Watermarking Techniques Using Least Significant Bit Algorithm for Digital Image Security Standard Solution- Based Android

Ari Muzakir(1), Mailan Habibi(2),


(1) Universitas Bina Darma
(2) 

Abstract

Ease of deployment of digital image through the internet has positive and negative sides, especially for owners of the original digital image. The positive side of the ease of rapid deployment is the owner of that image deploys digital image files to various sites in the world address. While the downside is that if there is no copyright that serves as protector of the image it will be very easily recognized ownership by other parties. Watermarking is one solution to protect the copyright and know the results of the digital image. With Digital Image Watermarking, copyright resulting digital image will be protected through the insertion of additional information such as owner information and the authenticity of the digital image. The least significant bit (LSB) is one of the algorithm is simple and easy to understand. The results of the simulations carried out using android smartphone shows that the LSB watermarking technique is not able to be seen by naked human eye, meaning there is no significant difference in the image of the original files with images that have been inserted watermarking. The resulting image has dimensions of 640x480 with a bit depth of 32 bits. In addition, to determine the function of the ability of the device (smartphone) in processing the image using this application used black box testing. 

Keywords

Watermarking, Least Significant Bit, Digital Images Security

Full Text:

PDF

References

Frederick, Whitney. 1960. The Element of Research. New York: Prentice-Hall, Inc.

Johnson NF, Jajodia S. 1998. Exploring Steganography: Seeing the Unseen. George Mason University. (Online) (http://www.jjtc.com/pub/r2026.pdf, accessed September 20, 2016).

Katzenbeisser, S. and Petitcolas, F. 1999. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Books.

Munir, Rinaldi. 2004. Stegnography dan Watermarking. Bandung. Institut Bandung.

Saraju Prasad Mohanty. 1999. Watermarking of Digital Images. Submitted at Indian Institute of Science Bangalore, pp. 1.3–1.6.

Sharma, Puneet. and Rajni. 2012. Analysis Of Image Watermarking Using Least Significant Bit Algorithm. International Journal of Information Science and Technique (IJIST) vol.2, No.2, No.4.

Sugiyono. 2010. Metode Penelitian Kuantitatif Kualitatif & RND. Bandung: Alfabeta.

VTT Electronics. 2006. Mobile-DTM is VTT's Methodology for Agile Software Development. (Online) (http://agile.vtt.fi/mobiled.html, accessed September 20, 2016).

Woo, C.-S., J. Du, and B. Pham. 2005. Geometrically Robust Digital Image Watermarking using Scale Normaization and Flowline Curvature. in IS&T/SPIE 17th Annual Symposium: Security, Steganography, and Watermarking of Multimedia Contents VII. San Jose, CA, USA.

Refbacks





Scientific Journal of Informatics (SJI)
p-ISSN 2407-7658 | e-ISSN 2460-0040
Published By Department of Computer Science Universitas Negeri Semarang
Website: https://journal.unnes.ac.id/nju/index.php/sji
Email: [email protected]

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.