Journal of Cloud Computing: Advances, Systems and Applications (Jun 2023)

Digital image watermarking using discrete cosine transformation based linear modulation

  • Waleed Alomoush,
  • Osama A. Khashan,
  • Ayat Alrosan,
  • Hani H. Attar,
  • Ammar Almomani,
  • Fuad Alhosban,
  • Sharif Naser Makhadmeh

DOI
https://doi.org/10.1186/s13677-023-00468-w
Journal volume & issue
Vol. 12, no. 1
pp. 1 – 17

Abstract

Read online

Abstract The proportion of multimedia traffic in data networks has grown substantially as a result of advancements in IT. As a result, it's become necessary to address the following challenges in protecting multimedia data: prevention of unauthorized disclosure of sensitive data, in addition to tracking down the leak's origin, making sure no alterations may be made without permission, and safeguarding intellectual property for digital assets. watermarking is a technique developed to combat this issue, which transfer secure data over the network. The main goal of invisible watermarking is a hidden exchange of data and a message from being discovered by a third party. The objective of this work is to develop a digital image watermarking using discrete cosine transformation based linear modulation. This paper proposed an invisible watermarking method for embedding information into the transformation domain for the grey scale images. This method used the embedding of a stego-text into the least significant bit (LSB) of the Discrete Cosine Transformation (DCT) coefficient by using a linear modulation algorithm. Also, a stego-text is embedded with different sizes ten times within images after embedding the stego-image immune to different kinds of attack, such as salt and pepper, rotation, cropping, and JPEG compression with different criteria. The proposed method is tested using four benchmark images. Also, to evaluate the embedding effect, PSNR, NC and BER are calculated. The outcomes show that the proposed approach is practical and robust, where the obtained results are promising and do not raise any suspicion. In addition, it has a large capacity, and its results are imperceptible, especially when 1bit/block is embedded.

Keywords