Watermarking Using LSB Shifting to Document Protection

The original signature or document. The application demonstrates that it can be used to protect a document or signature from fraud by an authorize person. Criminal can be considered as Harmful act or omission against the public which the State wishes to prevent and which, upon con eviction, is punishable by fine, imprisonment, and/or death. No conduct constitutes a crime unless it is declared criminal in the laws of the country. Some crimes (such as theft or criminal damage) may also be civil wrongs (torts) for which the victim(s) may claim damages in compensation. Criminals may be happened in every sector and in daily life. Criminal acts may be in the form of copy right fraud and signature forgery. In this work we try to solve or prevent those criminals. By using watermarking technique, the work proposed to introduce new technique to protect document originality quickly and accurately. Watermarking was carried out by inserting an image or text into signature image in order to protect. The work shows that file size produced by integrating the two same files but on different file stored and also produce different file size. Moreover Testing shows that steganography of image file with JPEG format and file image hidden with JPEG format which produced other small size of file from file steganography storage such as BMP and PNG formats.


INTRODUCTION
Fraud or violation to unauthorized copy right always happened repeatedly and become more complicate. Forgery to valuable documents and signature has fatal impact in many sectors. Therefore, protection to valuable documents and signatures is very important and critical. To resolve this problem, we tried to introduce as well as build an application to secure copy right of valuable documents from document scam.In computer vision and image processing, forgery or plagiarism can be overawed by using some techniques such as watermarking, image blending, and contect based image retrieval techniques. Watermarking technique was carried out by inserting a watermark into document or signature. Watermark can considered as digital signature of the owner multimedia products. Moreover, watermark inserted become copy right. Designation given to document by using water marking was carried out, so information inserted will not damage digital data protected. Therefore, to open multimedia product inserted with watermark, he/she does not realize that the product was inserted with watermark or digital signature. Previous researches showed that SVD based watermarking with dither quantization as well as edge detection can be used to produce modified image carried out by using many techniques [5]. Meanwhile, other researchers, water marking method was deployed together with removal DC method in DC audio digital inserted into binary image using an software [6]. The work also using digital watermarking with image RGB and correlation Discrete Cosines Transforms (DCT) method which carried out by comparing floating value [7]. This work using adaptive digital watermarking. Inserting digital image can be used to identify the owner of digital image protected [8]. Implementation of watermarking to protect documents was carried out by using Least Significant Bit (LSB) and use to insert code. The code is an image which considered as watermarking and inserted as a security code. A security inserted was invisible and it does not modify the original image [3].

WATERMARK PROCESSING
Inserting watermarking into an image is encoding. Encoding process can used as well as inserting key or without inserting key [2]. A key was needed in order to only an authorize person able to open documents. Key is also purposed to prevent deleting watermark by unauthorized person.

. Verification Process in image digital
Verification watermark was carrier out to verify the ownership of document. Watermarking verification consist of two subprocesses namely: watermark extraction and comparison. Extraction process can be called as coding, it proposed to expose watermark from inside the image. Decoding can be carried out by using original image or without original image, decoding was deployed to improve performance of watermarking. Comparison process used to compare watermark revealed with original watermark.

Digital Watermarking
Digital watermarking considered as technique insert information into data using a certain method which cause watermark to be deleted or destroy [1]. Mainly, watermark consists of two types, visible and invisible watermarks [3]. Visible watermark, this watermark can see or visible for human being. Visible watermark has characteristic very robust due to its watermark easy to recognize and difficult to delete. In this case, the inserted watermark can be inserted as solid watermark or transparent watermark. This kind of watermark needs cropping to remove from the original image. Invisible watermark, this kind of watermark is not visible for human being but can be extracted by using certain computational method. The purposed of invisible watermark is to verify the ownership or verify the integrity image digital or information. It usually when extraction of invisible watermarking need a password which is called watermark key.

Least Significant Bit Hiding (LSB)
Image digital can be defined as a f(x,y) function, the function has M rows and N columns, where x and y are spatial coordinate whilst f is point of (x,y) coordinate. When x and y values, and amplitude f value that has finite discrete value. Incision value between rows and columns (at x,y position) and called as picture elements, image elements or pels or pixels [9]. Least Significant Bi method considered as one of watermarking methods that works in Red Green Blue R,G,B) mode. This method was carried out by inserting information into the most right bits from every RGB element. Change in the most right bit will only cause RGB value change 1 of 256 colors. LSB method directly manipulates intensity value from the number pixels. Hiding data can be carried out by replacing data bits in image segment with secret data bits. During replacing process there is one bit lost, and it is called Least Significant Bit (LSB). This LSB will be manipulated to insert watermark [4].

Image Shifting Operation
Shifting operation used to locate watermark or marked image as needed. The following is an equation used in watermark shifting.

RESULTS AND DISCUSSION
The algorithm constructed from this work is better algorithm compared to previous algorithms, the algorithm can be explained as follow: The application built from this work is very useful to hide of Intel logo image into document in order to protect the originality of document. Some outputs produced by this application can be examined on fig.6.

Snapshot Program Display
When the program run, on the screen will shows "beginning menu" this menu displays three sub-menus, namely: File, Steganography, and Help menus. The menu can be illustrated at the following figures:   Watermark can be considered as a previous image inserted, but it can be re-extracted. Extraction result from document can be illustrated at figure 5.   Another testing also been carried out to file with BMP and PNG formats. This integration produces different files one and the other as illustrate in table 1, below:  Table 1 shows that file size produced by integrating the two same files but on different file stored and also produce different file size. When extraction process was chosen with PNG and BMP formats. In the steganography image extraction process which has PNG and BMP formats, sequent recovery of hidden image process will be carried out. Due this process, hidden file will appear and will be saved into JPEG, PNG, and BMP formats.

CONCLUSION
The application was built and provides two processes, namely inserting watermark process and extraction process. Inserting watermark process was carried out by some steps: First, input original image then convert to vector form, vector form then converts to binary form. Sequently, input image binary which is hidden inside cover image binary according queue. Finally, converting process to be carried out by changes new binary value to decimal format and new image vector. Watermarked document can be recovered by extraction process which is extracting hidden image. This extraction can be done by some steps, namely: Convert watermark into vector form, then vector form convert into binary form. Based on the extraction, we take the most right bit from each the n th binary vector. Finally, convert to decimal every multiple 8 from binary produced and then arranging process into RGB format of each pixel.
When a watermark inserted into a valuable document such as certificate, charter, cheque, etc. The application expected will assist the authority to protect originality of a document. With this application will use to help improve document security and to protect fraud of unathority person. Testing shows that steganography of image file with JPEG format and file image hidden with JPEG format which produced other small size of file from file steganography storage such as BMP and PNG formats. Due to this, steganography file with JPEG format will reduce and save storage.