Adaptive image data hiding using transformation and error replacement

被引:0
|
作者
Naveed Ejaz
Jamil Anwar
M. Ishtiaq
Sung Wook Baik
机构
[1] Sejong University,College of Electronics and Information Engineering
[2] National University of Computer and Emerging Sciences,undefined
来源
关键词
Digital watermarking; Minimum error LSB replacement; Block based LSB watermarking; DCT based watermarking; Invisible watermarking; Genetic algorithm;
D O I
暂无
中图分类号
学科分类号
摘要
Watermarking is popular method for effective copyright protection of digital data. The invisible image watermarking is a type of watermarking which is used to conceal secret information in a cover image. In any watermarking system, there is a trade-off between imperceptibility and payload of the data to be hidden in the cover medium. Therefore, only a limited amount of data can be concealed in the cover image while watermark remain imperceptible. This paper proposes a new method of adaptive blind digital image data hiding in Discrete Cosine Transform (DCT) domain using Minimum Error Lease Significant Bit Replacement (MELSBR) method and Genetic Algorithm (GA). In the proposed method, the secret image is embedded into the DCT transformed cover image. Initially, the host and the secret image both are partitioned into equal sized blocks. Then for each secret image block, host image block is intelligently selected through GA and is embedded using MELSBR method. GA helps in identifying the target cover image blocks such that with the LSB embedding, both visual quality of the cover image and imperceptibility of the secret image remain least affected. In watermark extraction process, the watermarked image is decomposed into equal sized blocks and then using the Jigsaw Puzzle Solver (JPS) the secret image is reconstructed. In spite of doubling the payload of the data to hide, the experimental results have shown better imperceptibility and robustness results of the proposed method as compared to the current approaches in this domain.
引用
收藏
页码:825 / 840
页数:15
相关论文
共 50 条
  • [41] EAG: Edge Adaptive Grid Data Hiding for Binary Image Authentication
    Cao, Hong
    Kot, Alex C.
    2012 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2012,
  • [42] A Reversible Data Hiding Scheme in Encrypted Image with LSB Compression and MSB Replacement
    Zhang, Wei
    Zhou, Qing
    Tang, Zhenjun
    Yao, Heng
    Qin, Chuan
    SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 868 - 878
  • [43] Error concealment using a data hiding technique for MPEG video
    Kurosaki, M
    Kiya, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2002, E85A (04) : 790 - 796
  • [44] Reversible Data Hiding Using Prediction Error Values Embedding
    Hu, Yongjian
    Lee, Heung-Kyu
    Li, Jianwei
    Che, Kaiying
    DIGITAL WATERMARKING, PROCEEDINGS, 2008, 5041 : 244 - +
  • [45] Error control and concealment for video transmission using data hiding
    Carli, M
    Bailey, D
    Farias, M
    Mitra, SK
    5TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2002, : 812 - 815
  • [46] A reversible data hiding scheme using image interpolation
    Xiong, Xiang-Guang
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONIC INFORMATION ENGINEERING (CEIE 2016), 2016, 116 : 124 - 130
  • [47] Thermal Error Modelling of the Spindle Using Data Transformation and Adaptive Neurofuzzy Inference System
    Li, Yanlei
    Hu, Youmin
    Wu, Bo
    Fan, Jikai
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [48] Lossless Data Hiding Method Using Error Correction Code
    Nobeoka, Tsubasa
    Lanante, Leonardo, Jr.
    Kurosaki, Masayuki
    Ochi, Hiroshi
    2014 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS (APCCAS), 2014, : 539 - 542
  • [49] Combined concealment, synchronization, and error detection using data hiding
    Yilmaz, A
    Esen, E
    Alatan, AA
    Digital Media: Processing Multimedia Interactive Services, 2003, : 242 - 245
  • [50] Image Error Concealment and Quality Access Control Based on Data Hiding and Cryptography
    Phadikar, Amit
    Maity, Santi P.
    Delpha, Claude
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 583 - +