Page 85 - IJEEE-2023-Vol19-ISSUE-1
P. 85
Hussein, Muhajjar & Mahdi | 81
embedding process. The extraction process is the opposite of
B. Embedding stage (Sender) the embedding process.
This stage is often performed by the sender, responsible for Flowchart 1: The process of embedding in one block.
protecting the picture against tampering by entering sensitive
data by a specified plan with the recipient. The Two tasks are
within the purview of the sender: implementing VC and
using a hash (SHA256). These two processes, as described
before, generate the secret bits.
1) Pre-Processing System
The suggested method is designed to operate with color
images. A high-quality digital image was obtained in this
instance. The first step in this procedure is ensuring that the
image size is 900 pixels wide by 1250 pixels tall. As a result,
the sender obtains the image and proceeds to the next system
step.
2) Divided Blocks
Using the watermarking generator, the sender splits the
image into eight blocks of the same size, embedding a certain
amount of confidential data. The pixels inside the selected
block will be explicitly set. The red, green, and blue (RGB)
values for each pixel in a color image are individually kept
in an array of sizes M by N by 3, where M is rows and N is
columns. First, the RGB color image has been separated into
individual layers. Then chosen a pixel is, its color's integer
value is transformed to binary. Further, the proposed
embedding approach benefits from parallel processing of the
three-band color image.
3) Pixel Per Pixel
A specific pixel has been chosen at this point. The primary
action is to split the pixel color image into three layers. After
selecting a pixel, the integer value for color is converted to
binary. At this point, the locations of the pixels that will be
embedded will be determined. Selecting pixels one by one is
the standard method for finding altered areas.
4) Embedding Process
The embedding procedure starts with selecting a block and
the required pixels inside that block. Each color in this
picture includes 8 bits after converting the pixel to binary
RGB images. Also, the pixel has two parts—the most
significant bit (MSB) and the least significant bit (LSB), each
of which is four bits. LSB enables the system to operate in
the spatial realm by changing pixel values without
decreasing picture quality. The key benefit of LSB is that it
has essential features: (Ease of implementation, writing
code, execution time, and storage requirements) since it
trades the value of another location without needing complex
calculations. The following flowchart1 explains the
embedding mechanism within a single block, and these steps
are repeated on the eight blocks until all confidential
information is embedded.
C. Extracting stage (Receiver)
The extraction process is based on the block and pixel
requirements established during the embedding phase.
Separating the image into eight blocks and giving each pixel
one of the three RGB colors allows easy extraction of the
watermark bits. In most cases, there are two steps to the
extraction procedure. The first step must recover eight hash
codes before the VC bits can be extracted and the logo
recreated. The extraction process is the opposite of the