Parallelism for the faster implementation of the K-L transform for image compression
Pattern Recognition Letters
IBM Systems Journal
Digital Image Processing
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Attacks on Steganographic Systems
IH '99 Proceedings of the Third International Workshop on Information Hiding
Adaptive Watermarking in the DCT Domain
ICASSP '97 Proceedings of the 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '97) -Volume 4 - Volume 4
An Objective Comparison between Spatial & DCT Watermarking Schemes for MPEG Video
ITCC '01 Proceedings of the International Conference on Information Technology: Coding and Computing
A robust digital audio watermarking based on statistics characteristics
Pattern Recognition
IEEE Transactions on Multimedia
Hidden messages in heavy-tails: DCT-domain watermark detection using alpha-stable models
IEEE Transactions on Multimedia
Genetic algorithm based methodology for breaking the steganalytic systems
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Generalized Entropy Power Inequalities and Monotonicity Properties of Information
IEEE Transactions on Information Theory
A region and data hiding based error concealment scheme for images
IEEE Transactions on Consumer Electronics
IEEE Transactions on Image Processing
On the modeling of DCT and subband image data for compression
IEEE Transactions on Image Processing
Hi-index | 0.00 |
For multimedia document, watermarking provides many advantages; however, its vulnerability due to attacks using signal processing methods offers challenge in designing robust techniques. This paper presents a novel method for enhancing robustness in copyright marking into mid-frequency discrete cosine transform (DCT) coefficients of an image. We establish that Weibull distribution suitably models mid-frequency coefficients well and use it for hiding copyright data. Our method is robust against JPEG compression attacks at both high and low compressions. Further, it is statistically undetectable in comparison to existing techniques of data hiding based on DCT coefficients. This is because it insignificantly affects the DCT coefficients of the stego image without compromising with data hiding capacity of the host image. Simulation result on Lena, Gibbon, Boat, and Peppers images illustrates that our algorithm offers lower bit error rate (BER) and higher peak signal to noise ratio (PSNR) leading to improved imperceptibility. Thus, it is useful in robust copyright marking.