IEEE Transactions on Pattern Analysis and Machine Intelligence
Digital watermarking
Digital Image Processing
Digital Steganography: Hiding Data within Data
IEEE Internet Computing
Factors that Affect the Performance of the DCT-Block Based Image Watermarking Algorithms
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
A Comparative Study of Three Moment-Based Shape Descriptors
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume I - Volume 01
Image Watermarking Using Krawtchouk Moments
ICCTA '07 Proceedings of the International Conference on Computing: Theory and Applications
A Large Capacity Blind Information Hiding Algorithm
ISECS '08 Proceedings of the 2008 International Symposium on Electronic Commerce and Security
A local Tchebichef moments-based robust image watermarking
Signal Processing
Reversible data hiding based on histogram modification of pixel differences
IEEE Transactions on Circuits and Systems for Video Technology
Geometric distortion insensitive image watermarking in affine covariant regions
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Lossless Data Embedding With High Embedding Capacity Based on Declustering for VQ-Compressed Codes
IEEE Transactions on Information Forensics and Security - Part 1
Steganalysis using higher-order image statistics
IEEE Transactions on Information Forensics and Security
Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems
IEEE Transactions on Information Forensics and Security
Image analysis by Tchebichef moments
IEEE Transactions on Image Processing
Linear interpolation revitalized
IEEE Transactions on Image Processing
Robust image-adaptive data hiding using erasure and error correction
IEEE Transactions on Image Processing
Is image steganography natural?
IEEE Transactions on Image Processing
Reversible data embedding into images using wavelet techniques and sorting
IEEE Transactions on Image Processing
Invariant image watermark using Zernike moments
IEEE Transactions on Circuits and Systems for Video Technology
A Semi-Fragile Lossless Digital Watermarking Scheme Based on Integer Wavelet Transform
IEEE Transactions on Circuits and Systems for Video Technology
Reversible watermarking scheme for medical image based on differential evolution
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |
The growth of image processing tools and applications has made it easy for multi-media content such as music, audio, and video to be manipulated or forged during transmission over the Internet. Efforts, such as information hiding in steganography, have been unable to secure data transmission and prevent its manipulation. Usage of coding theory, including cryptography, is not full proof in the sense that an unauthorized intruder may inject (tampering) and incorporate unintended data to the messages, which can tamper the transmitted data. There is a need for more transparent message information hiding schemes along with information content verification and authentication, as well as accurate tampering detection. In particular, as it is well known, in many current steganography methods, widely used for image information hiding, there are various technical challenges associated with hiding large amounts of image information in images. Some of these challenges relate to which locations, in a given carrier image, information has to be hidden in order to guarantee transparency of the resulting watermarked images, to the ability to extract hidden information accurately, to the performance of hidden secret information authentication and verification at the receiving end, to the dependency of the hidden information on a given carrier image, to the robustness of information hiding schemes to affine transformations such as rotation, and to the amount of data and number of full-scale images one can embed in a given single image carrier. Additionally, as it is well known, many of the existing stenography methods are based on the Discrete Fourier Transform (DFT), the Discrete Cosine Directors (DCT), or the Discrete Wavelength Transform (DWT) methods, which result in high Bit Error Rate (BER) of the extracted data. In this paper we present a secure high capacity image information hiding scheme where two full separate arbitrary full-scale gray level images (versus binary), one hidden information image and one authentication watermark image are hidden/embedded in the Tchebichef moments of a carrier image with very high imperceptibility. Here the second watermark image is used for identification and content integrity verification and authentication of the hidden secret image. Both the hidden secret hidden image and the authentication watermark image are of the same size as that of a given arbitrary carrier image. In particular, with the cost of computer memory getting lower and the bandwidth of transmission channels getting larger, we show how three different watermarked images, but the same to a naked eye, are produced and transmitted to achieve the desired advantages of high accuracy, security, authentication and verification of the recovered information. To the best of our knowledge, this two-full-scale gray images data hiding and hidden secret image information verification and authentication method is the first attempt of its sort. We show here the robustness of the proposed scheme to affine transformations such as rotation, scaling, and translation, the proposed scheme's high image malicious tampering detection and tampering localization and its high quality extracted recovered and authenticated hidden secret images. Additionally, in order to as much as possible keep the integrity of the received information, when watermarked images are rotated during transmission, a new image rotation estimation and recovery algorithm is presented as part of the proposed information hiding scheme. We show the effect of intended tampering attacks namely, cropping, noise, low-pass and high-pass filtering on the presented scheme. We also show how the extracted information accuracy is generally independent of the carrier image, and we present a mathematical analysis for characterizing the conditions under which transparency of the hidden embedded information is generally achieved for any given arbitrary carrier image. The case of how to extract the hidden information when one or two of the watermarked images is (are) lost is also tackled. Finally, experimental results on real images are presented to illustrate the efficiency and capabilities of the proposed method.