Image watermarking technique applying multiple encryption techniques

다중 암호화 기법을 적용한 영상 워터마킹 기법

  • Jung, Soo-Mok (Division of Computer Science & Engineering, Sahmyook University)
  • Received : 2020.12.04
  • Accepted : 2020.12.15
  • Published : 2020.12.30


In this paper, we proposed an effective technique that greatly improves the security of the watermark by concealing the multiple-encrypted watermark in the LSB of the image pixel. Even if multiple encrypted watermark hidden in the LSBs of an image pixel are extracted, it is impossible to decrypt them, so the security of the watermark is maintained very high. If the watermark is multiple encrypted and hidden in the image using the proposed technique, the visual quality of the watermark-hidden image is very high, making it impossible to distinguish between the original image and the resulting image in which the watermark is hidden. The original watermark data can be completely extracted without loss, according to the procedure of the proposed technique, from the resulting image that the watermark is encrypted and hidden in the original image. The performance of the proposed technique was analyzed mathematically and the superiority of the proposed technique was confirmed through experiments. The proposed technique is an excellent image watermarking technique that greatly improves the security of the watermark hidden in the image compared to the existing technique.

본 논문에서는 다중으로 암호화한 워터마크를 영상 픽셀의 LSB에 은닉하여 워터마크의 보안성을 크게 향상시키는 효과적인 기법을 제안하였다. 영상 픽셀의 LSB에 은닉되어 있는 다중 암호화된 워터마크를 추출하여도 이를 해독하는 것이 불가능하기 때문에 워터마크의 보안성이 매우 높게 유지된다. 제안된 기법을 사용하여 워터마크를 다중으로 암호화하여 영상에 은닉하면, 워터마크가 은닉된 영상의 시각적 화질이 매우 높아 원본 영상과 워터마크가 은닉된 결과 영상의 구별이 불가능하다. 워터마크를 다중으로 암호화하여 원본 영상에 은닉한 결과 영상으로부터, 제안 기법의 절차를 따라 원본 워터마크 데이터를 손실 없이 온전히 추출할 수 있다. 제안된 기법의 성능을 수학적으로 분석하고 제안된 기법의 우수성을 실험을 통하여 확인하였다. 제안된 기법은 기존의 기법에 비하여 영상에 은닉된 워터마크의 보안성을 크게 향상시킨 우수한 영상 워터마킹 기법이다.



  1. Z. Andrew, Tirkel, G. A. Rankin, G. Ron, V. Schyndel, W. J. Ho, N. R. A. Mee, C. F. Osborne, "Electronic watermark", Digital Image Computing, Technology and Applications, pp. 666-673, Macquarie University, 1994.
  2. A. J. Zargar, "Digital Image Watermarking using LSB Technique", International Journal of Scientific & Engineering Research, Vol. 5, Issue 7, pp. 202-205, March, 2014.
  3. P. Gaur, and N. Manglani, "Image Watermarking Using LSB Technique", International Journal of Engineering Research and General Science, Vol. 3, Issue 3, pp. 1424-1433, June, 2015.
  4. B. Chitradevi, N. Thinaharan, M. Vasanthi, "Data Hiding Using Least Significant Bit Steganography in Digital Images", Stat. Approaches Multidiscip. Res. Vol. 1, pp. 143-150, January, 2017.
  5. Z. Ni, Y.Q. Shi, N. Ansari, W. Su, "Reversible data hiding", IEEE Trans. Circuits Syst. Video Technol. Vol. 16, pp. 354-362, 2006,
  6. X. Li, J. Li, B. Li, B. Yang, "High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion", Signal Process. Vol. 93, pp. 198-205, 2013.
  7. S. Arunkumar, V. Subramaniyaswamy, N. Sivarama krishnan, "Reversible Data Hiding scheme using modified Histogram Shifting in Encrypted Images for Bio-medical images. Int. J. Pure Appl. Math. Vol. 119, pp. 13233-13240, 2018.
  8. S. M. Jung, B. W. On, "An Advanced Reversible Data Hiding Algorithm Using Local Similarity, Curved Surface Characteristics, and Edge Characteristics in Images", Applied Sciences, Vol. 10, No. 3, pp. 836-860, 2020.
  9. S. M. Jung, "An Advanced Color Watermarking Technique using Various Spatial Encryption Techniques", The Journal of Korea Institute of Information, Electronics, and Communication Technology, Vol. 13, No. 3, pp.262-266, June, 2020.
  10. S. M. Jung, "A technique of embedding confidential data in images by applying encryption and spatial encryption techniques", KIIECT Summer Conference 2020.
  11. S. M. Jung, "An improved technique to hide confidential data in image", KIIECT Winter Conference 2020.

Cited by

  1. Watermarking Technique using Image Characteristics vol.13, pp.1, 2020,
  2. Data hiding technique using image pixel value and spatial encryption technique vol.13, pp.3, 2020,