LSB Steganography to Embed Creator's Watermark in Batik Digital Arts

https://doi.org/10.56741/esl.v2i01.301

Authors

Keywords:

least significant bit (LSB), steganography, watermark, batik, digital, arts

Abstract

This paper presents an implementation of Least Significant Bit (LSB) steganography to embed a hidden watermark in batik digital images. The goal of the technique is to provide a means of protecting the intellectual property of creators of batik digital arts while still allowing the images to be freely distributed and shared. The study demonstrates the effectiveness of the technique by showing that the embedded watermark is not visible to the human eye and does not significantly alter the quality of the image. The proposed technique uses the LSB method to embed a watermark in the binary data of the batik digital image. This method involves replacing the least significant bit of the image's pixel values with the bits of the watermark, thus altering the binary data of the image without causing noticeable changes in its visual appearance. The embedded watermark can only be detected by a decoding process, making it difficult to be removed or tampered with. The results of the study show that the implemented LSB steganography technique is successful in achieving its objective. The technique is able to effectively embed a hidden watermark in batik digital images without significantly altering the image quality or causing visual artifacts. This work highlights the potential of LSB steganography as a valuable tool for protecting the intellectual property of digital art creators, particularly in the field of batik images. Overall, this study contributes to the growing body of research on steganography and digital media protection. The successful implementation of the LSB steganography technique provides a promising approach for safeguarding the intellectual property of creators in the digital arts industry. Future research may explore other steganography techniques to address potential vulnerabilities and limitations of the LSB method.

Downloads

Download data is not yet available.

References

N. Subramanian, O. Elharrouss, S. Al-Maadeed and A. Bouridane, ”Image Steganography: A Review of the Recent Advances,” in IEEE Access, vol. 9, pp. 23409-23423, 2021, doi: 10.1109/ACCESS.2021.3053998.

B. Li, M. Wang, J. Huang and X. Li, ”A new cost function for spatial image steganography,” 2014 IEEE International Conference on Image Processing (ICIP), Paris, France, 2014, pp. 4206-4210, doi: 10.1109/ICIP.2014.7025854.

L. M. Marvel, C. G. Boncelet and C. T. Retter, ”Spread spectrum image steganography,” in IEEE Transactions on Image Processing, vol. 8, no. 8, pp. 1075-1083, Aug. 1999, doi: 10.1109/83.777088.

J. Tao, S. Li, X. Zhang and Z. Wang, ”Towards Robust Image Steganography,” in IEEE Transactions on Circuits and Systems for Video Technology, vol. 29, no. 2, pp. 594-600, Feb. 2019, doi: 10.1109/TCSVT.2018.2881118.

Changyong Xu, Xijian Ping and Tao Zhang, ”Steganography in Compressed Video Stream,” First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC’06), Beijing, China, 2006, pp. 269-272, doi: 10.1109/ICICIC.2006.158.

M. Dixit, N. Bhide, S. Khankhoje and R. Ukarande, ”Video Steganography,” 2015 International Conference on Pervasive Computing (ICPC), Pune, India, 2015, pp. 1-4, doi: 10.1109/PERVASIVE.2015.7087159.

S. D. Hu and K. Tak U., ”A Novel Video Steganography Based on Non-uniform Rectangular Partition,” 2011 14th IEEE International Conference on Computational Science and Engineering, Dalian, China, 2011, pp. 57-61, doi: 10.1109/CSE.2011.24.

J. Wu, B. Chen, W. Luo and Y. Fang, ”Audio Steganography Based on Iterative Adversarial Attacks Against Convolutional Neural Networks,” in IEEE Transactions on Information Forensics and Security, vol. 15, pp. 2282-2294, 2020, doi: 10.1109/TIFS.2019.2963764.

F. Hemeida, W. Alexan and S. Mamdouh, ”Blowfish–Secured Audio Steganography,” 2019 Novel Intelligent and Leading Emerging Sciences Conference (NILES), Giza, Egypt, 2019, pp. 17-20, doi: 10.1109/NILES.2019.8909206.

X. Yi, K. Yang, X. Zhao, Y. Wang and H. Yu, ”AHCM: Adaptive Huffman Code Mapping for Audio Steganography Based on Psychoacoustic Model,” in IEEE Transactions on Information Forensics and Security, vol. 14, no. 8, pp. 2217-2231, Aug. 2019, doi: 10.1109/TIFS.2019.2895200.

M. S. Sutaone and M. V. Khandare, ”Image based steganography using LSB insertion technique,” 2008 IET International Conference on Wireless, Mobile and Multimedia Networks, Beijing, 2008, pp. 146151.

S. L. Chikouche and N. Chikouche, ”An improved approach for lsb-based image steganography using AES algorithm,” 2017 5th International Conference on Electrical Engineering - Boumerdes (ICEE-B), Boumerdes, Algeria, 2017, pp. 1-6, doi: 10.1109/ICEEB.2017.8192077.

N. Menon and Vaithiyanathan, ”A survey on image steganography,” 2017 International Conference on Technological Advancements in Power and Energy (TAP Energy), Kollam, India, 2017, pp. 1-5, doi: 10.1109/TAPENERGY.2017.8397274.

D. Neeta, K. Snehal and D. Jacobs, ”Implementation of LSB Steganography and Its Evaluation for Various Bits,” 2006 1st International Conference on Digital Information Management, Bangalore, India, 2007, pp. 173-178, doi: 10.1109/ICDIM.2007.369349.

W. Alexan, A. Elkhateeb, E. Mamdouh, F. Al-Seba’Ey, Z. Amr and H. Khalil, ”Utilization of Corner Filters, AES and LSB Steganography for Secure Message Transmission,” 2021 International Conference on Microelectronics (ICM), New Cairo City, Egypt, 2021, pp. 29-33, doi: 10.1109/ICM52667.2021.9664947.

S. Sakshi, S. Verma, P. Chaturvedi and S. A. Yadav, ”Least Significant Bit Steganography for Text and Image hiding,” 2022 3rd International Conference on Intelligent Engineering and Management (ICIEM), London, United Kingdom, 2022, pp. 415-421, doi: 10.1109/ICIEM54221.2022.9853052.

A. Priyadharshini, R. Umamaheswari, N. Jayapandian and S. Priyananci, ”Securing Medical Images using Encryption and LSB Steganography,” 2021 International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), Bhilai, India, 2021, pp. 1-5, doi: 10.1109/ICAECT49130.2021.9392396.

R. Dumre and A. Dave, ”Exploring LSB Steganography Possibilities in RGB Images,” 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT), Kharagpur, India, 2021, pp. 1-7, doi: 10.1109/ICCCNT51525.2021.9579588.

M. Kumar, A. Soni, A. R. S. Shekhawat and A. Rawat, ”Enhanced Digital Image and Text Data Security Using Hybrid Model of LSB Steganography and AES Cryptography Technique,” 2022 Second International Conference on Artificial Intelligence and Smart Energy (ICAIS), Coimbatore, India, 2022, pp. 1453-1457, doi: 10.1109/ICAIS53314.2022.9742942.

K. Tiwari and S. J. Gangurde, ”LSB Steganography Using Pixel Locator Sequence with AES,” 2021 2nd International Conference on

Secure Cyber Computing and Communications (ICSCCC), Jalandhar, India, 2021, pp. 302-307, doi: 10.1109/ICSCCC51823.2021.9478162.

S. A. Prasetyo, ”Karakteristik Motif Batik Kendal Interpretasi dari Wilayah dan Letak Geografis” in Imajinasi: Jurnal Seni, vol. 10, pp. 51-60, 2016, doi: 10.15294/imajinasi.v10i1.8816.

A. Asok and P. Mohan, ”Implementation and Comparison of different Data Hiding Techniques in Image Steganography,” 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, India, 2019, pp. 1180-1183, doi: 10.1109/ICOEI.2019.8862750.

H. Ge, M. Huang and Q. Wang, ”Steganography and steganalysis based on digital image,” 2011 4th International Congress on Image and Signal Processing, Shanghai, China, 2011, pp. 252-255, doi: 10.1109/CISP.2011.6099953.

R. Mishra and P. Bhanodiya, ”A review on steganography and cryptography,” 2015 International Conference on Advances in Computer Engineering and Applications, Ghaziabad, India, 2015, pp. 119-122, doi: 10.1109/ICACEA.2015.7164679.

Y. J. Chanu, T. Tuithung and K. Manglem Singh, ”A short survey on image steganography and steganalysis techniques,” 2012 3rd National Conference on Emerging Trends and Applications in Computer Science, Shillong, India, 2012, pp. 52-55, doi: 10.1109/NCETACS.2012.6203297.

N. Mohamed, T. Rabie and I. Kamel, ”A Review of Color Image Steganalysis in the Transform Domain,” 2020 14th International Conference on Innovations in Information Technology (IIT), Al Ain, United Arab Emirates, 2020, pp. 45-50, doi: 10.1109/IIT50501.2020.9299075.

G. L. Smitha and E. Baburaj, ”A survey on image steganography based on Least Significant bit Matched Revisited (LSBMR) algorithm,” 2016 International Conference on Emerging Technological Trends (ICETT), Kollam, India, 2016, pp. 1-6, doi: 10.1109/ICETT.2016.7873746.

J. Pandey, K. Joshi, M. Jangra and M. Sain, ”Pixel Indicator Steganography Technique with Enhanced Capacity for RGB Images,” 2019 International Conference on Intelligent Computing and Control Systems (ICCS), Madurai, India, 2019, pp. 738-743, doi: 10.1109/ICCS45141.2019.9065350.

S. G. K. D. N. Samaratunge, ”New steganography technique for palette based images,” 2007 International Conference on Industrial and Information Systems, Peradeniya, Sri Lanka, 2007, pp. 335-340, doi: 10.1109/ICIINFS.2007.4579198.

Published

2023-03-11

How to Cite

Miftahul Amri, M., Waeno, M., & Zain Musa, M. (2023). LSB Steganography to Embed Creator’s Watermark in Batik Digital Arts. Engineering Science Letter, 2(01), 27–32. https://doi.org/10.56741/esl.v2i01.301

Plaudit