Next Article in Journal
Intraprocedure Artificial Intelligence Alert System for Colonoscopy Examination
Previous Article in Journal
High-Fidelity 3D Stray Magnetic Field Mapping of Smartphones to Address Safety Considerations with Active Implantable Electronic Medical Devices
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Image Watermarking Using Least Significant Bit and Canny Edge Detection

1
Department of Computer Science & Information Technology, The Islamia University of Bahawalpur, Bahawalpur 63100, Pakistan
2
School of Computer Science, University College Dublin, D04 V1W8 Dublin, Ireland
3
Department of Signal Theory and Communications and Telematic Engineering, University of Valladolid, Paseo de Belén 15, 47011 Valladolid, Spain
4
Center for Nutrition & Health, Universidad Europea del Atlántico, Isabel Torres 21, 39011 Santander, Spain
5
Universidad Internacional Iberoamericana, Arecibo, PR 00613, USA
6
Universidade Internacional do Cuanza, Cuito EN250, Angola
7
Área de Nutrición y Salud, Universidad Internacional Iberoamericana, Campeche 24560, Mexico
8
Fundación Universitaria Internacional de Colombia, Bogotá 111311, Colombia
9
Department of Information and Communication Engineering, Yeungnam University, Gyeongsan 38541, Republic of Korea
*
Authors to whom correspondence should be addressed.
Sensors 2023, 23(3), 1210; https://doi.org/10.3390/s23031210
Submission received: 11 December 2022 / Revised: 11 January 2023 / Accepted: 16 January 2023 / Published: 20 January 2023
(This article belongs to the Section Internet of Things)

Abstract

:
With the advancement in information technology, digital data stealing and duplication have become easier. Over a trillion bytes of data are generated and shared on social media through the internet in a single day, and the authenticity of digital data is currently a major problem. Cryptography and image watermarking are domains that provide multiple security services, such as authenticity, integrity, and privacy. In this paper, a digital image watermarking technique is proposed that employs the least significant bit (LSB) and canny edge detection method. The proposed method provides better security services and it is computationally less expensive, which is the demand of today’s world. The major contribution of this method is to find suitable places for watermarking embedding and provides additional watermark security by scrambling the watermark image. A digital image is divided into non-overlapping blocks, and the gradient is calculated for each block. Then convolution masks are applied to find the gradient direction and magnitude, and non-maximum suppression is applied. Finally, LSB is used to embed the watermark in the hysteresis step. Furthermore, additional security is provided by scrambling the watermark signal using our chaotic substitution box. The proposed technique is more secure because of LSB’s high payload and watermark embedding feature after a canny edge detection filter. The canny edge gradient direction and magnitude find how many bits will be embedded. To test the performance of the proposed technique, several image processing, and geometrical attacks are performed. The proposed method shows high robustness to image processing and geometrical attacks.

1. Introduction

Information Technology (IT) has revolutionized the world with major advancements in every field of life. Its applications in different domains such as image processing [1], edge computing [2], computer vision [3,4,5], health care [6], internet of things (IoT) [7] and many more are helping to build a smart and digital world. Digital technology is so widespread that our personal lives depend on these technologies. Nowadays, a person feels lonely without digital technology. Moreover, people use online banking, shopping, trades, marketing, health care, education, and much more. The internet has made this world a single virtual unit and made communication easier and faster. With the use of the internet and digital technology, every field makes advancements and solves its future issues with these technologies. Companies move from physical resources to online resources to maintain their budgets, continuity, and energy. These technologies are evolving so fast that they impact the confidentiality of individual and company information. Due to advancements in communication technology, the security of digital data has become a major challenge today [8].
Cryptography is a security domain that provides security services, i.e., integrity, authenticity, and confidentiality [9]. In cryptography, data are encrypted before moving to an insecure channel, and a key is sent to decode that data. Digital data security is most important nowadays because people rely on digital technology. To fulfill the trust of people, educational and business firms give more attention to digital data security [10]. Cryptographic algorithms from the cryptosystem are used to secure communication between two parties. Cryptosystems can be symmetric and asymmetric cryptosystems where the symmetric cryptosystems have the same key, while asymmetric cryptosystems have different keys for encryption and decryption. The strength of the cryptosystem depends on the substitution box [11].
Substitution Box (S-Box) is a nonlinear component in the cryptosystem that produces dispersion in the generated sequence. Due to its major role, researchers try to improve the design of S-Box. In this research, the watermark image is scrambled by our chaotic S-Box. S-Box with high nonlinearity and low differential probability is cryptographically strong and improves the strength of the cryptosystem [12,13]. S-Box creates dispersion and prevents the attacker from suggesting input to the output. S-Box can be categorized into algebraic S-Box, chaotic S-Box, and heuristic S-Box. In this research, an improved chaos-based S-Box with strong cryptographic properties is used. Chaos is a domain of nonlinearity that shows nonlinear behavior with lower computation. Due to fewer computations and high nonlinearity, researchers have explored chaotic S-Boxes from the last decade [14,15]. S-Box is used in data hiding techniques to scramble the hidden data to improve security.
Image watermarking is a data-hiding technique used for copyright protection and content authentication. Watermarking is a technique to hide a watermark signal in a carrier signal to prove the authenticity of the carrier signal [16,17]. Watermarking can be categorized into text, image, and video watermarking. In text watermarking, a watermark is implanted into the text carrier signal, while in image and video watermarking, a watermark is embedded into the image and video carrier signal. Watermarking can be implemented into two broader domains, i.e., spatial domain and frequency domain. The spatial domain is simple, and manipulation is directly on the pixel level and has a high payload capacity. The least significant bit (LSB) embedding is an example of a spatial domain. While the frequency domain is complex and works on a frequency component [18]. Discrete cosine transform and discrete wavelet transform are examples of the frequency domain. Watermarking is mostly divided into two phases: the first one is the embedding phase, while the second one is the extraction phase. In the embedding phase, the watermark is implanted into the carrier signal, while in the extraction phase, the watermark is recovered from the watermarked image or video. In addition, watermarking can be visible or invisible if considered visually. In visible watermarking, the watermark is seen by the naked eye, and it is used for content authentication, while in invisible watermarking, the watermark cannot be seen by the naked eye and is used for copyright protection. Based on adversarial attacks, watermarking can be robust watermarking and fragile watermarking. In robust watermarking, the watermark resists adversarial attack and cannot be destroyed, while in fragile watermarking, the watermark is destroyed after slight modification [19]. With the innovation of information technology and multimedia, the threat of digital content misuse always remains under consideration. Therefore, certain effective measures are needed to protect digital content.
Several works on image watermarking have been presented. Rishi et al. [20] proposed a machine learning-based image watermarking approach in which the Mersenne Twister generator is used to generate a random number, and based on the random number, the positions for watermark embedding are selected. The proposed technique shows robustness against different attacks, but imperceptibility values are not comparable. Due to the low imperceptibility value, the watermark is prominent and easy to detect. The proposed technique is good but lacks in some areas, i.e., imperceptibility. Daming Li et al. [21] proposed a Convolutional Neural Network (CNN)-based image watermarking technique using Discrete Cosine Transform (DCT). The proposed technique gives promising results with the cost of computational overhead. The proposed technique lacks computational efficiency. Wafa et al. [21] proposed an image watermarking scheme based on single value decomposition (SVD) and integer wavelet transform to improve robustness, security, and imperceptibility. The proposed scheme generates a hash value to overcome the false positive problem. Hasan et al. [22] used encryption-based image watermarking in two-level discrete wavelet transform and discrete cosine transform. The proposed scheme shows high robustness against different image processing attacks, but geometrical attacks are not covered by the proposed approach. Moreover, the proposed approach shows peak signal-to-noise ratio (PSNR) values greater than forty and structural similarity index measure (SSIM) values closer to one. Yang Liu et al. [23] proposed an encryption-based image watermarking technique in the spatial and frequency domains. The watermark image is first scrambled and then embedded in the host image. The PSNR value of the proposed technique is good and provides robustness against multiple attacks. The recovered watermark against some attacks is not very good, but the overall technique is good and gives good results. Savakar et al. [24] combined blind and non-blind techniques to achieve more robustness and imperceptibility. The proposed technique gives good results in terms of PSNR values. The major issue with this approach is complexity. First, blind watermarking is performed then non-blind watermarking is performed, which makes it computationally more complex. Durgesh et al. [25] solved the false positive problem of SVD by adding the discrete cosine coefficient of each least significant and most significant bit of gray image into a singular middle value. Salah Mokhnache et al. [26] proposed an image watermarking approach using a gradient imaging filter and discrete wavelet transform (DWT). The gradient is used to find the appropriate places for watermark embedding. The proposed technique gives better results but in most cases, the extracted watermark is damaged. The comparison between existing studies is shown in Table 1.
Shuangming Yang et al. [32] proposed an improved spiking neural network (SNN), which is helpful in dealing with the recent challenges of machine learning-based systems. The proposed technique improves the performance of SNN with a minimum error entropy technique. The performance of the proposed approach is tested on memory and autonomous navigation analysis. The SNN uses a plausible neuron model on dynamic rate, while the existing neuron-based algorithm ANN uses a static rate. Machine learning approaches use the learning process to perform a cognitive task, while continual meta-learning provides next-level machine intelligence. Similarly, ref. [33] proposed spike-Driven Few-Shot Online Learning with entropy theory to deal with recent challenges in the learning process. The state-of-the-art SNN is not robust in learning, while the entropy-based SNN enhances the learning process. The existing deep neural network consumes high power compared to SNN. The learning capability of the machine learning algorithms and SNN are limited and dependent on label data, while entropy theory-based SNN enhances the learning level and accomplishes the physically impossible task with minimum resources.
Technology facilitates different domains of life, but at the same time, it also drives us to an insecure zone. In the field of information technology, the invention of internet technology has also introduced data insecurity due to a large data movement on the internet. The digital data moves freely on insecure channels, and attackers can hack and modify the data. The digital data owner who wants to make revenue from his product always remains in danger because of the data breach. There is a need to make certain effective measures to secure digital content on a global level. In this paper, an image watermarking technique based on LSB and a canny edge detection algorithm are proposed. In this approach, an image is divided into non-overlapping blocks, and the intensity gradient of each block is found. Then, a convolution mask is applied to each block to find the gradient magnitude and direction. Based on magnitude and direction, the non-maximum suppression is applied, and the edges in that direction are found. The same process is repeated on each side based on gradient magnitude and direction. Finally, the watermark is added on the edges’ direction. If a watermark is added on smooth image areas, then the watermark can be easily detected, which pauses and breaks the security of the digital content. The main aim is to provide robustness and imperceptibility. The proposed approach uses LSB, which is computationally less expensive and provides a high payload. Secondly, in the proposed approach, the watermark signal is first scrambled and then added to the carrier signal, which increases the security of the proposed approach. This approach gives good results in terms of robustness and imperceptibility.
The remaining paper is structured as follows. Section 2 describes the preliminaries related to the current research work. Section 3 describes the materials and methods used in this research. Section 4 discusses the results of the proposed approach and comparison with existing works. In the end, Section 5 provides the conclusion of our research work.

2. Preliminaries

2.1. Image Gradient

The convolution mask is used to find the gradient magnitude and direction. The gradient magnitude provides information on the image variation. It tells where image sharpness occurs, while gradient direction provides the direction of image variation where image sharpness exists [34]. These two parameters help in image watermarking and provide information about positions feasible for watermark insertion and extraction. The convolution masks used for canny edge detection are [35]. Figure 1 shows the Convolution mask for canny edge detection.
The formula for magnitude and direction finding is given below.
M = g y 2 + g x 2
λ = t a n 1 ( g y g x )
where M shows the magnitude and λ shows the direction, while g y indicates the y-direction gradient and g x indicates the x-direction gradient.

2.2. Least Significant Bit

LSB is a simple spatial domain watermark embedding approach. In this approach, the watermark bit is inserted at the rightmost side of the pixel. LSB is a simple but robust technique in nature due to its direct pixel-level manipulation [36,37]. The mechanism to embed a watermark is shown in Figure 2.

2.3. Chaotic Substitution Box

The substitution box is a major element in the cryptosystem, and a cryptosystem’s strength depends on the substitution box. The substitution box basically generates dispersion in the generated sequence following Shannon’s principal [38]. S-Box is an auxiliary table that takes the nonlinear relation from input to output. S-Box in the early period was algebraic and heuristic; algebraic S-Boxes are computationally complex as a lot of mathematical operations are involved in generating S-Box. Chaos-based S-Box is computationally less expensive because chaos is a nonlinear system that is highly sensitive to the initial condition. By slightly changing the initial value, a completely new S-Box can be generated [39]. In this paper, a chaos-based S-Box based on a piecewise linear chaotic map (PWLCM) and optimization technique is used. The reason for choosing this S-Box is that PWLCM has a constant density function and is very effective in application [40]. PWLCM is represented by the following mathematical expression
x n + 1 = x n ρ , 0 s n < ρ ( x n ρ ) ( 0.5 ρ ) , ρ x n < 0.5 ( 1 ρ x n ) ( 0.5 ρ ) , 0.5 < x n < 1 ρ ( 1 x n ) ρ , 1 ρ < x n < 1.0
X 0 [ 0 , 1 ) and ρ is the control factor ρ ( 0 , 0.5 ) .
The pseudo-code for the generated S-Box is given in Algorithm 1. By changing the value of x n and ρ , new S-Box values are generated. This is because chaotic S-Boxes are highly sensitive to an initial condition. The optimization technique chooses the values that map more difference between output values.
The S-Box values generated by the above algorithm are shown in Table 2. These S-Box values are used to scramble the watermark signal to add extra security.
Algorithm 1 S-Box generation.
Input:  X n , ρ , I
Output: S-Box
 
  1:  while (i < 300) do
  2:     iterate PWLCM with x n
  3:     set x n + 1 = x n
  4:      X F l o o r ( x × 256 )
  5:     if  X S B o x  then
  6:         Sub-Box X
  7:         = i = i + 1
  8:     else
  9:         iterate PWLCM with x n
10:     end if
11:     Optimization
12: end while

3. Materials and Methods

Watermarking is a field of data hiding, in which data is hidden in multimedia content in such a way that no one knows the presence of the hidden data. The hidden data maintains the property of imperceptibility, robustness, and security. The imperceptibility property shows that the original image and the watermarked image are the same. If the watermarked image is different from the original image, then the attacker easily knows that it is a watermarked image. Secondly, the robustness property ensures that the attacker’s attack does not break the inserted watermark. In this paper, an image watermarking technique based on LSB and canny edge detection is proposed. The LSB technique is used because it is simple and has high payload capacity, which means that more watermark bits are inserted. The more watermark bits are inserted, the more robust the technique will be. Moreover, the canny edge detection technique is used to find the suitable positions where watermark bits will be inserted. In this approach, first the gradient magnitude and direction are found. Later, based on that, the edges are found, and the watermark is inserted. The proposed technique is more secure because of its insertion pattern and scrambled watermark image. By this technique, the PSNR and normalized correlation (NC) values make a major difference compared to state-of-the-art methods.

3.1. Watermark Embedding

The image watermarking process comprises two main steps: watermark embedding and watermark extraction. Watermark embedding shows the sequence of steps to insert a watermark into the carrier signal. Figure 3 shows the flow diagram of image watermark embedding.
The watermark embedding process comprises the following steps:
Step 1: Original image G is divided into 16 × 16 independent blocks
G = { G 1 ( 16 × 16 ) , G 2 ( 16 × 16 ) , , G N ( 16 × 16 ) }
Step 2: The intensity gradient of each block is found.
Step 3: The convolution mask is applied, and the gradient magnitude and direction of each block are found.
Step 4: Central and feasible pixels are selected for watermark insertion and separated into LSB and MSB.
G N ( L S B , M S B ) = G N ( X 1 , Y 1 ) , N = { 1 , 2 , 3 , , 256 }
Step 5: Addition of watermark bits using Equations (1) and (2).
  Case 1:  M m a x ( M 2 ) Less bits are embedded into the LSB.
  Case 2:  M < m a x ( M 2 ) More bits are embedded into the LSB.
Step 6: The watermark image is scrambled using the chaotic S-Box.
Step 7: The watermark image is constructed by combining LSB and MSB.
Step 8: Considering all the above-mentioned steps, they are reverse performed.

3.2. Watermark Extraction

Watermark extraction is a process of extracting an inserted watermark from the watermarked image. The normalized correlation parameter shows whether the watermark is successfully extracted or not. The watermark extraction process is performed by reversing all steps, as mentioned in Section 3.1. Figure 4 shows the flow diagram of image watermark extraction.

4. Results and Discussion

To prove the effectiveness of the proposed approach, multiple image processing and geometrical attacks are performed. The most important parameters to test the proposed approach are PSNR, NC, and SSIM. The proposed approach is implemented on the Windows operating system, Intel Core i5 processor with 8Gb random access memory (RAM), and 6th generation Dell machine. MATLAB software is used to perform the operations. The SIPI image dataset is taken from the University of Southern California for experiments, which is available via http://sipi.usc.edu (accessed on 1 September 2022). The experiments involve the use of the grayscale image of size 512 × 512 and the watermark image of size 32 × 32. The watermark image is the first scramble by S-Box based on PWLCM. The LSB method is used to embed the watermark into the host image. The watermarked image is tested against different image processing and geometrical attacks.

4.1. Perceptual Quality Measure

To observe the physical appearance of the watermarked image, two important parameters must be calculated, i.e., PSNR and SSIM. The PSNR value measures the visual appearance. The large value of PSNR shows the visual equivalence between the original and watermarked image. On the other hand, SSIM measures the pixel similarity between the original and watermarked image. In image watermarking, both original and watermarked images look similar; this is the characteristic of the watermarking technique.
μ x = 1 T i = 1 T x i , 1 T i = 1 T y i ,
σ x 2 = 1 T 1 i = 1 T ( x i x ¯ 2 ) , σ y 2 = 1 T 1 i = 1 T ( y i y ¯ 2 ) ,
σ x y 2 = 1 T 1 i = 1 T ( x i x ¯ ) ( y i y ¯ )
The average values of x and y are μ x and μ y , respectively. The values of variance of x and y are σ x 2 and σ y 2 , respectively. The covariance value of x and y is σ x y .
The mathematical calculations for SSIM are given as
S S I M ( x , y ) = ( 2 μ x μ y + c 1 ) ( 2 σ x y + c 2 ) ( μ x 2 + μ y 2 + c 1 ) ( σ x 2 + σ y 2 + c 2 )
The watermark invisibility can be calculated by PSNR value as
P S N R = 10 l o n g 10 ( ( 255 ) 2 M S E )
where the 255 value is the maximum pixel value in the grayscale image, while MSE is the mean squared error, which is calculated as
M S E = 1 M × N m = 1 M n = 1 N e ( m , n ) 2
In the above equation, e ( m , n ) 2 is the measure of the difference between two images while M × N is the actual size of the original image. Figure 5, Figure 6, Figure 7 and Figure 8 are showing the impact of the watermarked approach on a sample of images.
The value of the perceptual quality measure parameter for the standard Lena and Baboon watermarked images without any attack is shown in Table 3.

4.2. Watermark Robustness

The resistance provided by the watermarking technique during the outbreak is termed robustness. Normalized correlation is the parameter to check the robustness of the watermarking technique. For effective watermarking, the normalized correlation value should be closer to or equal to one. If the normalized correlation is closer to one, it indicates that the watermark signal is safely extracted and no attack affects the watermarked image. This proves that the image is safe and not tampered with. The mathematical expression to calculate the normalized correlation is
N C = i W i j j w i j i j ( w i j ) 2
where the original watermark value at ( i , j ) is W i j , while extracted watermark value at ( i , j ) is W i j .
The robustness analysis of the proposed technique against different image processing and geometrical attacks is shown in Table 4. These results are calculated on baboon images, which are taken from a standard SIPI image data set. The proposed technique based on the canny edge detection algorithm shows good results against image processing attacks, i.e., salt and pepper attacks, and Gaussian attacks.
The robustness of the proposed technique against geometrical attacks is shown in Table 5. The geometrical attacks concern the geometry of the image. This type of attack directly affects image dimensions and breaks the watermark signal. The aim is to save the watermark signal and safely recover the signal to prove its authenticity.

4.3. Comparison with Other Techniques

In this section, the performance of the proposed approach is compared with other image watermarking techniques. The comparison made with these papers because of current research is in a particular field. The comparative techniques cover the impact of modern tools and techniques, simplified, and cover the unexplored gap. One of the major benefits of the proposed technique is the smaller number of mathematical operations involved in this approach. Study [25] proposed a technique based on discrete cosine transform (DCT), DWT, and SVD. This technique is free from the false positive problem and provides promising results. The PSNR and NC of this approach are compared in Table 6. The promising result of the proposed technique is compared with [25,26] and [34].
Now attacks are performed on the proposed approach, and the results are compared with other approaches. The comparison of the proposed technique results with [26] shows the robustness of the proposed technique against image processing attacks, as shown in Table 7.
Table 8 shows the robustness against image processing attacks on Lena’s image. The comparison of the proposed technique results with [25] shows the robustness of the proposed technique against image processing attacks.
Table 9 shows the robustness against image processing attacks on baboon images. The comparison of the proposed technique results with [34] shows the robustness of the proposed technique against image processing attacks.
Now, geometric attacks are performed on the proposed technique, and the performance is compared with other techniques. Geometric attacks change the structure of the image and easily destroy the embedded watermark. Therefore, techniques are required to successfully extract the embedded watermark. Table 10 shows the robustness of the proposed technique against geometric attacks.

4.4. Discussion

This study provides a simple yet efficient method to perform image watermarking for security. The proposed approach is based on the canny edge detection algorithm and LSB approach. For watermarking, suitable places are found using canny edge detection. For performance appraisal, experiments are performed using different image processing and geometrical attacks, which shows that the proposed approach is robust against different types of attacks. Compared with existing approaches, the proposed approach provides better results in terms of SSIM and PSNR.

5. Conclusions

In this paper, an image watermarking technique based on a canny edge detection algorithm and LSB approach is proposed to embed watermarks. The canny edge detection algorithm is used to find suitable places to embed watermarks. It is a simple yet efficient approach to detecting edges in an image to find places more suitable to embed the watermark because on a smooth surface, attackers easily detect and break the watermark. Moreover, LSB is used to embed watermarks because LSB works on the pixel level in the time domain and has a higher capacity to add watermarks. In order to check the robustness of the proposed approach, different image processing and geometrical attacks are performed. The robustness parameter’s normalized correlation gives a value closer to one, indicating that the watermark is highly robust and did not break. To vary imperceptibility, SSIM and PSNR give good values that show that no visual change in the original and watermarked image is found. Experimental results indicate better results compared to existing state-of-the-art works. In the future, we intend to apply a new filter to measure the robustness of the watermark image. It is important to manage the filter type and watermark recovery quality. Furthermore, we want to implement this technique in color image watermarking and video watermarking.

Author Contributions

Conceptualization, Z.B.F. and A.I.; Data curation, A.I. and F.R.; Formal analysis, Z.B.F. and M.M.V.; Funding acquisition, I.d.l.T.D.; Investigation, D.G. and M.M.V.; Methodology, F.R.; Project administration, I.d.l.T.D.; Resources, I.d.l.T.D.; Software, F.R. and D.G.; Supervision, I.A.; Validation, M.M.V. and I.A.; Visualization, D.G.; Writing—original draft, Z.B.F. and A.I.; Writing—review and editing, I.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the European University of the Atlantic.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interests.

References

  1. Li, Y. Research and application of deep learning in image recognition. In Proceedings of the 2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA), Shenyang, China, 21–23 January 2022; pp. 994–999. [Google Scholar]
  2. Ravindran, A.; George, A. An Edge Datastore Architecture for {Latency-Critical} Distributed Machine Vision Applications. In Proceedings of the USENIX Workshop on Hot Topics in Edge Computing (HotEdge 18), Boston, MA, USA, 10 July 2018. [Google Scholar]
  3. George, A.; Ravindran, A.; Mendieta, M.; Tabkhi, H. Mez: An adaptive messaging system for latency-sensitive multi-camera machine vision at the iot edge. IEEE Access 2021, 9, 21457–21473. [Google Scholar] [CrossRef]
  4. Cao, K.; Liu, Y.; Meng, G.; Sun, Q. An overview on edge computing research. IEEE Access 2020, 8, 85714–85728. [Google Scholar] [CrossRef]
  5. George, A.; Ravindran, A. Distributed middleware for edge vision systems. In Proceedings of the 2019 IEEE 16th International Conference on Smart Cities: Improving Quality of Life Using ICT & IoT and AI (HONET-ICT), Charlotte, NC, USA, 6–9 October 2019; pp. 193–194. [Google Scholar]
  6. Lenz, R.; Reichert, M. IT support for healthcare processes–premises, challenges, perspectives. Data Knowl. Eng. 2007, 61, 39–58. [Google Scholar] [CrossRef]
  7. George, A.; Ravindran, A.; Mendieta, M.; Tabkhi, H. Mez: A Messaging System for Latency-Sensitive Multi-Camera Machine Vision at the IoT Edge. arXiv 2020, arXiv:2009.13549. [Google Scholar] [CrossRef]
  8. Evsutin, O.; Melman, A.; Meshcheryakov, R. Digital steganography and watermarking for digital images: A review of current research directions. IEEE Access 2020, 8, 166589–166611. [Google Scholar] [CrossRef]
  9. Diffie, W.; Hellman, M.E. New directions in cryptography. In Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman; Association for Computing Machinery: New York, NY, USA, 2022; pp. 365–390. [Google Scholar]
  10. Pachghare, V. Cryptography and Information Security; PHI Learning Pvt. Ltd.: Delhi, India, 2019. [Google Scholar]
  11. Bin Faheem, Z.; Ali, A.; Khan, M.A.; Ul-Haq, M.E.; Ahmad, W. Highly dispersive substitution box (S-box) design using chaos. ETRI J. 2020, 42, 619–632. [Google Scholar] [CrossRef] [Green Version]
  12. Farah, M.; Guesmi, R.; Kachouri, A.; Samet, M. A new design of cryptosystem based on S-box and chaotic permutation. Multimed. Tools Appl. 2020, 79, 19129–19150. [Google Scholar] [CrossRef]
  13. Lu, Q.; Zhu, C.; Wang, G. A novel S-box design algorithm based on a new compound chaotic system. Entropy 2019, 21, 1004. [Google Scholar] [CrossRef] [Green Version]
  14. Dimitrov, M.M. On the design of chaos-based S-boxes. IEEE Access 2020, 8, 117173–117181. [Google Scholar] [CrossRef]
  15. Tanyildizi, E.; Özkaynak, F. A new chaotic S-box generation method using parameter optimization of one dimensional chaotic maps. IEEE Access 2019, 7, 117829–117838. [Google Scholar] [CrossRef]
  16. Begum, M.; Uddin, M.S. Digital image watermarking techniques: A review. Information 2020, 11, 110. [Google Scholar] [CrossRef] [Green Version]
  17. Garg, P.; Kishore, R.R. Performance comparison of various watermarking techniques. Multimed. Tools Appl. 2020, 79, 25921–25967. [Google Scholar] [CrossRef]
  18. Khan, M.A.; Khan, U.A.; Ali, A.; Hussain, F.; Nisar, W. A robust color image watermarking scheme using chaos for copyright protection. Mehran Univ. Res. J. Eng. Technol. 2019, 38, 361–378. [Google Scholar] [CrossRef] [Green Version]
  19. Luo, Y.; Wang, F.; Xu, S.; Zhang, S.; Li, L.; Su, M.; Liu, J. CONCEAL: A robust dual-color image watermarking scheme. Expert Syst. Appl. 2022, 208, 118133. [Google Scholar] [CrossRef]
  20. Sinhal, R.; Jain, D.K.; Ansari, I.A. Machine learning based blind color image watermarking scheme for copyright protection. Pattern Recognit. Lett. 2021, 145, 171–177. [Google Scholar] [CrossRef]
  21. Li, D.; Deng, L.; Gupta, B.B.; Wang, H.; Choi, C. A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Inf. Sci. 2019, 479, 432–447. [Google Scholar] [CrossRef]
  22. Zainol, Z.; Teh, J.S.; Alawida, M. An FPP-resistant SVD-based image watermarking scheme based on chaotic control. Alex. Eng. J. 2022, 61, 5713–5734. [Google Scholar]
  23. Hasan, N.; Islam, M.S.; Chen, W.; Kabir, M.A.; Al-Ahmadi, S. Encryption Based Image Watermarking Algorithm in 2DWT-DCT Domains. Sensors 2021, 21, 5540. [Google Scholar] [CrossRef]
  24. Liu, Y.; Tang, S.; Liu, R.; Zhang, L.; Ma, Z. Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Syst. Appl. 2018, 97, 95–105. [Google Scholar] [CrossRef]
  25. Savakar, D.G.; Ghuli, A. Robust invisible digital image watermarking using hybrid scheme. Arab. J. Sci. Eng. 2019, 44, 3995–4008. [Google Scholar] [CrossRef]
  26. Singh, D.; Singh, S.K. DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection. Multimed. Tools Appl. 2017, 76, 13001–13024. [Google Scholar] [CrossRef]
  27. Mokhnache, S.; Bekkouche, T.; Chikouche, D. A robust watermarking scheme based on DWT and DCT using image gradient. Int. J. Appl. Eng. Res. 2018, 13, 1900–1907. [Google Scholar]
  28. Wang, J.; Du, Z. A method of processing color image watermarking based on the Haar wavelet. J. Vis. Commun. Image Represent. 2019, 64, 102627. [Google Scholar] [CrossRef]
  29. Abraham, J.; Paul, V. An imperceptible spatial domain color image watermarking scheme. J. King Saud-Univ.-Comput. Inf. Sci. 2019, 31, 125–133. [Google Scholar] [CrossRef]
  30. Muyco, S.D.; Hernandez, A.A. Least significant bit hash algorithm for digital image watermarking authentication. In Proceedings of the 2019 5th International Conference on Computing and Artificial Intelligence, Bali, Indonesia, 17–20 April 2019; pp. 150–154. [Google Scholar]
  31. Singh, S.P.; Bhatnagar, G. A new robust watermarking system in integer DCT domain. J. Vis. Commun. Image Represent. 2018, 53, 86–101. [Google Scholar] [CrossRef]
  32. Yang, S.; Tan, J.; Chen, B. Robust spike-based continual meta-learning improved by restricted minimum error entropy criterion. Entropy 2022, 24, 455. [Google Scholar] [CrossRef] [PubMed]
  33. Yang, S.; Linares-Barranco, B.; Chen, B. Heterogeneous Ensemble-Based Spike-Driven Few-Shot Online Learning. Front. Neurosci. 2022, 16, 850932. [Google Scholar] [CrossRef]
  34. Hannoun, K.; Hamiche, H.; Lahdir, M.; Laghrouche, M.; Kassim, S. A novel DWT domain watermarking scheme based on a discrete-time chaotic system. IFAC-PapersOnLine 2018, 51, 50–55. [Google Scholar] [CrossRef]
  35. Faheem, Z.B.; Ali, M.; Raza, M.A.; Arslan, F.; Ali, J.; Masud, M.; Shorfuzzaman, M. Image Watermarking Scheme Using LSB and Image Gradient. Appl. Sci. 2022, 12, 4202. [Google Scholar] [CrossRef]
  36. Owotogbe, J.; Ibiyemi, T.; Adu, B. Edge detection techniques on digital images-a review. Int. J. Innov. Sci. Res. Technol. 2019, 4, 329–332. [Google Scholar]
  37. Kumar, M.; Kumar, R.; Yadav, J. A robust digital speech watermarking based on least significant bit. Int. J. Innov. Technol. Explor. Eng. (IJITEE) 2020, 9, 126–131. [Google Scholar] [CrossRef]
  38. Singh, R.K.; Dube, A.P.; Singh, R. Least Significant Bit-Based Image Watermarking Mechanism: A Review. Int. J. Soc. Ecol. Sustain. Dev. (IJSESD) 2022, 13, 1–9. [Google Scholar] [CrossRef]
  39. Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
  40. Özkaynak, F. On the effect of chaotic system in performance characteristics of chaos based s-box designs. Phys. A Stat. Mech. Its Appl. 2020, 550, 124072. [Google Scholar] [CrossRef]
Figure 1. Convolution mask for canny edge detection.
Figure 1. Convolution mask for canny edge detection.
Sensors 23 01210 g001
Figure 2. Embedding with message byte.
Figure 2. Embedding with message byte.
Sensors 23 01210 g002
Figure 3. Watermark embedding flow diagram.
Figure 3. Watermark embedding flow diagram.
Sensors 23 01210 g003
Figure 4. Watermark extraction flow diagram.
Figure 4. Watermark extraction flow diagram.
Sensors 23 01210 g004
Figure 5. (a) Original Lena image, (b) Watermark image, (c) Scrambled image, and (d) Watermarked Lena image.
Figure 5. (a) Original Lena image, (b) Watermark image, (c) Scrambled image, and (d) Watermarked Lena image.
Sensors 23 01210 g005
Figure 6. (a) Original jet image, (b) Watermark image, (c) Scrambled image, and (d) Watermarked jet image.
Figure 6. (a) Original jet image, (b) Watermark image, (c) Scrambled image, and (d) Watermarked jet image.
Sensors 23 01210 g006aSensors 23 01210 g006b
Figure 7. (a) Original peppers image, (b) Watermark image, (c) Scrambled image, and (d) Watermarked peppers image.
Figure 7. (a) Original peppers image, (b) Watermark image, (c) Scrambled image, and (d) Watermarked peppers image.
Sensors 23 01210 g007
Figure 8. (a) Original baboon image, (b) Watermark image, (c) Scrambled image, and (d) Watermarked baboon image.
Figure 8. (a) Original baboon image, (b) Watermark image, (c) Scrambled image, and (d) Watermarked baboon image.
Sensors 23 01210 g008
Table 1. Analytical comparison of existing works.
Table 1. Analytical comparison of existing works.
TechniqueImage TypeBenefitsLimitationsApplications
[27]ColorRobust against image processing attacksMathematically complexDigital data security
[28]ColorHigh robustness and high visual qualityDifficulty in image differencePatent protection
[29]GrayscaleEasiness in watermark extractionFragileContent authentication
[30]GrayscaleRobust against structural attacks. Removes false positiveSemi robust against histogram attacksContent authentication
[31]GrayscaleRobust against geometrical attacksMathematically complexDigital circuits
Table 2. Generated substitution box.
Table 2. Generated substitution box.
12345678910111213141516
117918222491159102751501512152342111452128517
210595197147183181117188187255137926413283
31891615217193222231932362228622271172162
47416633126155140201631191491331911025254167
59914220725217621840972326419986131160190158
6173232019113129251165198701523724412813961
7122513012121421301444887170606836163123
82393724723531107320613681651078021992229
91002315012524205962323015472457981468
101751522724915628164551271771961164721658124
111159416938108178148725320454222203246217245
122201571342425110619445153781111835118202114
13016823882311925912180109208442213449241
14209135112104195674376174225250112436918529
15162332101865677618412010184717939248226
16103138142404666428814120014390891353132
Table 3. Performance measure.
Table 3. Performance measure.
Image Quality Assessment (IQA)Suggested Method (Lena-Image)Suggested Method (Baboon-Image)Suggested Method (Jet-Image)Suggested Method (Peppers-Image)
PSNR57.805356.7554.90
SSIM1111
Table 4. Normalized correlation against image processing attacks.
Table 4. Normalized correlation against image processing attacks.
AttacksStrengthsProposed Technique
Salt and Pepper0.01NC = 0.9974
Salt and Pepper0.03NC = 0.9950
Gaussian Noise0.001NC = 0.9920
Gaussian Noise0.003NC = 0.9915
Table 5. Normalized correlation against geometric attacks.
Table 5. Normalized correlation against geometric attacks.
AttacksStrengthsProposed Technique
Cropping25%NC = 0.9990
Cropping50%NC = 0.9964
Rotation−25NC = 0.9980
Rotation−50NC = 0.9958
Translation[25 25]NC = 0.9980
Translation[50 50]NC = 0.9925
Table 6. Impercepability analysis.
Table 6. Impercepability analysis.
IQAProposed (Lena)Proposed (Baboon)Baboon [26]Baboon [34]Baboon [25]
PSNR57.80534253.149.75
SSIM11111
Table 7. Normalized correlation against processing attacks.
Table 7. Normalized correlation against processing attacks.
AttacksStrengthsProposed (Baboon)Baboon [26]
Salt and Pepper0.01NC = 0.9974NC = 0.6833
Salt and Pepper0.03NC = 0.9950NC = 0.4013
Gaussian Noise0.001NC = 0.9920NC = 0.9036
Gaussian Noise0.003NC = 0.9915NC = 0.6974
JPEG60%NC = 0.9916NC = 0.9713
Table 8. Normalized correlation against image processing attacks.
Table 8. Normalized correlation against image processing attacks.
AttacksStrengthsProposed (Lena)Lena [25]
Salt and Pepper100%NC = 0.9820NC = 0.9244
Gaussian Noise0.05NC = 0.9910NC = 0.9762
Gaussian Noise0.10NC = 0.9820NC = 0.9561
JPEG60%NC = 0.9920NC = 0.9571
Table 9. Normalized correlation against image processing attacks.
Table 9. Normalized correlation against image processing attacks.
AttacksStrengthsProposed (Baboon)Baboon [34]
Salt and Pepper0.01NC = 0.9974NC = 0.9970
Salt and Pepper0.03NC = 0.9950NC = 0.9948
Gaussian Noise0.05NC = 0.9920NC = 0.9875
Gaussian Noise0.10NC = 0.9915NC = 0.9872
JPEG60%NC = 0.9916NC = 0.9916
Table 10. Normalized correlation against image geometrical attacks.
Table 10. Normalized correlation against image geometrical attacks.
AttacksNormalized Correlation
ProposedRef. [26]Ref. [25]Ref. [34]
Image Cropping 25%NC = 0.9990NC = 0.2827-NC = 9975
Image Cropping 50%NC = 0.9964-NC = 0.9768-
Median Filter 3 × 3NC = 0.9960NC = 0.3124-NC = 9962
Median Filter 9 × 9NC = 0.9840-NC = 9130-
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Faheem, Z.B.; Ishaq, A.; Rustam, F.; de la Torre Díez, I.; Gavilanes, D.; Vergara, M.M.; Ashraf, I. Image Watermarking Using Least Significant Bit and Canny Edge Detection. Sensors 2023, 23, 1210. https://doi.org/10.3390/s23031210

AMA Style

Faheem ZB, Ishaq A, Rustam F, de la Torre Díez I, Gavilanes D, Vergara MM, Ashraf I. Image Watermarking Using Least Significant Bit and Canny Edge Detection. Sensors. 2023; 23(3):1210. https://doi.org/10.3390/s23031210

Chicago/Turabian Style

Faheem, Zaid Bin, Abid Ishaq, Furqan Rustam, Isabel de la Torre Díez, Daniel Gavilanes, Manuel Masias Vergara, and Imran Ashraf. 2023. "Image Watermarking Using Least Significant Bit and Canny Edge Detection" Sensors 23, no. 3: 1210. https://doi.org/10.3390/s23031210

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop