A New Algorithm for Enhanced Robustness of Copyright Mark
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32804
A New Algorithm for Enhanced Robustness of Copyright Mark

Authors: Harsh Vikram Singh, S. P. Singh, Anand Mohan

Abstract:

This paper discusses a new heavy tailed distribution based data hiding into discrete cosine transform (DCT) coefficients of image, which provides statistical security as well as robustness against steganalysis attacks. Unlike other data hiding algorithms, the proposed technique does not introduce much effect in the stegoimage-s DCT coefficient probability plots, thus making the presence of hidden data statistically undetectable. In addition the proposed method does not compromise on hiding capacity. When compared to the generic block DCT based data-hiding scheme, our method found more robust against a variety of image manipulating attacks such as filtering, blurring, JPEG compression etc.

Keywords: Information Security, Robust Steganography, Steganalysis, Pareto Probability Distribution function.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1085429

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1755

References:


[1] Petitcolas F. A. P., Anderson R. J. and Kuhn M. G., "Information hiding - A survey", Proceedings of the IEEE, pp. 1062-1078, vol. 87, no. 7, July 1999.
[2] Anderson R., "Information hiding", Lecture Notes in Computer Science, vol. 1174, Springer -Verlag, 1996.
[3] Hopper N. J., Langford J., and Ahn L., "Provably secure steganography," Advances in Cryptology: CRYPTO 2002, August, 2002.
[4] Maity, S.P., and Kundu, M.K., "An image watermarking scheme using HVS characteristics and spread transform," Proceedings of the 17th International Conference on Pattern Recognition, pp. 23-26, vol. 4, 2004.
[5] Delp, E.J., and Wolfgang, R.B., "A watermark for digital images," International Conference on Image Processing, pp. 219-222, 1996.
[6] Bruyndockx, J., Quisquater, J., and Macq, B., "Spatial method for copyright labeling," IEEE Workshop on Image Processing, pp. 456-459, 1995.
[7] Wolfgang, R.B., and Delp, E.J., "A watermarking technique for digital imagery: Further studies," International Conference on Imaging Science, pp. 279-287, 1997.
[8] Schyndel V.R.G., Tirkel A.Z., and Osborne C.F., "A digital watermark," IEEE International Conference on Image Processing, pp. 86-89, 1994.
[9] Westfeld A., and Pfitzmann A., "Attacks on steganographic systems," Lecture Notes in Computer Science, pp. 61-75, vol. 1768, Springer- Verlag, 2000.
[10] Ruanaidh J. J. K. 'O, Dowling W. J., and Boland F. M., "Phase watermarking of digital images," Proceeding. International Conference on Image Processing (ICIP), pp. 239-242, vol. 3, 1996.
[11] Koch E. and Zhao J., "Toward robust and hidden image copyright labeling," Proceedings Workshop Nonlinear Signal and Image Processing, Marmaros, Greece, June 1995.
[12] Hsieh M.S., Tseng D.C. and Huang Y.H., "Hiding digital watermarks using multiresolution wavelet transform," IEEE Transactions on Industrial Electronics, pp.875 - 882, vol. 48, Issue 5, 2001.
[13] Podilchuk C. and Zeng W., "Watermarking of the JPEG bitstream," in Proceedings of International Conference on Imaging Science, Systems, and Applications (CISST -97), pp. 253-260, Las Vegas, June 1997.
[14] Guan Y.L. and Jin J., "An objective comparison between spatial and DCT watermarking schemes for MPEG video," Proceedings International Conference on Information Technology: Coding and Computing, pp.207- 211, 2001.
[15] Tao B. and Dickinson B., "Adaptive watermarking in the DCT domain," Proceedings of International Conference Image Processing, Lausanne, Switzerland, Sept. 1996.
[16] Briassouli A and Tsakalides P, "Hidden Messages in heavy-tails: DCTdomain watermark detection using alpha-stable models," IEEE Transactions on Multimedia, pp. 700-716, vol. 7, August 2005
[17] Adler R., Feldman R., and Taqqu M. S., A Guide to Heavy Tails: Statistical Techniques and Applications. Boston, MA: Birkhauser, 1998.
[18] Podilchuk C. I., "Digital image watermarking using visual models," Proceedings of Electronic Imaging, vol. 3016, San Jose, CA, 1996.
[19] Podilchuk C. I. and Zeng W., "Perceptual watermarking of still images," Proceedings of Workshop Multimedia Signal Processing, Princeton, NJ, June 1997.
[20] Wang, H., and Wang, S., "Cyber warfare: steganography vs. steganalysis," Communications of the ACM, pp. 76-82, vol. 47, 2004.
[21] Fridrich, J., and Goljan, M., "Practical steganalysis of digital imagesstate of the art," In Proceedings of SPIE Photonics West, pp. 1-13, vol. 4675, 2002.
[22] Tescher A. G., "Transform image coding," Advances in Electronics and Electron Physics. Suppl. 12. New York: Academic, pp. 113-115, 1979.
[23] Reininger R. C. and. Gibson J. D, "Distributions of the two-dimensional DCT coefficients for images," IEEE Transactions on Communications, pp. 835-839, vol. -31, June 1983.
[24] Clarke R. J., Transform Coding of Images, New York: Academic, 1985.
[25] Tanabe N. and Farvardin N., "Subband image coding using entropy coded quantization over noisy channels," Computer Science Technical Report Series, University of Maryland, College Park, MD, 1989.
[26] Birney K. A. and. Fischer T. R, "On the modeling of DCT and subband image data for compression," IEEE Transaction on Image Processing, pp. 186-193, vol. 4, 1995.
[27] Hernandez J.R., Amado M., and Perez Gonzalez F., "DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure," IEEE Transaction on Image Processing, pp. 55- 68, vol. 9, 2000.
[28] Achim A., Bezerianos A. and Tsakalides P., "Novel bayesian multiscale method for speckle removal in medical ultrasound images," IEEE Transaction on Medical Image, pp. 772-783, vol. 20, 2001.
[29] Georgiou P., Tsakalides P. and Kyriakakis C., "Alpha-stable modeling of noise and robust time-delay estimation in the presence of impulsive noise," IEEE Transaction on Multimedia, pp. 291-301, vol. 1, no. 3, 1999.
[30] Amin P.K., Liu N. and. Subbalakshmi K.P, "Statistically secure digital image data hiding," IEEE 7th Workshop on Multimedia Signal Processing, pp. 1- 4, 2005.
[31] Schwartz M., Information Transmission, Modulation, and Noise. McGRAW-HILL Book Company, 1985.
[32] Harmsen J.J., and Pearlman W.A. "Steganalysis of additive noise modelable information hiding." Proceedings of SPIE Electronic Imaging, Santa Clara, CA, vol. 5020, 2003.
[33] Gonzalez R.C. and Woods R.E., Digital Image Processing Using MATLAB. PEARSON EDUCATION, 2004.