期刊文献+

Robust lossless data hiding scheme 被引量:2

Robust lossless data hiding scheme
原文传递
导出
摘要 This paper presents a robust lossless data hiding scheme. The original cover image can be recovered without any distortion after data extraction if the stego-image remains intact, and conversely, the hidden data can still be extracted correctly if the stego-image goes through JPEG compression to some extent. A cover image is divided into a number of non-overlapping blocks, and the arithmetic difference of each block is calculated. By shifting the arithmetic difference value, we can embed bits into the blocks. The shift quantity and shifting rule are fixed for all blocks, and reversibility is achieved. Furthermore, because the bit-0- and bit-1-zones are separated and the particularity of the arithmetic differences, minor changes applied to the stego-image generated by non-malicious attacks such as JPEG compression will not cause the bit-0- and bit-l-zones to overlap, and robustness is achieved. The new embedding mechanism can enhance embedding capacity and the addition of a threshold can make the al- gorithm more robust. Experimental results showed that, compared with previous schemes, the performance of the proposed scheme is significantly improved. This paper presents a robust lossless data hiding scheme. The original cover image can be recovered without any distortion after data extraction if the stego-image remains intact,and conversely,the hidden data can still be extracted correctly if the stego-image goes through JPEG compression to some extent. A cover image is divided into a number of non-overlapping blocks,and the arithmetic difference of each block is calculated. By shifting the arithmetic difference value,we can embed bits into the blocks. The shift quantity and shifting rule are fixed for all blocks,and reversibility is achieved. Furthermore,because the bit-0-and bit-1-zones are separated and the particularity of the arithmetic differences,minor changes applied to the stego-image generated by non-malicious attacks such as JPEG compression will not cause the bit-0-and bit-1-zones to overlap,and robustness is achieved. The new embedding mechanism can enhance embedding capacity and the addition of a threshold can make the al-gorithm more robust. Experimental results showed that,compared with previous schemes,the performance of the proposed scheme is significantly improved.
出处 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2010年第2期101-110,共10页 浙江大学学报C辑(计算机与电子(英文版)
基金 supported in part by the Major Science and Technology Special Project of Zhejiang Province, China (No. 2007C11088) the Science and Technology Project of Zhejiang Province, China (No. 2008C21077)
  • 相关文献

参考文献10

  • 1Celik, M.U.,Sharma, G.,Tekalp, A.M.Lossless wa-termarking for image authentication: a new framework and an implementation[].IEEE Transactions on Image Processing.2006 被引量:1
  • 2Fridrich, J.,Goljan, M.,Du, R.Lossless data embedding: new paradigm in digital watermarking[].EURASIP J Appl Signal Process.2002 被引量:1
  • 3Honsinger, C.W.,Jones, P.,Rabbani, M.,Stoffel, J.C.Lossless Recovery of an Original Image Containing Embedded Data[].US Patent.2001 被引量:1
  • 4Li, Z.,Chen, X.P.,Pan, X.Z.,Zeng, X.T.Lossless Data Hiding Scheme Based on Adjacent Pixel Difference[].Proc Int Conf on Computer Engineering and Technology.2009 被引量:1
  • 5Ni, Z.,Shi, Y.Q.,Ansari, N.,Su, W.,Sun, Q.,Lin, X.Robust Lossless Image Data Hiding[].IEEE Int Conf on Multimedia and Expo.2004 被引量:1
  • 6Bender W,Gruhl D,Morimoto N,et al.Techniques for data hiding[].IBM Systems Journal.1996 被引量:1
  • 7Celik M U,Sharma G,Tekalp A M,et al.Lossless general- ized-LSB data embedding[].IEEE Transactions on Image Processing.2005 被引量:1
  • 8Frank Hartung,Martin Kutter.Multimedia watermarking techniques[].Proceedings of Tricomm.1999 被引量:1
  • 9Katzenbeisser S,Petitcolas FAP.Information Hiding Techniques for Steganography and Digital Watermarking[]..2000 被引量:1
  • 10Langelaar G C,Setyawan I,Lgendijk R L.Watermarking Digital Image and Video Data[].IEEE Signal Processing Magazine.2000 被引量:1

同被引文献8

引证文献2

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部