Please wait a minute...
Front. Inform. Technol. Electron. Eng.  2010, Vol. 11 Issue (2): 101-110    DOI: 10.1631/jzus.C0910177
    
Robust lossless data hiding scheme
Xian-ting ZENG*,1,2, Xue-zeng PAN1, Ling-di PING1, Zhuo LI1
1 School of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China 2 College of Information Engineering, China Jiliang University, Hangzhou 310018, China
Robust lossless data hiding scheme
Xian-ting ZENG*,1,2, Xue-zeng PAN1, Ling-di PING1, Zhuo LI1
1 School of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China 2 College of Information Engineering, China Jiliang University, Hangzhou 310018, China
 全文: PDF(549 KB)  
摘要: This paper presents a robust lossless data hiding scheme. The original cover image can be recovered without any distortion after data extraction if the stego-image remains intact, and conversely, the hidden data can still be extracted correctly if the stego-image goes through JPEG compression to some extent. A cover image is divided into a number of non-overlapping blocks, and the arithmetic difference of each block is calculated. By shifting the arithmetic difference value, we can embed bits into the blocks. The shift quantity and shifting rule are fixed for all blocks, and reversibility is achieved. Furthermore, because the bit-0- and bit-1-zones are separated and the particularity of the arithmetic differences, minor changes applied to the stego-image generated by non-malicious attacks such as JPEG compression will not cause the bit-0- and bit-1-zones to overlap, and robustness is achieved. The new embedding mechanism can enhance embedding capacity and the addition of a threshold can make the algorithm more robust. Experimental results showed that, compared with previous schemes, the performance of the proposed scheme is significantly improved.
关键词: WatermarkingLossless data hidingReversible data hidingRobust lossless data hidingSemi-fragile authentication    
Abstract: This paper presents a robust lossless data hiding scheme. The original cover image can be recovered without any distortion after data extraction if the stego-image remains intact, and conversely, the hidden data can still be extracted correctly if the stego-image goes through JPEG compression to some extent. A cover image is divided into a number of non-overlapping blocks, and the arithmetic difference of each block is calculated. By shifting the arithmetic difference value, we can embed bits into the blocks. The shift quantity and shifting rule are fixed for all blocks, and reversibility is achieved. Furthermore, because the bit-0- and bit-1-zones are separated and the particularity of the arithmetic differences, minor changes applied to the stego-image generated by non-malicious attacks such as JPEG compression will not cause the bit-0- and bit-1-zones to overlap, and robustness is achieved. The new embedding mechanism can enhance embedding capacity and the addition of a threshold can make the algorithm more robust. Experimental results showed that, compared with previous schemes, the performance of the proposed scheme is significantly improved.
Key words: Watermarking    Lossless data hiding    Reversible data hiding    Robust lossless data hiding    Semi-fragile authentication
收稿日期: 2009-03-29 出版日期: 2010-01-01
CLC:  TP309.2  
基金资助: Project  supported  in  part  by  the  Major  Science  and  Technology Special Project of Zhejiang Province, China (No. 2007C11088) and the
Science  and  Technology  Project  of  Zhejiang  Province,  China  (No. 2008C21077)
通讯作者: Xian-ting ZENG     E-mail: mico@cjlu.edu.cn
服务  
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章  
Xian-ting ZENG
Xue-zeng PAN
Ling-di PING
Zhuo LI

引用本文:

Xian-ting ZENG, Xue-zeng PAN, Ling-di PING, Zhuo LI. Robust lossless data hiding scheme. Front. Inform. Technol. Electron. Eng., 2010, 11(2): 101-110.

链接本文:

http://www.zjujournals.com/xueshu/fitee/CN/10.1631/jzus.C0910177        http://www.zjujournals.com/xueshu/fitee/CN/Y2010/V11/I2/101

[1] Muhammad KAMRAN, Ehsan Ullah MUNIR. On the role of optimization algorithms in ownership-preserving data mining[J]. Front. Inform. Technol. Electron. Eng., 2018, 19(2): 151-164.
[2] Wei LIU, Ai-qun HU. A subband excitation substitute based scheme for narrowband speech watermarking[J]. Front. Inform. Technol. Electron. Eng., 2017, 18(5): 627-643.
[3] Hong-yuan Chen, Yue-sheng Zhu. A robust watermarking algorithm based on QR factorization and DCT using quantization index modulation technique[J]. Front. Inform. Technol. Electron. Eng., 2012, 13(8): 573-584.
[4] Baiying Lei, Ing Yann Soon. A multipurpose audio watermarking algorithm with synchronization and encryption[J]. Front. Inform. Technol. Electron. Eng., 2012, 13(1): 11-19.