A Robust Information Hiding Scheme Using Third Decomposition Layer of Wavelet Against Universal Attacks

被引:0
|
作者
Elbasi, Ersin [1 ]
机构
[1] Amer Univ Middle East, Coll Engn & Technol, Kuwait, Kuwait
关键词
watermarking; discrete wavelet transformation; copyright protection; image processing; engineering; IMAGE;
D O I
10.1109/AIIOT54504.2022.9817334
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Watermarking is one of the most common data hiding techniques for multimedia elements. Broadcasting, copy control, copyright protection and authentication are the most frequently used application areas of the watermarking. Secret data can be embedded into the cover image with changing the values of the pixels in spatial domain watermarking. In addition to this method, cover image can be converted into one of the transformation such as Discrete Wavelet Transformation (DWT), Discrete Cousin Transformation (DCT) and Discrete Fourier Transformation (DFT). Later on watermark can be embedded high frequencies of transformation coefficients. In this work, cover image transformed one, two and three level DWT decompositions. Binary watermark is hided into the low and high frequencies in each decomposition. Experimental results show that watermarked image is robust, secure and resist against several geometric attacks especially JPEG compression, Gaussian noise and histogram equalization. Peak Signal-to-Noise Ratio (PSNR) and Similarity Ratio (SR) values show very optimal results when we compare the other frequency and spatial domain algorithms.
引用
收藏
页码:611 / 616
页数:6
相关论文
共 50 条
  • [1] Robust echo hiding scheme against pitch-scaling attacks
    Wu, Wen-Chih
    Chen, T. -C.
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-12, 2008, : 1737 - +
  • [2] A robust and blind watermarking scheme on wavelet domain against geometric attacks
    Lin Chongze
    Yuan Daohua
    Lu Caowei
    Li Bingfa
    Li Jingpeng
    [J]. WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING, VOL 1 AND 2, 2006, : 265 - +
  • [3] An Information Hiding Scheme in Wavelet Domain using Chaos Dynamics
    Mandal, J. K.
    Das, S.
    [J]. JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2018, 77 (05): : 264 - 267
  • [4] Secured and Robust Information Hiding Scheme
    Abdul-mahdi, N. H.
    Yahya, A.
    Ahmad, R. B.
    Al-Qershi, O. M.
    [J]. MALAYSIAN TECHNICAL UNIVERSITIES CONFERENCE ON ENGINEERING & TECHNOLOGY 2012 (MUCET 2012), 2013, 53 : 463 - 471
  • [5] A Robust Watermarking Scheme for Information Hiding
    Ramani, K.
    Prasad, E. V.
    Varadarajan, S.
    Subramanyam, A.
    [J]. ADCOM: 2008 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, 2008, : 58 - +
  • [6] A robust information hiding methodology in wavelet domain
    Yang, Ming
    Trifas, Monica
    Bourbakis, Nikolaos
    Cushing, Christopher
    [J]. PROCEEDINGS OF THE NINTH IASTED INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING, 2007, : 95 - +
  • [7] Mitigating DoS Attacks against SDN Controller Using Information Hiding
    Abdullaziz, Osamah Ibrahiem
    Wang, Li-Chun
    [J]. 2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019,
  • [8] A robust information hiding scheme for tampered cover images
    Shen, J. -J.
    Wang, C. -C.
    [J]. IMAGING SCIENCE JOURNAL, 2014, 62 (07): : 395 - 401
  • [9] Information Hiding Scheme Based on Replace Function and Wavelet Transform
    Lu, Tzu-Chuen
    Hsueh, Sue-Chen
    Tseng, Chun-Ya
    Chen, Pei-Lun
    [J]. INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 885 - 893
  • [10] Robust reversible data hiding scheme based on integer wavelet transform
    Yang, Ching-Yu
    [J]. ICIC Express Letters, 2011, 5 (11): : 4209 - 4214