Please wait a minute...
Front. Inform. Technol. Electron. Eng.  2010, Vol. 11 Issue (2): 101-110    DOI: 10.1631/jzus.C0910177
    
Robust lossless data hiding scheme
Xian-ting ZENG*,1,2, Xue-zeng PAN1, Ling-di PING1, Zhuo LI1
1 School of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China 2 College of Information Engineering, China Jiliang University, Hangzhou 310018, China
Download:   PDF(549KB)
Export: BibTeX | EndNote (RIS)      

Abstract  This paper presents a robust lossless data hiding scheme. The original cover image can be recovered without any distortion after data extraction if the stego-image remains intact, and conversely, the hidden data can still be extracted correctly if the stego-image goes through JPEG compression to some extent. A cover image is divided into a number of non-overlapping blocks, and the arithmetic difference of each block is calculated. By shifting the arithmetic difference value, we can embed bits into the blocks. The shift quantity and shifting rule are fixed for all blocks, and reversibility is achieved. Furthermore, because the bit-0- and bit-1-zones are separated and the particularity of the arithmetic differences, minor changes applied to the stego-image generated by non-malicious attacks such as JPEG compression will not cause the bit-0- and bit-1-zones to overlap, and robustness is achieved. The new embedding mechanism can enhance embedding capacity and the addition of a threshold can make the algorithm more robust. Experimental results showed that, compared with previous schemes, the performance of the proposed scheme is significantly improved.

Key wordsWatermarking      Lossless data hiding      Reversible data hiding      Robust lossless data hiding      Semi-fragile authentication     
Received: 29 March 2009      Published: 01 January 2010
CLC:  TP309.2  
Fund:  Project  supported  in  part  by  the  Major  Science  and  Technology Special Project of Zhejiang Province, China (No. 2007C11088) and the
Science  and  Technology  Project  of  Zhejiang  Province,  China  (No. 2008C21077)
Cite this article:

Xian-ting ZENG, Xue-zeng PAN, Ling-di PING, Zhuo LI. Robust lossless data hiding scheme. Front. Inform. Technol. Electron. Eng., 2010, 11(2): 101-110.

URL:

http://www.zjujournals.com/xueshu/fitee/10.1631/jzus.C0910177     OR     http://www.zjujournals.com/xueshu/fitee/Y2010/V11/I2/101


Robust lossless data hiding scheme

This paper presents a robust lossless data hiding scheme. The original cover image can be recovered without any distortion after data extraction if the stego-image remains intact, and conversely, the hidden data can still be extracted correctly if the stego-image goes through JPEG compression to some extent. A cover image is divided into a number of non-overlapping blocks, and the arithmetic difference of each block is calculated. By shifting the arithmetic difference value, we can embed bits into the blocks. The shift quantity and shifting rule are fixed for all blocks, and reversibility is achieved. Furthermore, because the bit-0- and bit-1-zones are separated and the particularity of the arithmetic differences, minor changes applied to the stego-image generated by non-malicious attacks such as JPEG compression will not cause the bit-0- and bit-1-zones to overlap, and robustness is achieved. The new embedding mechanism can enhance embedding capacity and the addition of a threshold can make the algorithm more robust. Experimental results showed that, compared with previous schemes, the performance of the proposed scheme is significantly improved.

关键词: Watermarking,  Lossless data hiding,  Reversible data hiding,  Robust lossless data hiding,  Semi-fragile authentication 
[1] Muhammad KAMRAN , Ehsan Ullah MUNIR. On the role of optimization algorithms in ownership-preserving data mining #br#  [J]. Front. Inform. Technol. Electron. Eng., 2018, 19(2): 151-164.
[2] Wei LIU, Ai-qun HU. A subband excitation substitute based scheme for narrowband speech watermarking   [J]. Front. Inform. Technol. Electron. Eng., 2017, 18(5): 627-643.
[3] Mohammad Mosleh, Hadi Latifpour, Mohammad Kheyrandish, Mahdi Mosleh, Najmeh Hosseinpour. A robust intelligent audio watermarking scheme using support vector machine[J]. Front. Inform. Technol. Electron. Eng., 2016, 17(12): 1320-1330.
[4] M. F. Kazemi, M. A. Pourmina, A. H. Mazinan. Level-direction decomposition analysis with a focus on image watermarking framework[J]. Front. Inform. Technol. Electron. Eng., 2016, 17(11): 1199-1217.
[5] Yong-zhao Zhan, Yan-ting Li, Xin-yu Wang, Yi Qian. A blind watermarking algorithm for 3D mesh models based on vertex curvature[J]. Front. Inform. Technol. Electron. Eng., 2014, 15(5): 351-362.
[6] Hong-yuan Chen, Yue-sheng Zhu. A robust watermarking algorithm based on QR factorization and DCT using quantization index modulation technique[J]. Front. Inform. Technol. Electron. Eng., 2012, 13(8): 573-584.
[7] Baiying Lei, Ing Yann Soon. A multipurpose audio watermarking algorithm with synchronization and encryption[J]. Front. Inform. Technol. Electron. Eng., 2012, 13(1): 11-19.