vis:20020168. Basu, R. (2004). Implementing Quality: A Practical Guide to Tools and Techniques: Enabling The Power of Operational Excellence. London: Thomson Learning. Blessing, L. T. M., & Chakrabarti, A. (2009). DRM, a Design Research Methodology. London: Springer. Bourner, T. (1996). The Research Process: Four Steps to Success in T. Greenfield (Ed.). Research Methods: Guidance for Postgraduates. London: Arnold. Brannock, E., Weeks, M., & Harrison, R. (2008). Watermarking with Wavelets: Simplicity Leads to Robustness. Southeastcon, IEEE, 3-6 April 2008, 587-592. doi: 10.1109/SECON.2008.4494361. Chandra, M., Pandey, S., Chaudhary, R. (2010). Digital Watermarking Technique for Protecting Digital Images. Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on, 9-11 July 2010. 7, 226-233. doi: 10.1109/ICCSIT.2010.5565177. Celik, M.U., Sharma, G., Saber, E., and Tekalp, A.M. (2001). A Hierarchical Image Authentication Watermark With Improved Localization And Security. Image Proccessing, 2001. Proceedings. 2001 International Confrence on, 7-10 Oct 2001, 2, 502-505. doi: 10.1109/ICIP.2001.958538. Chen, P., Zhao, Y., & Pan, Jeng-Shyang. (2006). Image Watermarking Robust to Print and Generation Copy. Innovative Computing, Information and Control, 2006. ICICIC '06. First International Conference on, 30 Aug 2006- 1 Sept 2006, 1, 496-500. doi: 10.1109/ICICIC.2006.98. Cox, Ingomar J., Miller, Mathew L., Bloom, Jeffrey A., Fridrich, J., & Kalker, T. (2008). Digital Watermarking and Steganography. USA: Morgan Kaufman Publishers. Darmstaedter, V., Delaigle, J.F., Quisquater, J.J., & Macq, B. (1998). Low Cost Spatial Watermarking. Computer & Graphics, 22(4), 417–424. Dennis, A., Wixom, B., & Tegarden, D. (2005). System Analysis Design with UML 3.0. USA: Willey. Dictionaries, O., Waite, M., & Hawker, S. (2009). Oxford paperback dictionary and thesaurus / edited by Maurice Waite, Sara Hawker. Great Britain: Oxford University Press. Dittmann, J. (2000). Digitale Wasserzeichen: Grundlagen, Verfahren, Anwendungsgebiete. Berlin: Springer. Fridrich, J. (1998). Applications of Data Hiding in Digital Images. Tutorial of the ISPACS ’98 Conference, Melbourne. Australia. Furht, B., Muharemagic, E., & Socek, D. (2005). Multimedia Encryption and Watermarking. USA: Springer. Furht, B. (2008). Encyclopedia of Multimedia (2nd ed). USA: Springer. Grady, J. O. (2006). System Requirements Analysis. USA: Elsevier Academic Press. Hanjalic, A. (2000). Image and Video Databases: Restoration, Watermarking, and Retrieval.Netherlands: Elsevier Science B. V. Hartung, F., & Kutter, M. (1999). Multimedia Watermarking Techniques. Proceedings of the IEEE, Jul 1999, 87(7), 1079–1107. doi: 10.1109/5.771066. Heileman, G.L., Pizano, C.E., & Abdallah, C.T. (1999). Performance Measures for Image Watermarking Schemes. Proceedings of the Fifth Baiona Workshop on Emerging Technologies in Telecommunications, Baiona, Spain. Retrieved from http://www.ece.unm.edu/controls/papers/Hei_Piz_CTA.pdf Jiang, X. (2010). Digital Watermarking and Its Application in Image Copyright Protection. Intelligent Computation Technology and Automation (ICICTA), 2010 International Conference on, 11-12 May 2010, 2, 114-117. DOI 10.1109/ICICTA.2010.625. Kartalopoulos, S, V. (2009). Security of Information and Communication Networks. Canada: Wiley. Katzenbeisser, S., & Petitcolas, F.A.P. (2000). Information Hiding: Techniques for Steganography and Digital Watermarking. Norwood, MA: Artech House Books. Kazakeviciute, G., & Rosenbaum, R. (2001). Information Hiding on Wavelet Based Schemes under Consideration of Jpeg2000. Preprint CS-10-0. University of Rostock, Department of Computer Sciences, Insititute of Computer Graphics. Retrieved from http://www.idav.ucdavis.edu/~rene/publications/Rosenbaum-RIB01.pdf Kuhn, T. (1996). The Structure of Scientific Revolutions. Chicago, University of Chicago Press. Kutter, M., & Hartung, F. (2000). Introduction to Watermarking Techniques. In: Katzenbeisser, S.; Petitcolas, F. A. P. (Ed): Information Hiding Techniques for Steganography and Digital Watermarking. Boston: Artech House Publishers. Lakatos, I. (1978). The Methodology of Scientific Research Programmes. (John Worral and Gregory Curie, Eds). Cambridge, Cambridge University Press. Larman, C. (2002). Applying UML and Patterns: an Introduction to Object-Oriented Analysis and Design and the Unified Process. USA: Prentice Hall PTR. Li, Y., Hao, Y., & Wang, C. (2010). A Research on the Robust Digital Watermark of Color Radar Images. Information and Automation (ICIA), 2010 IEEE International Conference on, 20-23 June 2010, 1091-1096. doi: 10.1109/ICINFA.2010.5512166. Marrer, G. (2004). Fundamentals of Programming: With Object Orientated Programming. USA: Gary Marrer. Maximus, U. Steganomaximus. Retrieved 20 march, 2011, from http://www.planet-source-code.com/vb/scripts/ShowCode.asp?txtCodeId=38372&lngWId=1 Meena, M, K., Kumar, S., & Gupta, N. (2011). Image Steganography tool using Adaptive Encoding Approach to Maximize Image Hiding Capacity. International Journal of Soft Computing and Engineering (IJSCE), 2 May 2011, 1(2) 7-11. Retrieved from http://www.ijsce.org/attachments/File/Vol-1_Issue-2/A020031111.pdf Meggs, Philip B. (1998). A History of Graphic Design (3rd ed). John Wiley & Sons, Inc. ISBN 978-0471291985. Meral, H. M., Sankur, B., Ozsoy, A. S., Gungor, T., & Sevinc, E. (2009). Natural Language Watermarking via Morphosyntactic Alterations. Computer Speech and Language., 23(1), 107-125. doi: 10.1016/j.csl.2008.04.001. Merriam-Webster, I. (2003). Merriam-Webster’s Collegiate Dictionary (11th ed). USA: Merriam-Webster, Inc. Retrieved from http://books.google.com.my/books?id=TAnheeIPcAEC Mohanty, S. P. (1999). Digital Watermarking: A Tutorial Review (Masters Project Report), Dept. Of Electrical Engineering. Indian Institute of Science, Bangalore, India. Retrieved from http://www.cse.unt.edu/.../MohantyWatermarkingSurvey1999.pdf Moulin, P., & O’Sullivan, J, A. (2003). Information-Theoretic Analysis of Information Hiding. Information Theory, IEEE Transactions on, 10 Mar 2003, 49(3), 563-593. doi: 10.1109/TIT.2002.808134. Neil, F. J., & Sushil, J. (1998). Exploring Steganography: Seeing the Unseen. Computer, Feb 1998, 31(2), 26-34. doi: 10.1109/MC.1998.4655281. Petitcolas, F.A.P., Anderson, R.J., & Kuhn, M.G. (1999). Information Hiding-A Survey. Proceedings of the IEEE, 87(7), 1062–1078. Ridzoň, R., Kanócz, T., Goč-matis, P., Levicky, D. (2010). Using DCT Coefficients Flipping for Information Hiding in Still Images. Radioelektronika (RADIOELEKTRONIKA), 2010 20th International Conference, 19-21 April 2010, 1-4. doi: 10.1109/RADIOELEK.2010.5478578. Rojas, R & Hashagen, U. (2000). The First Computers - History and Architectures. Cambridge: MIT Press. Seitz, J. (2005). Digital Watermarking for Digital Media. Hershey, USA: Information Science Publishing. Shelly, G. B., Cashman, T. J., & Rosenblatt, H. J. (2009). Systems Analysis and Design. USA: Thomson Course Technology. Shi, H., & Lv, F. (2010). A Blind Digital Watermark Technique for Color Image Based on Integer Wavelet Transform. Biomedical Engineering and Computer Science (ICBECS), 2010 International Conference on, 23-25 April 2010, 1-4. doi: 10.1109/ICBECS.2010.5462499. Shu-Kei, Y., Au, O. C., Chi-Wang, H., & Hoi-Ming, W. (2006). Lossless Visible Watermarking. Multimedia and Expo, 2006 IEEE International Conference on, 9-12 July 2006, 853-856. doi: 10.1109/ICME.2006.262635. Simon, H. (1996). The Sciences of the Artificial (3rd Ed). USA: MIT Press. Singh, V. (2011). Digital Watermarking: A Tutorial. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), 10-21. Received from http://www.cyberjournals.com/Papers/Jan2011/02.pdf Tran, Nicholas. (2002). Hiding Functions and Computational Security of Image Watermarking Systems. Computer Security Foundations Workshop (CSFW’02). Proceedings of the 15th IEEE, 295-303. doi: 10.1109/CSFW.2002.1021823. Voyatzis, G., Nikolaides, N., & Pitas, I. (1998). Digital Watermarking-An Overview. Proceedings of IX European Signal Processing Conference (EUSIPCO), 8-11 Sept 2011, 1, 9-12. Wang, X., & Ye, J. (2010). Information Hiding Technology in Electronic Notes System. E-Business and E-Government (ICEE), 2010 International Conference on, 7-9 May 2010, 1627-1630. doi: 10.1109/ICEE.2010.412. Yiqing, L., & Abdulla, W. H. (2010). Robust Audio Watermarking Technique Based On Gammatone Filterbank and Coded-Image. Signal Processing and Its Applications, 2007. ISSPA 2007. 9th International Symposium on, 12-15 Feb 2007, 1-4. doi: 10.1109/ISSPA.2007.4555328. Yu, Y. H., Chang, C. C., & Lin, I. C. (2007). A New Steganographic Method for Color and Grayscale Image Hiding. Computer Vision and Image Understanding, Sep 2007, 107(3), 183-194. doi:10.1016/j.cviu.2006.11.002. Zhang, D., Dong, H., & Zhou, C. (2007). Researches on Digital Image Watermarking. Electronic Measurement and Instruments, 2007. ICEMI '07. 8th International Conference on, Aug. 16 2007-July 18 2007. 818-821. doi: 10.1109/ICEMI.2007.4350805. Zhang, J., & Li, X. G. 2009. The Application Research of Information Hiding Technology in Network Security. Second International Symposium on Information Science and Engineering, 26-28 Dec 2009. 208-212. doi: 10.1109/ISISE.2009.70.