Reliable information bit hiding

被引:36
作者
Huang, JW [1 ]
Shi, YQ
机构
[1] Zhongshan Univ, Dept Elect, Guangzhou 510275, Peoples R China
[2] New Jersey Inst Technol, Dept ECE, Newark, NJ 07102 USA
基金
美国国家科学基金会;
关键词
BCH; channel coding; information hiding; matched filtering; soft-decision decoding; StirMark;
D O I
10.1109/TCSVT.2002.804897
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
One of challenges encountered in information bit hiding is the reliability of information bit detection. This paper addresses the issue and presents an algorithm in the discrete cosing transform (DCT) domain with a communication theory approach. It embeds information bits (first) in the DC and (then in the) low-frequency AC coefficients. To extract the hidden information bits from a possibly corrupted marked image with a low error probability, we model information hiding as a digital communication problem and apply Bose-Chaudhuri-Hoequenghen channel coding with soft-decision decoding based on matched filtering. The robustness of the hidden bits has been tested with StirMark. The experimental results demonstrate that the embedded information bits are perceptually transparent and can successfully resist common signal processing procedures, jitter attack, aspect ratio variation, scaling change, small angle rotation, small amount cropping, and JPEG compression with quality factor as low as 10. Compared with some information hiding algorithms reported in the literature, it appears that the hidden information bits with the proposed approach are relatively more robust. While the approach is presented for gray level images, it can also be applied to color images and video sequences.
引用
收藏
页码:916 / 920
页数:5
相关论文
共 22 条
  • [1] Abdulaziz NK, 2000, 2000 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY PROCEEDINGS, VOLS. I & II, P380, DOI 10.1109/ICCT.2000.889233
  • [2] [Anonymous], 1999, IMAGE VIDEO COMPRESS
  • [3] Techniques for data hiding
    Bender, W
    Gruhl, D
    Morimoto, N
    Lu, A
    [J]. IBM SYSTEMS JOURNAL, 1996, 35 (3-4) : 313 - 336
  • [4] Secure spread spectrum watermarking for multimedia
    Cox, IJ
    Kilian, J
    Leighton, FT
    Shamoon, T
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) : 1673 - 1687
  • [5] COX IJ, 1999, P IEEE, V87, P1062
  • [6] Watermarking algorithm based on a human visual model
    Delaigle, JF
    De Vleeschouwer, C
    Macq, B
    [J]. SIGNAL PROCESSING, 1998, 66 (03) : 319 - 335
  • [7] ELMASRY F, 2000, P IEEE INT C MULT EX
  • [8] Watermarking of uncompressed and compressed video
    Hartung, F
    Girod, B
    [J]. SIGNAL PROCESSING, 1998, 66 (03) : 283 - 301
  • [9] Performance analysis of a 2-D multipulse amplitude modulation scheme for data hiding and watermarking of still images
    Hernandez, JR
    Perez-Gonzalez, F
    Rodriguez, JM
    Nieto, G
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) : 510 - 524
  • [10] Power constrained multiple signaling in digital image watermarking
    Huang, J
    Elmasry, GF
    Shi, YQ
    [J]. 1998 IEEE SECOND WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 1998, : 388 - +