{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T02:18:20Z","timestamp":1776046700769,"version":"3.50.1"},"reference-count":40,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T00:00:00Z","timestamp":1674172800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"European University of the Atlantic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>With the advancement in information technology, digital data stealing and duplication have become easier. Over a trillion bytes of data are generated and shared on social media through the internet in a single day, and the authenticity of digital data is currently a major problem. Cryptography and image watermarking are domains that provide multiple security services, such as authenticity, integrity, and privacy. In this paper, a digital image watermarking technique is proposed that employs the least significant bit (LSB) and canny edge detection method. The proposed method provides better security services and it is computationally less expensive, which is the demand of today\u2019s world. The major contribution of this method is to find suitable places for watermarking embedding and provides additional watermark security by scrambling the watermark image. A digital image is divided into non-overlapping blocks, and the gradient is calculated for each block. Then convolution masks are applied to find the gradient direction and magnitude, and non-maximum suppression is applied. Finally, LSB is used to embed the watermark in the hysteresis step. Furthermore, additional security is provided by scrambling the watermark signal using our chaotic substitution box. The proposed technique is more secure because of LSB\u2019s high payload and watermark embedding feature after a canny edge detection filter. The canny edge gradient direction and magnitude find how many bits will be embedded. To test the performance of the proposed technique, several image processing, and geometrical attacks are performed. The proposed method shows high robustness to image processing and geometrical attacks.<\/jats:p>","DOI":"10.3390\/s23031210","type":"journal-article","created":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T06:52:41Z","timestamp":1674197561000},"page":"1210","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["Image Watermarking Using Least Significant Bit and Canny Edge Detection"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0355-5119","authenticated-orcid":false,"given":"Zaid Bin","family":"Faheem","sequence":"first","affiliation":[{"name":"Department of Computer Science & Information Technology, The Islamia University of Bahawalpur, Bahawalpur 63100, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9557-8889","authenticated-orcid":false,"given":"Abid","family":"Ishaq","sequence":"additional","affiliation":[{"name":"Department of Computer Science & Information Technology, The Islamia University of Bahawalpur, Bahawalpur 63100, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8403-1047","authenticated-orcid":false,"given":"Furqan","family":"Rustam","sequence":"additional","affiliation":[{"name":"School of Computer Science, University College Dublin, D04 V1W8 Dublin, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3134-7720","authenticated-orcid":false,"given":"Isabel","family":"de la Torre D\u00edez","sequence":"additional","affiliation":[{"name":"Department of Signal Theory and Communications and Telematic Engineering, University of Valladolid, Paseo de Bel\u00e9n 15, 47011 Valladolid, Spain"}]},{"given":"Daniel","family":"Gavilanes","sequence":"additional","affiliation":[{"name":"Center for Nutrition & Health, Universidad Europea del Atl\u00e1ntico, Isabel Torres 21, 39011 Santander, Spain"},{"name":"Universidad Internacional Iberoamericana, Arecibo, PR 00613, USA"},{"name":"Universidade Internacional do Cuanza, Cuito EN250, Angola"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7555-5017","authenticated-orcid":false,"given":"Manuel Masias","family":"Vergara","sequence":"additional","affiliation":[{"name":"Center for Nutrition & Health, Universidad Europea del Atl\u00e1ntico, Isabel Torres 21, 39011 Santander, Spain"},{"name":"\u00c1rea de Nutrici\u00f3n y Salud, Universidad Internacional Iberoamericana, Campeche 24560, Mexico"},{"name":"Fundaci\u00f3n Universitaria Internacional de Colombia, Bogot\u00e1 111311, Colombia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8271-6496","authenticated-orcid":false,"given":"Imran","family":"Ashraf","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Yeungnam University, Gyeongsan 38541, Republic of Korea"}]}],"member":"1968","published-online":{"date-parts":[[2023,1,20]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Li, Y. (2022, January 21\u201323). Research and application of deep learning in image recognition. Proceedings of the 2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA), Shenyang, China.","DOI":"10.1109\/ICPECA53709.2022.9718847"},{"key":"ref_2","unstructured":"Ravindran, A., and George, A. (2018, January 10). An Edge Datastore Architecture for {Latency-Critical} Distributed Machine Vision Applications. Proceedings of the USENIX Workshop on Hot Topics in Edge Computing (HotEdge 18), Boston, MA, USA."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"21457","DOI":"10.1109\/ACCESS.2021.3055775","article-title":"Mez: An adaptive messaging system for latency-sensitive multi-camera machine vision at the iot edge","volume":"9","author":"George","year":"2021","journal-title":"IEEE Access"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"85714","DOI":"10.1109\/ACCESS.2020.2991734","article-title":"An overview on edge computing research","volume":"8","author":"Cao","year":"2020","journal-title":"IEEE Access"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"George, A., and Ravindran, A. (2019, January 6\u20139). Distributed middleware for edge vision systems. Proceedings of the 2019 IEEE 16th International Conference on Smart Cities: Improving Quality of Life Using ICT & IoT and AI (HONET-ICT), Charlotte, NC, USA.","DOI":"10.1109\/HONET.2019.8908023"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.datak.2006.04.007","article-title":"IT support for healthcare processes\u2013premises, challenges, perspectives","volume":"61","author":"Lenz","year":"2007","journal-title":"Data Knowl. Eng."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"George, A., Ravindran, A., Mendieta, M., and Tabkhi, H. (2020). Mez: A Messaging System for Latency-Sensitive Multi-Camera Machine Vision at the IoT Edge. arXiv.","DOI":"10.1109\/ACCESS.2021.3055775"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"166589","DOI":"10.1109\/ACCESS.2020.3022779","article-title":"Digital steganography and watermarking for digital images: A review of current research directions","volume":"8","author":"Evsutin","year":"2020","journal-title":"IEEE Access"},{"key":"ref_9","unstructured":"Diffie, W., and Hellman, M.E. (2022). Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, Association for Computing Machinery."},{"key":"ref_10","unstructured":"Pachghare, V. (2019). Cryptography and Information Security, PHI Learning Pvt. Ltd."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"619","DOI":"10.4218\/etrij.2019-0138","article-title":"Highly dispersive substitution box (S-box) design using chaos","volume":"42","author":"Ali","year":"2020","journal-title":"ETRI J."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"19129","DOI":"10.1007\/s11042-020-08718-8","article-title":"A new design of cryptosystem based on S-box and chaotic permutation","volume":"79","author":"Farah","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Lu, Q., Zhu, C., and Wang, G. (2019). A novel S-box design algorithm based on a new compound chaotic system. Entropy, 21.","DOI":"10.3390\/e21101004"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"117173","DOI":"10.1109\/ACCESS.2020.3004526","article-title":"On the design of chaos-based S-boxes","volume":"8","author":"Dimitrov","year":"2020","journal-title":"IEEE Access"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"117829","DOI":"10.1109\/ACCESS.2019.2936447","article-title":"A new chaotic S-box generation method using parameter optimization of one dimensional chaotic maps","volume":"7","author":"Tanyildizi","year":"2019","journal-title":"IEEE Access"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Begum, M., and Uddin, M.S. (2020). Digital image watermarking techniques: A review. Information, 11.","DOI":"10.3390\/info11020110"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"25921","DOI":"10.1007\/s11042-020-09262-1","article-title":"Performance comparison of various watermarking techniques","volume":"79","author":"Garg","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"361","DOI":"10.22581\/muet1982.1902.11","article-title":"A robust color image watermarking scheme using chaos for copyright protection","volume":"38","author":"Khan","year":"2019","journal-title":"Mehran Univ. Res. J. Eng. Technol."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"118133","DOI":"10.1016\/j.eswa.2022.118133","article-title":"CONCEAL: A robust dual-color image watermarking scheme","volume":"208","author":"Luo","year":"2022","journal-title":"Expert Syst. Appl."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/j.patrec.2021.02.011","article-title":"Machine learning based blind color image watermarking scheme for copyright protection","volume":"145","author":"Sinhal","year":"2021","journal-title":"Pattern Recognit. Lett."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1016\/j.ins.2018.02.060","article-title":"A novel CNN based security guaranteed image watermarking generation scenario for smart city applications","volume":"479","author":"Li","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"5713","DOI":"10.1016\/j.aej.2021.10.052","article-title":"An FPP-resistant SVD-based image watermarking scheme based on chaotic control","volume":"61","author":"Zainol","year":"2022","journal-title":"Alex. Eng. J."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Hasan, N., Islam, M.S., Chen, W., Kabir, M.A., and Al-Ahmadi, S. (2021). Encryption Based Image Watermarking Algorithm in 2DWT-DCT Domains. Sensors, 21.","DOI":"10.3390\/s21165540"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.eswa.2017.12.003","article-title":"Secure and robust digital image watermarking scheme using logistic and RSA encryption","volume":"97","author":"Liu","year":"2018","journal-title":"Expert Syst. Appl."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"3995","DOI":"10.1007\/s13369-019-03751-8","article-title":"Robust invisible digital image watermarking using hybrid scheme","volume":"44","author":"Savakar","year":"2019","journal-title":"Arab. J. Sci. Eng."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"13001","DOI":"10.1007\/s11042-016-3706-6","article-title":"DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection","volume":"76","author":"Singh","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_27","first-page":"1900","article-title":"A robust watermarking scheme based on DWT and DCT using image gradient","volume":"13","author":"Mokhnache","year":"2018","journal-title":"Int. J. Appl. Eng. Res."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"102627","DOI":"10.1016\/j.jvcir.2019.102627","article-title":"A method of processing color image watermarking based on the Haar wavelet","volume":"64","author":"Wang","year":"2019","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_29","first-page":"125","article-title":"An imperceptible spatial domain color image watermarking scheme","volume":"31","author":"Abraham","year":"2019","journal-title":"J. King Saud-Univ.-Comput. Inf. Sci."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Muyco, S.D., and Hernandez, A.A. (2019, January 17\u201320). Least significant bit hash algorithm for digital image watermarking authentication. Proceedings of the 2019 5th International Conference on Computing and Artificial Intelligence, Bali, Indonesia.","DOI":"10.1145\/3330482.3330523"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1016\/j.jvcir.2018.03.006","article-title":"A new robust watermarking system in integer DCT domain","volume":"53","author":"Singh","year":"2018","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Yang, S., Tan, J., and Chen, B. (2022). Robust spike-based continual meta-learning improved by restricted minimum error entropy criterion. Entropy, 24.","DOI":"10.3390\/e24040455"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"850932","DOI":"10.3389\/fnins.2022.850932","article-title":"Heterogeneous Ensemble-Based Spike-Driven Few-Shot Online Learning","volume":"16","author":"Yang","year":"2022","journal-title":"Front. Neurosci."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/j.ifacol.2018.12.089","article-title":"A novel DWT domain watermarking scheme based on a discrete-time chaotic system","volume":"51","author":"Hannoun","year":"2018","journal-title":"IFAC-PapersOnLine"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Faheem, Z.B., Ali, M., Raza, M.A., Arslan, F., Ali, J., Masud, M., and Shorfuzzaman, M. (2022). Image Watermarking Scheme Using LSB and Image Gradient. Appl. Sci., 12.","DOI":"10.3390\/app12094202"},{"key":"ref_36","first-page":"329","article-title":"Edge detection techniques on digital images-a review","volume":"4","author":"Owotogbe","year":"2019","journal-title":"Int. J. Innov. Sci. Res. Technol."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"126","DOI":"10.35940\/ijitee.E3201.049620","article-title":"A robust digital speech watermarking based on least significant bit","volume":"9","author":"Kumar","year":"2020","journal-title":"Int. J. Innov. Technol. Explor. Eng. (IJITEE)"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJSESD.315310","article-title":"Least Significant Bit-Based Image Watermarking Mechanism: A Review","volume":"13","author":"Singh","year":"2022","journal-title":"Int. J. Soc. Ecol. Sustain. Dev. (IJSESD)"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","article-title":"Communication theory of secrecy systems","volume":"28","author":"Shannon","year":"1949","journal-title":"Bell Syst. Tech. J."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"124072","DOI":"10.1016\/j.physa.2019.124072","article-title":"On the effect of chaotic system in performance characteristics of chaos based s-box designs","volume":"550","year":"2020","journal-title":"Phys. A Stat. Mech. Its Appl."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/3\/1210\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:12:05Z","timestamp":1760119925000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/3\/1210"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,20]]},"references-count":40,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2023,2]]}},"alternative-id":["s23031210"],"URL":"https:\/\/doi.org\/10.3390\/s23031210","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,20]]}}}