Study of High Performance Information Hiding Scheme Based on CL multi-wavelet and Annulus Sector Analysis

Shuai Ren; Tao Zhang
March 2012
International Journal of Digital Content Technology & its Applic;Mar2012, Vol. 6 Issue 4, p58
Academic Journal
Using first-order transformation of CL multi-wavelet, carrier image is decomposed into four components of lowest resolution sub-image. These four components are processed by ASA (Annulus Sector Analysis) to obtain embedding areas. Information hiding follows two rules: First, satisfies four components energy distributed feature of CL multi-wavelet first-order sub-images. That means embedding robust parameters in LL1, embedding the same pre-hiding information in LH1 and HL1, embedding fragile identifier in HH1. Second, use two or more annulus to embed data symmetrically. Moreover, using Chebyshev chaotic map and genetic algorithm to adjust sequence of embedded data and LSB is checked by other bit plane. Experimental results show that the invisibility of this scheme is of 8.75% average increase and excellent perception to distortion. Robustness is improved by 29.24% at least. This scheme has a good robustness against cutting, mean and medium filtering, especially can completely resist rotation.


Related Articles

  • Performance Comparison of Simple Orthogonal Transforms and Wavelet Transforms for Image Steganography. Kekre, H. B.; Patankar, Archana B.; Koshti, Dipali // International Journal of Computer Applications;Apr2012, Vol. 44, p21 

    There are three major requirements for effective steganography: High embedding capacity, imperceptibility and robustness. It is very difficult to maximally satisfy all these requirements simultaneously. Transform domain techniques for steganography have been proved more robust against various...

  • Control Parameter Settings in Differential Evolution for Global Optimization Problems. Feng-Tse Lin // International Journal of Intelligent Technologies & Applied Stat;2013, Vol. 6 Issue 1, p35 

    This paper is focused on the control parameter settings in Differential Evolution (DE) for global optimization problems. The issue of controlling values of parameters is one of the most important and promising areas of research in DE. The success of DE in solving global optimization problems...

  • Study of Reversible Information Hiding Scheme Based on GHM and ASA. Shuai REN; Tao ZHANG; Dejun MU // Applied Mathematics & Information Sciences;May2012, Vol. 6 Issue 2, p253 

    Information hiding based on digital images is still the mainstream now. In this paper, using first-order transformation of GHM multi-wavelet, carrier image is decomposed into four components of lowest resolution sub-image. These four components are processed by ASA (Annulus Sector Analysis) to...

  • Watermarking Algorithm for Resisting Cropping Attack Based on Haar Wavelet Transform. Xianquan Zhang; Shaomin Xie; Chunqiang Yu // Journal of Convergence Information Technology;Apr2012, Vol. 7 Issue 7, p174 

    The original watermarking is divided into four equal pieces after it is scrambled and encrypted. Then, we can get three new watermarking images through four pieces. The original watermarking and three new watermarking images are embedded into the four components of 2-level wavelet transform for...

  • Robust Non-Oblivious DWT-Adaptive Invisible Digital Watermarking. Prakash, K. Naga; Sindhuri, Gajula; Akshay, K.; Apuroop, G. // International Journal on Computer Science & Engineering;2011, Vol. 3 Issue 12, p3715 

    The main idea of this paper is embedding invisible watermark into an image. The advantage of this method over previous works is that it is easy to embed and robust to attacks. Non-oblivious detection technique is used. This is implemented using matlab and is verified for the robustness and...

  • Visible Watermarking for Digital Images in Wavelet Domain Using Centralized and Zernike Moments. Santhi, V.; Arulmozhivarman, P. // International Journal of Applied Engineering Research;2013, Vol. 8 Issue 19, p2559 

    In this paper, a novel, adaptive and robust visible watermarking for digital images is proposed. The watermark embedding procedure is carried out in wavelet domain. In order to calculate adaptive scaling factor, the centralized moments and Zernike moments are derived from the low frequency band...

  • Robust optimal extrapolation designs. DETTE, HOLGER; WONG, WENG KEE // Biometrika;1996, Vol. 83 Issue 3, p667 

    SUMMARY We study robustness properties of optimal extrapolation designs at a single point under various model assumptions. A curious result is the efficiency of the optimal extrapolation design for a polynomial of degree m is the same whether the true underlying model is a polynomial of degree k...

  • A Novel Gray Image Watermarking Scheme. Chen Yongqiang; Zhang Yanqing; Hu Hanping; Ling Hefei // Journal of Software (1796217X);May2011, Vol. 6 Issue 5, p849 

    An effective and integrated image watermarking scheme mainly includes watermark generation, watermark embedding, watermark identification, and watermark attack. In this paper, a novel discrete wavelet transform domain image watermark scheme is proposed to meet the watermarking properties:...

  • Intelligent Audio Watermarking using Genetic Algorithm in DWT Domain. Ketcham, M.; Vongpradhip, S. // International Journal of Intelligent Technology;2007, Vol. 2 Issue 2, p135 

    In this paper, an innovative watermarking scheme for audio signal based on genetic algorithms (GA) in the discrete wavelet transforms is proposed. It is robust against watermarking attacks, which are commonly employed in literature. In addition, the watermarked image quality is also considered....


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics