Digital image watermarking using discrete cosine transformation based linear modulation

Alomoush, W, Almomani, A, Alrosan, A, Khashan, Osama A., Attar, Hani H., Alhosban, Fuad and Makhadmeh, Sharif Naser Digital image watermarking using discrete cosine transformation based linear modulation. Journal of Cloud Computing: 96. ISSN 2043-9989

[thumbnail of s13677-023-00468-w] Text
s13677-023-00468-w - Published Version

Download (428kB)

Abstract

The proportion of multimedia traffic in data networks has grown substantially as a result of advancements in IT. As a result, it's become necessary to address the following challenges in protecting multimedia data: prevention of unauthorized disclosure of sensitive data, in addition to tracking down the leak's origin, making sure no alterations may be made without permission, and safeguarding intellectual property for digital assets. watermarking is a technique developed to combat this issue, which transfer secure data over the network. The main goal of invisible watermarking is a hidden exchange of data and a message from being discovered by a third party. The objective of this work is to develop a digital image watermarking using discrete cosine transformation based linear modulation. This paper proposed an invisible watermarking method for embedding information into the transformation domain for the grey scale images. This method used the embedding of a stego-text into the least significant bit (LSB) of the Discrete Cosine Transformation (DCT) coefficient by using a linear modulation algorithm. Also, a stego-text is embedded with different sizes ten times within images after embedding the stego-image immune to different kinds of attack, such as salt and pepper, rotation, cropping, and JPEG compression with different criteria. The proposed method is tested using four benchmark images. Also, to evaluate the embedding effect, PSNR, NC and BER are calculated. The outcomes show that the proposed approach is practical and robust, where the obtained results are promising and do not raise any suspicion. In addition, it has a large capacity, and its results are imperceptible, especially when 1bit/block is embedded.

Affiliation: Skyline University College
SUC Author(s): Alomoush, W ORCID: https://orcid.org/0000-0002-2937-4327, Almomani, A ORCID: https://orcid.org/0000-0002-8808-6114 and Alrosan, A ORCID: https://orcid.org/0000-0001-9400-4077
All Author(s): Alomoush, W, Almomani, A, Alrosan, A, Khashan, Osama A., Attar, Hani H., Alhosban, Fuad and Makhadmeh, Sharif Naser
Item Type: Article
Subjects: B Information Technology > BV Cloud Computing
Divisions: Skyline University College > School of IT
Depositing User: Mr Mosys Team
Date Deposited: 25 Dec 2023 13:41
Last Modified: 25 Dec 2023 13:41
URI: https://research.skylineuniversity.ac.ae/id/eprint/723
Publisher URL:
Publisher OA policy: https://v2.sherpa.ac.uk/id/publication/21427?templ...
Related URLs:

    Actions (login required)

    View Item
    View Item
    Statistics for SkyRep ePrint 723 Statistics for this ePrint Item