A STUDY OF INFLUENCE BETWEEN DIGITAL WATERMARKING AND STEGANOGRAPHY

被引:0
|
作者
Zhou, Yafeng [1 ]
Ng, Wing W. Y. [1 ]
机构
[1] S China Univ Technol, Sch Comp Sci & Engn, Machine Learning & Cybernet Res Ctr, Guangzhou, Guangdong, Peoples R China
关键词
Digital watermarking; Steganography; Steganalysis; RBFNN; L-GEM;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Researches about steganography and watermark mostly focus on either field separately. However, their correlation is ignored while they apply highly similar techniques to hide information in images. Watermark is commonly added in some websites after an image is uploaded. In this work, we study the influence of steganalysis caused by watermarking. Several watermarking and steganography algorithms, both classical and recent, are implemented and tested using an L-GEM based RBFNN. Experimental results show a degradation of steganalysis when the watermarking and steganography use similar embedding techniques. Moreover, the steganalysis accuracies depend on the use of embedding techniques in training datasets. If training images do not have watermarks while testing images have, the detection rates decrease significantly. This creates a new and easy steganography method to avoid steganalysis.
引用
收藏
页码:49 / 55
页数:7
相关论文
共 50 条
  • [1] Evaluating Security of Executable Steganography for Digital Software Watermarking
    Mullins, J. Alex
    McDonald, J. Todd
    Mahoney, William R.
    Andel, Todd R.
    [J]. SOUTHEASTCON 2022, 2022, : 666 - 673
  • [2] A secure transaction model based on digital steganography and watermarking
    Yin, KK
    Pan, ZG
    Xiang, H
    Shi, JY
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN & COMPUTER GRAPHICS, 1999, : 1314 - 1318
  • [3] Data Hiding and Its Applications: Digital Watermarking and Steganography
    Megias, David
    Mazurczyk, Wojciech
    Kuribayashi, Minoru
    [J]. APPLIED SCIENCES-BASEL, 2021, 11 (22):
  • [4] Digital watermarking and steganography via overlays of halftone images
    Wu, CW
    Thompson, G
    Stanich, M
    [J]. MATHEMATICS OF DATA/IMAGE CODING, COMPRESSION, AND ENCRYPTION VII, WITH APPLICATIONS, 2004, 5561 : 152 - 163
  • [5] Digital Steganography and Watermarking for Digital Images: A Review of Current Research Directions
    Evsutin, Oleg
    Melman, Anna
    Meshcheryakov, Roman
    [J]. IEEE ACCESS, 2020, 8 : 166589 - 166611
  • [6] Secured and Authentic Communication by Combined Approach of Digital Watermarking and Steganography
    Sahu, Satya Prakash
    Verma, Satya
    [J]. COMPUTER NETWORKS AND INFORMATION TECHNOLOGIES, 2011, 142 : 595 - +
  • [7] Steganography and watermarking of digital images using singular value decomposition
    Pal, S. K.
    Saxena, P. K.
    Muttoo, S. K.
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2005, 8 (03): : 343 - 353
  • [8] FastStamp: Accelerating Neural Steganography and Digital Watermarking of Images on FPGAs
    Hussain, Shehzeen
    Sheybani, Nojan
    Neekhara, Paarth
    Zhang, Xinqiao
    Duarte, Javier
    Koushanfar, Farinaz
    [J]. 2022 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN, ICCAD, 2022,
  • [9] Data Hiding With Deep Learning: A Survey Unifying Digital Watermarking and Steganography
    Wang, Zihan
    Byrnes, Olivia
    Wang, Hu
    Sun, Ruoxi
    Ma, Congbo
    Chen, Huaming
    Wu, Qi
    Xue, Minhui
    [J]. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2023, 10 (06): : 2985 - 2999
  • [10] Performance Analysis of LSB, DCT, and DWT for Digital Watermarking Application using Steganography
    Chandran, Saravanan
    Bhattacharyya, Koushik
    [J]. 2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,