Robust Lossless Data Hiding. Outline
|
|
- Myrtle Clark
- 5 years ago
- Views:
Transcription
1 Robust Lossless Data Hiding Yun Q. Shi, Zhicheng Ni, Nirwan Ansari Electrical and Computer Engineering New Jersey Institute of Technology October Outline What is lossless data hiding Existing robust lossless data hiding techniques Our developed new technology Bit embedding strategy Error correction code Chaotic mixing Data embedding block diagram Data extraction block diagram Experimental results 2 1
2 What is lossless data hiding? Data hiding Most data hiding techniques are lossy Spread spectrum (over/underflow, round-off error) LSB (bit-replacement without memory) QIM (quantization error) Original Lena image Image after data hiding 3 Lossless data hiding is such a data hiding technique in which the original cover media can be recovered without any distortion after data extraction. Also referred to as: reversible, distortion-free, invertible, distortionless. It is often used in special applications, such as military image and medical image, where the original image is of importance. Most of them are fragile, which means the hidden data cannot be recovered when compression or other small alteration is applied to the marked image. 4 2
3 Only Existing Robust Lossless Data Hiding Technique: Vleeschouwer et al. s It has some robustness against high quality JPEG compression, i.e., hidden data can be retrieved correctly. Main idea: 1. Each group is randomly divided into two sets of pixels of equal size, i.e., zones A and B The histogram is mapped onto a circle: positions luminance, weight number of pixels corresponding to the luminance. Number of pixel number Q-2 Q-1 Pixel value Q-2 Q
4 3. Vectors C a and C b point from the center of the circle to the mass center of zones A and B, respectively. Note: modulo 256 addition is used in bit embedding to prevent over/underflow. 7 Robustness test: 100 bits are embedded. 8 4
5 Drawbacks: 1. Salt-and-pepper noise: Since modulo 256 addition is used, a very bright pixel with a large gray value close to 255 will be possibly changed to a very dark pixel with a small gray value close to 0, and vice versa. 2. Low PSNR See figures and numbers below. 9 Marked medical image (severe salt-pepper noise) 10 5
6 Marked medical image (severe salt-pepper noise) 11 Marked medical image (severe salt-pepper noise) 12 6
7 Marked medical image (severe salt-pepper noise) 13 Marked medical image (severe salt-pepper noise) 14 7
8 Marked medical image (some salt-pepper noise). 15 Marked medical image (some salt-pepper noise). 16 8
9 Marked medical image (some salt-pepper noise). 17 Marked JPEG2000 test image (severe salt-pepper noise). 18 9
10 Marked JPEG2000 test image (severe salt-pepper noise). 19 Marked JPEG2000 test image (severe salt-pepper noise)
11 Marked JPEG2000 test image (severe salt-pepper noise). 21 Marked JPEG2000 image (severe salt-pepper noise)
12 Marked JPEG2000 image (some salt-pepper noise). 23 Marked JPEG2000 image (some salt-pepper noise)
13 Marked JPEG2000 image (some salt-pepper noise) Low PSNR. Images (512x512) PSNR of marked image (db) Data embedding capacity (bits) Robustness (bpp) Mpic Mpic Mpic Mpic Mpic Mpic Mpic Mpic
14 Images (1536x1920) PSNR of marked image (db) Data embedding capacity (bits) Robustness (bpp) N1A N2A N3A N4A N5A N6A N7A N8A Our Novel Robust Lossless Data Hiding Technique No salt-and-pepper noise at all. Applicable to commonly used image, medical image, more than 1000 images in CorelDRAW database, and JPEG2000 test images. Average PSNR of marked images is above 39 db. Robust to JPEG2000 or JPEG compression to a certain extent Data embedding capacity is adjustable, can provide 512 to 1024 bits (satisfactory for authentication purpose)
15 Main Idea Block statistic moment is used as a robust parameter to embed information. For a given image block, we split it into two sub-sets A and B as shown below The difference value is defined as the arithmetic average of differences of pixel pairs, α n 1 α = ( a i b i ) n i= 1 It shows that most values of α are very close to zero. Following figure, Boat image, block size 12 by
16 Since the difference value α is based on the statistics of all pixels in the block, it has certain robustness against compression attacks. Hence the difference value α is used as a robust quantity to embed information bit. 31 Bit Embedding Strategy The main idea for bit embedding is that the difference value is kept within a specified threshold K and K (usually K is less than 5) to embed bit 0 and the difference value is shifted beyond the threshold K or K to embed bit 1. In order to avoid salt-and-pepper noise, modulo 256 addition technique is not used. In order to overcome over/underflow problem, we classify the blocks into four categories and use different bit embedding schemes for each category
17 Notes 1. Shift quantity β is usually twice the specified threshold K. 2. Shifting towards right side means adding a fixed shift β quantity to each pixel value marked by + of subset A, and vice versa for shifting towards left side. 3. Pixel values marked by - of subset B are kept intact. 33 Category 1: The pixel values of a block under consideration are far enough away from two bounds of histogram 0 β d β 255 l d r 34 17
18 Case 1. The difference value α is located between the threshold K and -K. 1. If to be embedded bit is 1, we shift the difference valueα by a quantity β towards the right hand side or left hand side depending on if α is positive or negative. 2. If to be embedded bit is 0, the pixel value of that block is intact. or α -K value shifted towards left to embed 1 0 K Original α value α value shifted towards right to embed 1 Embedding a bit Case 2. The absolute value of α value exceeds the threshold K. In order to keep the lossless data hiding principle, no matter whether to be embedded bit is 0 or 1, it always embeds bit 1 by shifting the difference value α by a quantity β, thus further leaving away from the zero point. In this way, it introduces some error bits. -K 0 K or value shifted towards left to embed 1 Original value Original value value shifted towards right to embed
19 Category 2: The pixel values of the block under consideration are close to the low bound of the histogram β β 37 Case 1. The difference value α is located between the threshold K and -K. 1. If to be embedded bit is 1, we always shift the difference value by a quantity β towards the right-hand side beyond the threshold K. 2. If to be embedded bit is 0, the pixel value of that block is intact. -K Original value 0 K value shifted towards right to embed
20 Case 2. The value α is located on the right-hand side beyond threshold K. No matter whether to be embedded bit is 0 or 1, it always embeds bit 1 by shifting the difference value by a quantity further leaving away from the zero point, as shown in the following figure. In this way, it introduces some error bits, which will be corrected by using ECC. -K 0 K Original value value shifted towards right to embed 1 39 Case 3. The value α is located on the left-hand side beyond threshold -K. No matter whether to be embedded bit is 0 or 1, neither bit 0 nor bit 1 is embedded in this block, which means this block is skipped in data embedding. The coordinates of this block are recorded as side information. Original value -K 0 K neither bit 0 nor bit 1 is embedded
21 Category 3: The pixel values of the block under consideration are on the upper bound of the histogram β β Category 3 is similar to category 2 except the block is close to the upper bound instead of the low bound of the histogram. Hence data embedding algorithm of Category 3 is similar to that of Category 2 except shifting difference value α by a quantity β to the left-hand side instead of to the right-hand 41 side. Category 4: Some pixel values of the block under consideration are on the upper bounds, while some pixel values are on the low bounds of the histogram 0 β 255-β
22 Case 1. The difference value α is located between the threshold K and -K. No matter whether to be embedded bit is 0 or 1, it always embeds bit 0 by keeping the difference value intact. In this way, it introduces some error bits. -K Original value 0 K 43 Case 2. The absolute value α is beyond the threshold K. No matter whether to be embedded bit is 0 or 1, neither bit 0 nor bit 1 is embedded in this block, which means this block is skipped in data embedding. The coordinates of this block are recorded as side information. -K Original value 0 K Original value 44 22
23 The above-mentioned four categories cover all situations that a block may encounter in data embedding. The detailed description of the bit embedding method clearly shows that the modified pixel value is still in the range of [0, 255] and hence no over/underflow will take place. The following table provides statistics, which indicates that the situation in which error bits may be produced or book-keeping data is needed is rather rare. 45 Table 3. Category and case occurrence of some test images. Category 1 Category 2 Category 3 Category 4 Case 1 Case 2 Case 1 Case 2 Case 3 Case 1 Case 2 Case 3 Case 1 Case 2 Lena Baboon Boat Mpic Mpic Mpic Mpic Mpic Mpic Mpic Mpic N1A N2A N3A N4A N5A N6A N7A N8A
24 Error Correction Code (ECC) As mentioned above, in the bit embedding process, it may introduce a few error bits. Error correction code (ECC) is utilized to correct these errors. In this technique, BCH (15,11,1), BCH (15,7,2), BCH (15,5,3), BCH (31,6,7) and BCH (63,7,15) are used for different situations. 47 Chaotic Mixing In some special images, error bits are concentrated in some small areas of the image, which leads to many error bits in one codeword, thus causing error in data extraction. To combat this type of burst errors, chaotic mixing technique is utilized. Algorithm: 2 1 r = A r, where A =
25 Chaotic mixing of Baboon image by A n, a) original image, b) n=1, c) n=5, d) n=10, where n is chaotic mixing number 49 Data Embedding Block Diagram Original image Block split Bit embedding Marked image Watermark signal Error correction coding Chaotic mixing Side information 50 25
26 Bit Extraction Strategy Data extraction is actually the reverse process of data embedding. 1. If the absolute difference value α is beyond the threshold K, then bit 1 is extracted and the difference value is shifted back towards the zero point by adding or subtracting a quantity β. In this way, the difference value is back to its original value, which means each pixel value of subset A is back to its original value. value of marked block -K Original position 0 K Original position value of marked block If the absolute value of the difference value α is within the threshold K, then bit 0 is extracted and nothing to do on the pixel value of that block. 3. After data extraction, inverse chaotic mixing and ECC decoding are applied, respectively, to obtain the correct originally embedded bit sequence. Marked image Bit Extraction Inverse chaotic mixing Decoding Extracted mark Side information Reconstructed image 52 26
27 Experimental Results This novel algorithm has been applied to commonly used grayscales images such as Lena, Baboon, etc. eight medical images more than 1000 images in the CoralDraw database eight JPEG2000 color test images. It has demonstrated that our algorithm can be applied to all of these test images successfully. 53 Medical image (a) original (b) marked 54 27
28 Medical image (a) original (b) Marked marked image 55 Medical image (a) original (b) Marked markedimage 56 28
29 Medical image (a) original (b) marked 57 Medical image (a) original (b) marked 58 29
30 Medical image (a) original (b) marked 59 JPEG2000 test image (a) original (b) marked 60 30
31 JPEG2000 test image (a) original (b) marked 61 Lena (a) original (b) marked 62 31
32 Baboon (a) original (b) marked 63 CoralDraw image (a) original (b) marked 64 32
33 Test results for more than 1000 images in CorelDraw database Images ( ) PSNR of marked image (db) Data embedding capacity (bits) Robustness (bpp) Max Min Avg. 714 Max Min Avg Test results for eight medical images. Images (512x512) PSNR of marked image (db) Data embedding capacity (bits) Robustness (bpp) Mpic Mpic Mpic Mpic Mpic Mpic Mpic Mpic
34 Test results for eight JPEG2000 test images. Images (1536x1920) PSNR of marked image (db) Data embedding capacity (bits) Robustness (bpp) N1A N2A N3A N4A N5A N6A N7A N8A Conclusion The developed new robust lossless image data hiding technique has the following advantages. 1. No annoying salt-and-pepper noise at all; 2. Applicable to virtually all images (including commonly used images, medical images, more than 1000 images in CorelDRAW database, and JPEG2000 test images); 3. Average PSNR of marked images is above 39 db; 4. Robust to JPEG/JPEG2000 compression to a certain extent; 5. Data embedding capacity ranges from 512 bits to 1024 bits (often sufficient for authentication purpose), and the embedding capacity can be adjusted according to the requirement
35 Application Scenarios Authentication Medical data system On-line identity verification Others 69 Application 1: Authentication of JPEG2000 images Traditional authentication schemes fail in some JPEG2000 application scenarios, say, compression with different implementations, different transcoding schemes, multiple compression cycles may introduce incidental alterations. Authentication framework for JPEG2000 images is needed For both Integrity and Non-repudiation purposes It should include the security solutions for JPEG2000 at the content level which achieves both security and robustness
36 Pixel difference between original and decoded image 71 A Unified Authentication Framework for JPEG2000 Image Having cryptographic strength Features signature is embedded into images Fragile and semi-fragile authentication Lossy and lossless compression, hence Lossy module for Semi-fragile authentication Lossless module for Semi-fragile authentication Has been included into JPEG2000 Security Part, JPSEC
37 System overview of the unified authentication system 73 Application 2: Secure Medical Data System Relevant/Associate information can be hidden inside Medical Data (record/document, etc.). Who s who will not be missed up: Easy handling. Sensitive information will not be compromised even after the hidden data have been extracted if encryption is used properly. Vertically, multi-level security. Horizontally, one doctor/insurance person cannot access others data. Can be used for other applications as well. UMDNJ, PACS, authentication 74 37
38 Application 3: On-line Identity Verification A paper to be published in IWDW04 Sender s fingerprint image Features of fingerprint and sender information are reversibly embedded into the fingerprint image. Verification is conducted at the receiver side with accessing central database. 75 Summary (Robust) reversible data hiding has opened a new door of data hiding: Methodology Linking original media with headers 76 38
39 Acknowledgement New Jersey Commission of Science and Technology via NJWINS Digital Data Embedding Technologies group of the Air Force Research Laboratory, Rome Research Site, Information Directorate, Rome NY, under contract F References 1. C. De Vleeschouwer, J. F. Delaigle, and B. Macq, Circular interpretation on histogram for reversible watermarking, IEEE International Multimedia Signal Processing Workshop, France, pp , October Z. Ni, Y. Q. Shi, N. Ansari, W. Su, Q. Sun and X. Lin, Robust lossless data hiding, IEEE International Conference on Multimedia and Expo (ICME04), Taipei, Taiwan, June Z. Ni, Y. Q. Shi, N. Ansari, W. Su, Q. Sun and X. Lin, Robust lossless image data hiding designed for semi-fragile image authentication, IEEE Transactions on Circuits and Systems for Video Technology, vol.18, no. 4, pp , April Z. Zhang, Q. Sun, X. Lin, Y. Q. Shi and Z. Ni, A unified authentication framework for JPEG2000 images, IEEE International Conference and Expo (ICME04), Taipei, Taiwan, June A joint proposal by Institute of Infocomm Research, Singapore and NJIT, entitled A Unified Authentication System for JPEG2000 Images, has been included into the Secure JPEG2000 (JPSEC), an ISO Standard in Apr/2007. The JPSEC (ISO/IEC :2007) specifies the framework, concepts, and methodology for securing JPEG2000 codestreams
ROBUST LOSSLESS IMAGE DATA HIDING
AFRL-IF-RS-TR-2005-209 Final Technical Report May 2005 ROBUST LOSSLESS IMAGE DATA HIDING New Jersey Institute of Technology APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AIR FORCE RESEARCH LABORATORY
More informationReversible Data Hiding
Reversible Data Hiding Zhicheng Ni, Yun Q. Shi, Nirwan Ansari and Wei Su Department of Electrical and Computer Engineering New Jersey Institute of Technology, Newark, NJ 07102, U.S.A. {zn2,shi}@njit.edu
More informationMultilayer Data Embedding Using Reduced Difference Expansion
Multilayer Data Embedding Using Reduced Difference Expansion DINESH SATRE 1, DEVYANI BONDE 2, SUBHASH RATHOD 3 Department Of Computer Engineering Marathwada Mitra Mandal s Institute of Technology Savitribai
More informationCHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM
74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small
More informationAN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION
AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION Shaik Shaheena 1, B. L. Sirisha 2 VR Siddhartha Engineering College, Vijayawada, Krishna, Andhra Pradesh(520007),
More informationA Reversible Data Hiding Scheme for BTC- Compressed Images
IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game
More informationA BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu
International Journal of Innovative Computing, Information and Control ICIC International c 2016 ISSN 1349-4198 Volume 12, Number 2, April 2016 pp. 395 405 A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD
More informationResearch Article Robust and Reversible Audio Watermarking by Modifying Statistical Features in Time Domain
Hindawi Advances in Multimedia Volume 217, Article ID 8492672, 1 pages https://doi.org/1.1155/217/8492672 Research Article Robust and Reversible Audio Watermarking by Modifying Statistical Features in
More informationCOPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *
COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE * Pei-Pei Chen ( 陳佩貝 ) 1 and Wen-Hsiang Tsai ( 蔡文祥 ) 1, 2 1 Dept. of Computer Science, National Chiao Tung University,
More informationAn Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility
An Information Hiding Scheme Based on Pixel- Value-Ordering Prediction-Error Expansion with Reversibility Ching-Chiuan Lin Department of Information Management Overseas Chinese University Taichung, Taiwan
More informationReversible Image Data Hiding with Local Adaptive Contrast Enhancement
Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu and Xiaocheng Hu Abstract Recently, a novel reversible data hiding scheme is proposed
More informationHighly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting
More informationA reversible data hiding based on adaptive prediction technique and histogram shifting
A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn
More informationPattern Recognition 41 (2008) Contents lists available at ScienceDirect. Pattern Recognition
Pattern Recognition 4 (8) 58 -- 59 Contents lists available at ScienceDirect Pattern Recognition journal homepage: www.elsevier.com/locate/pr Multilevel reversible data hiding based on histogram modification
More informationA Framework to Reversible Data Hiding Using Histogram-Modification
A Framework to Reversible Data Hiding Using Histogram-Modification R. Neeraja 1 PG Student, ECE Department Gokula Krishna College of Engineering Sullurpet, India e-mail:r.p.neeru@gmail.com M. Gnana Priya
More informationNon-fragile High quality Reversible Watermarking for Compressed PNG image format using Haar Wavelet Transforms and Constraint Difference Expansions
Non-fragile High quality Reversible Watermarking for Compressed PNG image format using Haar Wavelet Transforms and Constraint Difference Expansions Junkyu Park Department of Cyber Security, Sangmyung University,
More informationUser-Friendly Sharing System using Polynomials with Different Primes in Two Images
User-Friendly Sharing System using Polynomials with Different Primes in Two Images Hung P. Vo Department of Engineering and Technology, Tra Vinh University, No. 16 National Road 53, Tra Vinh City, Tra
More informationRandom Traversing Based Reversible Data Hiding Technique Using PE and LSB
Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Rhythm Katira #1, Prof. V. Thanikaiselvan *2 # ECE Department, VIT University Vellore, Tamil-Nadu, India 1 rhythm.katira2009@vit.ac.in
More informationCOPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *
COPYIGHT POTECTION OF PALETTE IMAGES BY A OBUST LOSSLESS VISIBLE WATEMAKING TECHNIQUE * Pei-Pei Chen ( 陳佩貝 ) and Wen-Hsiang Tsai ( 蔡文祥 ), Dept of Computer Science, National Chiao Tung University, Hsinchu,
More informationData Hiding in Video
Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract
More informationA Robust Image Watermarking Scheme using Image Moment Normalization
A Robust Image ing Scheme using Image Moment Normalization Latha Parameswaran, and K. Anbumani Abstract Multimedia security is an incredibly significant area of concern. A number of papers on robust digital
More informationError-free Authentication Watermarking Based on Prediction-Error-Expansion Reversible Technique
ISSC 2013, LYIT Letterkenny, June 20 21 Error-free Authentication Watermarking Based on Prediction-Error-Expansion Reversible Technique Rongrong Ni,H.D.Cheng, Yao Zhao andyuhou Institute of Information
More informationImage Authentication and Recovery Scheme Based on Watermarking Technique
Image Authentication and Recovery Scheme Based on Watermarking Technique KENJI SUMITOMO 1, MARIKO NAKANO 2, HECTOR PEREZ 2 1 Faculty of Information and Computer Engineering The University of Electro-Communications
More informationCombined Hashing/Watermarking Method for Image Authentication
Combined Hashing/Watermarking Method for Image Authentication Vlado Kitanovski, Dimitar Taskovski, and Sofija Bogdanova Abstract In this paper we present a combined hashing/watermarking method for image
More informationReversible Data Hiding VIA Optimal Code for Image
Vol. 3, Issue. 3, May - June 2013 pp-1661-1665 ISSN: 2249-6645 Reversible Data Hiding VIA Optimal Code for Image Senthil Rani D. #, Gnana Kumari R. * # PG-Scholar, M.E-CSE, Coimbatore Institute of Engineering
More informationREVERSIBLE DATA HIDING SCHEME BASED ON PREDICTION ERROR SORTING AND DOUBLE PREDICTION.
REVERSIBLE DATA HIDING SCHEME BASED ON PREDICTION ERROR SORTING AND DOUBLE PREDICTION Ling-ling WAN 1,Fan CHEN 1, Hong-jie HE 1,Lei ZHANG 2 1 the School of Information Science and Technology, Southwest
More informationHISTOGRAM BASED WATERMARKING USING ENTROPY TECHNIQUE IN DIGITAL IMAGES
HISTOGRAM BASED WATERMARKING USING ENTROPY TECHNIQUE IN DIGITAL IMAGES Shivani Kashyap #1, Mandeep Singh Saini #2 Student of Master in Technology, Dept. of Electronics and communication Engineering L.P.U,
More informationCHAPTER-5 WATERMARKING OF COLOR IMAGES
CHAPTER-5 WATERMARKING OF COLOR IMAGES 5.1 INTRODUCTION After satisfactorily developing the watermarking schemes for gray level images, we focused on developing the watermarking schemes for the color images.
More informationInterleaving Max-Min Difference Histogram Shifting Data Hiding Method
JOURNAL OF SOFTWARE, VOL. 5, NO. 6, JUNE 2010 615 Interleaving Max-Min Difference Histogram Shifting Data Hiding Method Hsien-Wei Yang Overseas Chinese University/Department of Information Management,
More informationCHAPTER-4 WATERMARKING OF GRAY IMAGES
CHAPTER-4 WATERMARKING OF GRAY IMAGES 4.1 INTRODUCTION Like most DCT based watermarking schemes, Middle-Band Coefficient Exchange scheme has proven its robustness against those attacks, which anyhow, do
More informationA New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique
A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique 1 Arathi Chitla, 2 Dr. M. Chandra Mohan 1 Associate Professor, Department of Computer Science &
More informationData hiding technique in JPEG compressed domain
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/253537666 Data hiding technique in JPEG compressed domain Article in Proceedings of SPIE -
More informationReversible Data Hiding Based on Median Difference Histogram
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 27, 577-593 (2011) Reversible Data Hiding Based on Median Difference Histogram HSIEN-WEI YANG 1,2, I-EN LIAO * AND CHAUR-CHIN CHEN + 1 Department of Information
More informationRegion Based Even Odd Watermarking Method With Fuzzy Wavelet
Region Based Even Odd Watermarking Method With Fuzzy Wavelet S.Maruthuperumal 1, G.Rosline Nesakumari 1, Dr.V.Vijayakumar 2 1 Research Scholar, Dr.MGR University Chennai. Associate Professor, GIET Rajahmundry,
More informationRobust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 971-976 Research India Publications http://www.ripublication.com/aeee.htm Robust Image Watermarking based
More informationA Digital Video Watermarking Algorithm Based on LSB and DCT
A Digital Video Watermarking Algorithm Based on LSB and DCT Kirti Jain, U.S.N Raju Department of Computer Science and Engineering NIT Warangal India kirtijain.kj@gmail.com,usnraju@gmail.com ABSTRACT: In
More informationImage Content Authentication based on Wavelet Edge Features
Image Content Authentication based on Wavelet Edge Features L. Sumalatha Associate Professor Dept.of CSE University College of Engg.,JNTUK,Kakinada V. Venkata Krishna Phd,Professor & Principal Dept.of
More informationLiterature Survey on Performance of Reversible Data Hiding Algorithm
Literature Survey on Performance of Reversible Data Hiding Algorithm Sona Ignacious PG Scholar Department of ECE, PET Engineering College, India Abstract-DATA hiding technique aims to embed some secret
More informationPart II Authentication Techniques
Part II Authentication Techniques Authentication Codes Provides means for ensuring integrity of message Independent of secrecy - in fact sometimes secrecy may be undesirable! Techniques for Authentication
More informationReversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting
Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting Hêmin Golpîra 1, Habibollah Danyali 1, 2 1- Department of Electrical Engineering, University of Kurdistan, Sanandaj,
More informationA SEMI-FRAGILE WATERMARKING SCHEME FOR IMAGE TAMPER LOCALIZATION AND RECOVERY
Journal of Theoretical Applied nformation Technology 31 August 2012 Vol 42 No2 2005-2012 JATT & LLS All rights reserved SSN: 1992-8645 wwwjatitorg E-SSN: 1817-3195 A SEM-FRAGLE WATERMARNG SCHEME FOR MAGE
More informationDIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS
DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS Murat Furat Mustafa Oral e-mail: mfurat@cu.edu.tr e-mail: moral@mku.edu.tr Cukurova University, Faculty of Engineering,
More informationI. Introduction. II Integer-To-Integer Wavelet Transforms
Reversible Image Data Hiding Using Lifting Wavelet Transform and Histogram Shifting S. Kurshid Jinna Dr. L. Ganesan Professor, Dept of Computer Science & Engineering Professor, Dept of Computer Science
More informationImprovements on Image Authentication and Recovery Using Distributed Source Coding
Improvements on Image Authentication and Recovery Using Distributed Source Coding Nitin Khanna a, Antoni Roca b, George T. C. Chiu c, Jan P. Allebach a, Edward J. Delp a a School of Electrical and Computer
More informationReversible Watermarking Technique using Histogram Shifting Modulations
Reversible Watermarking Technique using Histogram Shifting Modulations Archana Jadhav, M. Omkar Sharma Abstract This paper proposes creating new reversible marking technique. This originally based on indentifying
More informationImage Error Concealment Based on Watermarking
Image Error Concealment Based on Watermarking Shinfeng D. Lin, Shih-Chieh Shie and Jie-Wei Chen Department of Computer Science and Information Engineering,National Dong Hwa Universuty, Hualien, Taiwan,
More informationA Revisit to LSB Substitution Based Data Hiding for Embedding More Information
A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia
More informationA NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME
VOL 13, NO 13, JULY 2018 ISSN 1819-6608 2006-2018 Asian Research Publishing Network (ARPN) All rights reserved wwwarpnjournalscom A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME Javvaji V K Ratnam
More informationAN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS
AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan
More informationNo Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing
No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing Arash Ashtari Nakhaie, Shahriar Baradaran Shokouhi Iran University of Science
More informationA Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme
A Robust Color Image Watermarking Using Maximum Wavelet-Tree ifference Scheme Chung-Yen Su 1 and Yen-Lin Chen 1 1 epartment of Applied Electronics Technology, National Taiwan Normal University, Taipei,
More informationImproved Qualitative Color Image Steganography Based on DWT
Improved Qualitative Color Image Steganography Based on DWT 1 Naresh Goud M, II Arjun Nelikanti I, II M. Tech student I, II Dept. of CSE, I, II Vardhaman College of Eng. Hyderabad, India Muni Sekhar V
More informationResearch Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography
Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing
More informationMultimedia Systems Image III (Image Compression, JPEG) Mahdi Amiri April 2011 Sharif University of Technology
Course Presentation Multimedia Systems Image III (Image Compression, JPEG) Mahdi Amiri April 2011 Sharif University of Technology Image Compression Basics Large amount of data in digital images File size
More informationA ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION
A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION John N. Ellinas Department of Electronic Computer Systems,Technological Education Institute of Piraeus, 12244 Egaleo,
More informationCHAPTER-6 WATERMARKING OF JPEG IMAGES
CHAPTER-6 WATERMARKING OF JPEG IMAGES 6.1 INTRODUCTION In the Chapter 4, we have discussed that we can improve the robustness of DCT and DWT based watermarking schemes against some well known attacks by
More informationA Reversible Data Hiding Scheme For JPEG Images
A Reversible Data Hiding Scheme For JPEG Images Qiming Li, Yongdong Wu, and Feng Bao Institute for Infocomm Research, A*Star, Singapore {qli,wydong,baofeng}@i2r.a-star.edu.sg Abstract. When JPEG images
More informationMRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ)
5 MRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ) Contents 5.1 Introduction.128 5.2 Vector Quantization in MRT Domain Using Isometric Transformations and Scaling.130 5.2.1
More informationCOMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING
International Journal of Computer Engineering and Applications, Volume X, Issue VII, July 16 www.ijcea.com ISSN 2321-3469 COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING Geeta
More informationDigital Image Steganography Using Bit Flipping
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using
More informationCHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction
CHAPTER 6 LSB based data hiding with double Encryption 6.1 Introduction In image steganography, the amount of secret data that can be embedded depends on the method and the cover-image as capacity limitation
More informationReversible Watermarking in JPEG Images Based on Modified RZL Codes and Histogram Shift
203, Vol.8 No.2, 26-32 Article ID 007-202(203)02-026-07 DOI 0.007/s859-03-0904- Reversible Watermarking in JPEG Images Based on Modified RZL Codes and Histogram Shift CHEN Biao, ZHANG Weiming,2, YU Nenghai.
More informationA Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform
A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform Rafiullah Chamlawi, Asifullah Khan, Adnan Idris, and Zahid Munir Abstract Authentication of
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More informationComparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014
Comparison of Digital Image Watermarking Algorithms Xu Zhou Colorado School of Mines December 1, 2014 Outlier Introduction Background on digital image watermarking Comparison of several algorithms Experimental
More informationAbstract. Keywords: Semi-fragile watermarking, DCT embedding, Localisation, Restoration
Abstract This report introduces two semi-fragile watermarking algorithms in details, including how they are deigned and implemented using Matlab. The first algorithm relies on embedding the watermark,
More informationDIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS
DICTA22: Digital Image Computing Techniques and Applications, 2 22 January 22, Melbourne, Australia. DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS *Yuk Ying CHUNG, Man To WONG *Basser Department of Computer
More informationA Robust Watermarking Algorithm For JPEG Images
nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 7) A Robust Watermarking Algorithm For JPEG Images Baosheng Sun, Daofu Gong*, Fenlin Liu *Foundation
More informationMultipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning
Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning C. SANTIAGO-AVILA, M. GONZALEZ LEE, M. NAKANO-MIYATAKE, H. PEREZ-MEANA Sección de Posgrado e Investigación, Esime Culhuacan Instituto
More informationHigh Capacity Data Hiding Scheme for DCT-based Images
Journal of Information Hiding and Multimedia Signal Processing c 010 ISSN 073-41 Ubiquitous International Volume 1, Number 3, July 010 High Capacity Data Hiding Scheme for DCT-based Images Chia-Chen Lin
More informationSpatial Domain Digital Watermarking of Multimedia Objects for Buyer Authentication. By:
Spatial Domain Digital Watermarking of Multimedia Objects for Buyer Authentication By: Ravi Andem Todd Yarrington (randem@mix.wvu.edu) (tyarring@mix.wvu.edu) Motivation Encryption of valuable images Keep
More informationA Crypto Signature Scheme for Image Authentication over Wireless Channel
International Journal of Image and Graphics c World Scientific Publishing Company A Crypto Signature Scheme for Image Authentication over Wireless Channel QIBIN SUN; SHUIMING YE Institute for Infocomm
More informationSteganography using Odd-even Based Embedding and Compensation Procedure to Restore Histogram
, October 24-26, 2012, San Francisco, USA Steganography using Odd-even Based Embedding and Compensation Procedure to Restore Histogram Neeta Nain, Jaideep Singh, Ishan Dayma, Rajesh Meena The authors are
More informationA Survey of Fragile Watermarking-based Image Authentication Techniques
Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 6, November 2016 A Survey of Fragile Watermarking-based Image Authentication
More informationImproved Reversible Data Hiding in Encrypted Images Based on Reserving Room After Encryption and Pixel Prediction
Improved Reversible Data Hiding in Encrypted Images Based on Reserving Room After Encryption and Pixel Prediction Ioan Catalin Dragoi, Henri-George Coanda and Dinu Coltuc Electrical Engineering Dept. Valahia
More informationA NOVEL SECURE, IMPERCEPTIBLE AND ROBUST CDMA DIGITAL IMAGE WATERMARKING IN JPEG-YCBCR CHANNEL USING DWT2
International Journal of Enterprise Computing and Business Systems ISSN (Online : 2230-8849 http://www.ijecbs.com Vol. 1 Issue 2 July 2011 A NOVEL SECURE, IMPERCEPTIBLE AND ROBUST CDMA DIGITAL IMAGE WATERMARKING
More informationAn Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a
International Symposium on Mechanical Engineering and Material Science (ISMEMS 2016) An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a 1 School of Big Data and Computer Science,
More informationGenetic algorithm for optimal imperceptibility in image communication through noisy channel
Genetic algorithm for optimal imperceptibility in image communication through noisy channel SantiP.Maity 1, Malay K. Kundu 2 andprasantak.nandi 3 1 Bengal Engineering College (DU), P.O.-Botanic Garden,
More informationDOI: /jos Tel/Fax: by Journal of Software. All rights reserved. , )
ISSN 1000-9825, CODEN RUXUEW E-mail: jos@iscasaccn Journal of Software, Vol17, No2, February 2006, pp315 324 http://wwwjosorgcn DOI: 101360/jos170315 Tel/Fax: +86-10-62562563 2006 by Journal of Software
More informationA New Reversible Watermarking Method. Based on Histogram Shifting
Applied Mathematical Sciences, Vol. 11, 2017, no. 10, 445-460 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ams.2017.7116 A New Reversible Watermarking Method Based on Histogram Shifting Kim Sao
More informationMRT based Fixed Block size Transform Coding
3 MRT based Fixed Block size Transform Coding Contents 3.1 Transform Coding..64 3.1.1 Transform Selection...65 3.1.2 Sub-image size selection... 66 3.1.3 Bit Allocation.....67 3.2 Transform coding using
More informationA Grayscale Image Steganography Based upon Discrete Cosine Transformation
A Grayscale Image Steganography Based upon Discrete Cosine Transformation Chin-Chen Chang 1, Pei-Yu Lin, and Jun-Chou Chuang 3 1 Department of Information Engineering and Computer Science, Feng Chia University,
More informationData Hiding in Binary Text Documents 1. Q. Mei, E. K. Wong, and N. Memon
Data Hiding in Binary Text Documents 1 Q. Mei, E. K. Wong, and N. Memon Department of Computer and Information Science Polytechnic University 5 Metrotech Center, Brooklyn, NY 11201 ABSTRACT With the proliferation
More informationAuthentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
, 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
More informationAn Efficient Information Hiding Scheme with High Compression Rate
IJSTE - International Journal of Science Technology & Engineering Volume 3 Issue 04 October 2016 ISSN (online): 2349-784X An Efficient Information Hiding Scheme with High Compression Rate Sarita S. Kamble
More informationSteganography by using Logistic Map Function and Cellular Automata
Research Journal of Applied Sciences Engineering and Technology 4(3): 4991-4995 01 ISSN: 040-7467 Maxwell Scientific Organization 01 Submitted: February 0 01 Accepted: April 30 01 Published: December 01
More informationA Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression
A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression Hui Wang, Anthony TS Ho and Xi Zhao 24 th October 2011 Outline Background
More informationA NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD
A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute
More informationJPEG 2000 A versatile image coding system for multimedia applications
International Telecommunication Union JPEG 2000 A versatile image coding system for multimedia applications Touradj Ebrahimi EPFL Why another still image compression standard? Low bit-rate compression
More informationBit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationsensors ISSN
Sensors 2011, 11, 9717-9731; doi:10.3390/s111009717 OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Article Authenticity Preservation with Histogram-Based Reversible Data Hiding and Quadtree
More informationA Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain
A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain Chinmay Maiti a *, Bibhas Chandra Dhara b a Department of Computer Science & Engineering, College of Engineering & Management, Kolaghat,
More information2013, IJARCSSE All Rights Reserved Page 1637
Volume 3, Issue 6, June 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Reversible Data
More informationA Novel Reversible Data Hiding Technique Based on Pixel Prediction and Histogram Shifting
Research Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet A Novel
More informationImage and Video Watermarking
Telecommunications Seminar WS 1998 Data Hiding, Digital Watermarking and Secure Communications Image and Video Watermarking Herbert Buchner University of Erlangen-Nuremberg 16.12.1998 Outline 1. Introduction:
More informationSecured Double Layer Data Hiding Using Encryption and Decryption Techniques
Secured Double Layer Data Hiding Using Encryption and Decryption Techniques H.MaheshKumar M.Vignesh Abstract In this period of Internet every digitized object is transferable and exchangeable over internet
More informationVIDEO WATERMARKING ALGORITHM FOR CONTENT AUTHORISATION
Volume, Issue 3, March 2015 VIDEO WATERMARKING ALGORITHM FOR CONTENT AUTHORISATION V.Rajendhiran J.Elavanthan M.Vengadapathiraj R.Vinothkumar Dr.M.Saravanan Abstract:-In this paper proposed a novel video
More informationA NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES Mrs. R.J. Shelke, Dept of Electronics Engineering, Walchand Institute of Technology, Solapur 43002, India ABSTRACT Dr. Mrs. S.S. Apte,
More informationSECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION
SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION Chuhong Fei a, Raymond Kwong b, and Deepa Kundur c a A.U.G. Signals Ltd., 73 Richmond St. W, Toronto, ON M4H 4E8 Canada b University of Toronto,
More informationAn improved reversible image watermarking algorithm based on difference expansion
Research Article An improved reversible image watermarking algorithm based on difference expansion International Journal of Distributed Sensor Networks 2017, Vol. 13(1) Ó The Author(s) 2017 DOI: 10.1177/1550147716686577
More information