A Robust Information Hiding Scheme Using Third Decomposition Layer of Wavelet Against Universal Attacks

被引:0
|
作者
Elbasi, Ersin [1 ]
机构
[1] Amer Univ Middle East, Coll Engn & Technol, Kuwait, Kuwait
关键词
watermarking; discrete wavelet transformation; copyright protection; image processing; engineering; IMAGE;
D O I
10.1109/AIIOT54504.2022.9817334
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Watermarking is one of the most common data hiding techniques for multimedia elements. Broadcasting, copy control, copyright protection and authentication are the most frequently used application areas of the watermarking. Secret data can be embedded into the cover image with changing the values of the pixels in spatial domain watermarking. In addition to this method, cover image can be converted into one of the transformation such as Discrete Wavelet Transformation (DWT), Discrete Cousin Transformation (DCT) and Discrete Fourier Transformation (DFT). Later on watermark can be embedded high frequencies of transformation coefficients. In this work, cover image transformed one, two and three level DWT decompositions. Binary watermark is hided into the low and high frequencies in each decomposition. Experimental results show that watermarked image is robust, secure and resist against several geometric attacks especially JPEG compression, Gaussian noise and histogram equalization. Peak Signal-to-Noise Ratio (PSNR) and Similarity Ratio (SR) values show very optimal results when we compare the other frequency and spatial domain algorithms.
引用
收藏
页码:611 / 616
页数:6
相关论文
共 50 条
  • [21] RoFL: A Robust Federated Learning Scheme Against Malicious Attacks
    Wei, Ming
    Liu, Xiaofan
    Ren, Wei
    [J]. WEB AND BIG DATA, PT III, APWEB-WAIM 2022, 2023, 13423 : 277 - 291
  • [22] Hiding digital information using a novel system scheme
    Yeh, WH
    Hwang, JJ
    [J]. COMPUTERS & SECURITY, 2001, 20 (06) : 533 - 538
  • [23] Adaptive data hiding using wavelet domain singular value decomposition
    Bao, P
    Ma, X
    [J]. DIGITAL MEDIA: PROCESSING MULTIMEDIA INTERACTIVE SERVICES, 2003, : 236 - 241
  • [24] A robust type-III data hiding technique against cropping & resizing attacks
    Sencar, HT
    Ramkumar, M
    Akansu, AN
    [J]. 2002 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL II, PROCEEDINGS, 2002, : 444 - 447
  • [25] Robust biometric scheme against replay attacks using one-time biometric templates
    Gernot, Tanguy
    Rosenberger, Christophe
    [J]. COMPUTERS & SECURITY, 2024, 137
  • [26] Robust image watermarking scheme against geometric attacks using a computer-generated hologram
    Li, Jianzhong
    [J]. APPLIED OPTICS, 2010, 49 (32) : 6302 - 6312
  • [27] IRIS: A robust information system against insider DoS attacks
    Eikel, M.
    Scheideler, C.
    [J]. ACM Transactions on Parallel Computing, 2015, 2 (03)
  • [28] Image Registration Using a New scheme of Wavelet Decomposition
    Shi Hongli
    Hu Bo
    [J]. 2008 IEEE INSTRUMENTATION AND MEASUREMENT TECHNOLOGY CONFERENCE, VOLS 1-5, 2008, : 235 - 239
  • [29] A robust image watermarking scheme to geometrical attacks for embedment of multibit information
    Lee, JS
    Kim, WY
    [J]. ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2004, PT 3, PROCEEDINGS, 2004, 3333 : 348 - 355
  • [30] Robust wavelet-based blind image watermarking against geometrical attacks
    Xie, G
    Shen, H
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXP (ICME), VOLS 1-3, 2004, : 2051 - 2054