Text and Image Watermarking Using Random Significant Bit

Authors

  • Y Pahadiya Dept. of Cyber Security, VITM, Indore, India
  • R Khatri Dept. of Cyber Security, VITM, Indore, India

DOI:

https://doi.org/10.26438/ijcse/v6i2.352355

Keywords:

Information security, Image watermarking, Digital watermarking, LSB, RSB

Abstract

Security of Multimedia is very challenging task in today because data move over Internet. Anyone can easily hack or misuse the data specially images. So hide data such as text document, images, and audio, video in to digital images. In this paper, we proposed random significant bit (RSB) method for text or image watermarking. Random significant bit method and least significant method implemented using java. Compare random significant bit method and Least Significant method on the basis of time. Found that random significant bit method take less time compare to Least Significant method.

References

C.Y. Chang and S.J. Su, “The Application of a Full Counter propagation Neural Network to Image Watermarking”, Conference on Networking, Sensing and Control IEEE, March 2005.

Wai C. Chu, “DCT-Based Image Watermarking Using Subsampling”, IEEE Trans. on multimedia, vol. 5, no. 1, pp.34-38, March 2003.

Gurpreet Kaur and Kamaljeet kaur, “Image Watermarking Using LSB(Least Significant Bit)”, in Proc. of International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 4, April 2013, pp. 858-861.

Maher EL’ARBI, Chokri BEN AMAR and Henri NICOLAS, “Video Watermarking Based On Neural Networks”, IEEE Proc. of ICME, pp. 1577-1580, 2006.

F.M. Boland , J.J.K. O'Ruanaidh , C. Dautzenberg, “Watermarking digital images for copyright protection”, Fifth International Conference on Image Processing and its Applications, pp. 250 – 256, August 1996.

Martin F. H. Schuurmans., “Keynote Speech III Digital Watermarking”, 15th International Conference on VLSI Design. Proceedings, August 2002.

Yogesh Jadav, “Comparison of LSB and Sub band DCT Technique for Image Watermarking,” in Proc. of Conference on Advances in Communication and Control Systems (CAC2S 2013), pp. 398-401, 2013.

M. D. Swanson, M. Kobayashi and A. H. Tewfik, “Multimedia data-embedding and watermarking techniques”, Proc. of IEEE, vol. 86, no. 6, pp. 1064-1087, 1998.

Zhang Zhi-Ming, Li Rang-Yan, Wang Lei, “Adaptive Watermark Scheme with RBF Neural Networks,”, International Conference on Neural Networks and Signal Processing, pp. 1517-1520, Dec 2003.

J.W Bae, S.H. Lee and J.S. Yoo “an efficient wavelet based motion estimation algorithm”, IEEE Trans. INF & SYST, vol. E88-D, no. 1,January 2005.

Puneet Kr Sharma and Rajni, "Information security through Image Watermarking using Least Significant Bit Algorithm," Computer Science & Information Technology, vol. 2, no. 2, pp. 61-67, May 2012.

Malihe Soleimani, Faezeh Sanaei Nezhad, Hadi Mahdipour and Morteza Khademi, "A Robust Digital Blind Image Watermarking Based on Spread Spectrum in DCT Domain," Science Academy Transactions on Computer and Communication Network, vol. 2, no. 2, pp. 122-126, June 2012.

Thanuja T C, P Nagaraju, Vinay J, Kavya N Bhushan and Naren S Vasanad, "Hardware Implementation of a Robust Modulo Watermarking Algorithm," ME Journal of Technology and Management, vol. 2, no. 1, pp. 51-56, 2011.

S. Craver, N. Memon, “Resolving Rightful Ownership with Invisible Watermarking Techniques: Limitations, Attacks and Implications”, IEEE Journal on Selected Areas in Communications, vol 16, no. 4, pp. 573-586, 1998.

Downloads

Published

2025-11-12
CITATION
DOI: 10.26438/ijcse/v6i2.352355
Published: 2025-11-12

How to Cite

[1]
Y. Pahadiya and R. Khatri, “Text and Image Watermarking Using Random Significant Bit”, Int. J. Comp. Sci. Eng., vol. 6, no. 2, pp. 352–355, Nov. 2025.

Issue

Section

Research Article