Perceptual data hiding exploiting between-coefficient contrast masking

被引:1
|
作者
Marano, S. [1 ]
Battisti, F. [2 ]
Vaccari, A. [3 ]
Boato, G. [1 ]
Carli, M. [2 ]
机构
[1] Univ Trento, Dept Comp Sci & Informat Engn, Trento, Italy
[2] Univ Roma TRE, Dept Appl Elect, Rome, Italy
[3] Politecn Milan, Elect & Informat Dept, Milan, Italy
关键词
data hiding; watermarking; perceptual quality metrics;
D O I
10.1117/12.770070
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes a novel data hiding scheme in which a payload is embedded into the discrete cosine transform domain. The characteristics of the Human Visual System (HVS) with respect to image fruition have been exploited to adapt the strength of the embedded data and integrated in the design of a digital image watermarking system. By using an HVS-inspired image quality metric, we study the relation between the amount of data that can be embedded and the resulting perceived quality. This study allows one to increase the robustness of the watermarked image without damaging the perceived quality, or, as alternative, to reduce the impairments produced by the watermarking process given a fixed embedding strength. Experimental results show the effectiveness and the robustness of the proposed solution.
引用
下载
收藏
页数:10
相关论文
共 50 条
  • [21] Reversible Data Hiding Exploiting Variance in Wavelet Coefficients
    Luo, Xu-Ren
    Yin, Te-Lung
    JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 2011, 11 (01): : 27 - 33
  • [22] Two private, perceptual data-hiding games
    Goteti, AK
    Moulin, P
    2004 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL III, PROCEEDINGS: IMAGE AND MULTIDIMENSIONAL SIGNAL PROCESSING SPECIAL SESSIONS, 2004, : 373 - 376
  • [23] Improved Data Hiding Method by Exploiting Modification Direction
    Byun, Jin-Yong
    Jung, Kl-Hyun
    Yoo, Kee-Young
    INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 264 - +
  • [24] Masking based Data Hiding and Image Authentication Technique (MDHIAT)
    Ghoshal, Nabin
    Sarkar, A.
    Chakraborty, D.
    Ghosh, S.
    Mandal, J. K.
    ADCOM: 2008 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, 2008, : 119 - +
  • [25] Reversible Image Data Hiding with Contrast Enhancement
    Wu, Hao-Tian
    Dugelay, Jean-Luc
    Shi, Yun-Qing
    IEEE SIGNAL PROCESSING LETTERS, 2015, 22 (01) : 81 - 85
  • [26] A generalization of fully exploiting modification directions data hiding scheme
    Kuo, Wen-Chung
    Kao, Ming-Chih
    Chang, Chin-Chen
    Journal of Information Hiding and Multimedia Signal Processing, 2015, 6 (04): : 718 - 727
  • [27] Data hiding based on generalised exploiting modification direction method
    Kuo, W-C
    Wang, C-C
    IMAGING SCIENCE JOURNAL, 2013, 61 (06): : 484 - 490
  • [28] Reversible data hiding by coefficient-bias algorithm
    Yang, Ching-Yu
    Hu, Wu-Chih
    Lin, Chih-Hung
    Journal of Information Hiding and Multimedia Signal Processing, 2010, 1 (02): : 91 - 100
  • [29] Steganalysis of spread spectrum data hiding exploiting cover memory
    Sullivan, K
    Madhow, U
    Chandrasekaran, S
    Manjunath, BS
    SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VII, 2005, 5681 : 38 - 46
  • [30] Perceptual data hiding in Tree Structured Haar transform domain
    Cancellaro, M.
    Carli, M.
    Egiazarian, K.
    Astola, J.
    SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS IX, 2007, 6505