- 标题
- 摘要
- 关键词
- 实验方案
- 产品
-
Lossless Information Hiding in Images || Lossless Information Hiding in JPEG- and JPEG2000-Compressed Images
摘要: This chapter focuses on the lossless information hiding in JPEG and JPEG2000 images. For JPEG images, seven typical methods including two schemes from the authors were introduced. For the first five schemes, we introduced the basic ideas, whereas for the schemes from the authors, we provided a detailed introduced detail with experimental results. In the first method of ours, our high-capacity reversible JPEG-to-JPEG data hiding scheme is introduced. Through lowering certain quantization table entries and lifting corresponding quantized DCT coefficients, space is made for embedding data. Using the proposed embedding strategy, our scheme can achieve high embedding capacity and keep the distortion introduced by embedding very low; meanwhile the original cover JPEG image can be restored after the secret data are extracted. Experiments results demonstrate that the proposed scheme maintains the image quality of a stego JPEG image when the embedding capacity is high. Besides, the file size after embedding with not too huge data is acceptable. Compared with Chang et al.’s method and Xuan et al.’s method, the proposed method is superior in terms of the image quality, hiding capacity, and file size. Our scheme is very practical for image files stored and transmitted in the JPEG format. In the second method of ours, a lossless data hiding scheme with file size preservation is proposed. Through analyzing the code space and the statistics of both used and unused VLCs, we find there is still potential free space in the JPEG bitstream that can be explored to hide data. The best of unused VLCs are made and mapped to the used VLCs in specific mapping manners. The proposed scheme embeds data into the VLC codes and whatever mapped VLCs are present are not changed, therefore the image content after data hiding is exactly the same as the original one. Experimental results demonstrate that the proposed scheme can reach better performance irrespective of whether file size preservation is required or not. For JPEG2000 images, we first introduced two schemes from the literature, and then introduce our scheme. In our scheme, high-frequency subbands of the cover image are divided into blocks. In each block, a new histogram shifting method is applied to the histogram of the block for embedding data. Every coefficient that is associated with the peak point embeds 2 bits of data. In addition, we shift the histogram to the left or right adaptively according to a direction sign. Experimental results show that the proposed scheme has high embedding capacity and good invisibility of hidden data.
关键词: steganography,histogram shifting,data hiding,quantization table,reversible watermarking,JPEG2000,Lossless information hiding,JPEG,VLC mapping,DCT coefficients
更新于2025-09-23 15:23:52
-
Adaptive LSB quantum watermarking method using tri-way pixel value differencing
摘要: As an important way to protect copyright by embedding watermark in digital images, quantum watermarking catches more and more attentions. In this study, a novel quantum watermarking method on the basis of tri-way pixel value differencing and modified least significant bit (LSB) substitution is proposed. A quantum cover image using the novel-enhanced quantum image representation is partitioned into non-overlapping 2 × 2 blocks with four pixels firstly. To classify the block as a smooth area or an edge area, the tri-way pixel value differences are calculated and compared with a predefined threshold. The quantum watermark image, which is expanded and scrambled, is then embedded into a quantum cover image by the k-bit LSB substitution method, where k is decided by the level of each block. The embedded quantum watermark can be extracted from the quantum stego-image without the assistance of original quantum cover image. Theoretical analysis and simulation-based experiments demonstrate both the feasibility and capabilities of the proposed quantum watermarking method, which has good visual quality, better robustness, and higher security.
关键词: Pixel value difference,Visual quality,Quantum image watermarking,Least significant bit
更新于2025-09-23 15:23:52
-
[IEEE 2017 9th IEEE-GCC Conference and Exhibition (GCCCE) - Manama, Bahrain (2017.5.8-2017.5.11)] 2017 9th IEEE-GCC Conference and Exhibition (GCCCE) - OFDM Based Robust Digital Image Watermarking Resistant to Multipath Spatial Shifts
摘要: A digital watermark is a visible or invisible pattern embedded in a digital image which can be used for copyright protection, authentication, broadcast monitoring, telemedicine and many more. This paper describes how an efficient CDMA based spread spectrum technique can be combined with the most prominent spectrum efficient OFDM technology to formulate a robust watermarking algorithm which is suitable for image distortions due to time delays and spatial shift that may occur during the transmission of watermarked images. A detailed simulation of embedding and decoding algorithm was performed. Simulation results reveal that the algorithm is computationally efficient, robust and is well suited for wireless multipath fading channel. The algorithm was tested against a number of the possible noises in the wireless channels and various geometric and signal processing operations. The proposed algorithm is proved to be robust enough to extract a good quality watermark compared to well-known techniques.
关键词: Watermarking,OFDM,multipath,robust,distortion
更新于2025-09-23 15:22:29
-
[IEEE 2018 25th International Conference on Mechatronics and Machine Vision in Practice (M2VIP) - Stuttgart, Germany (2018.11.20-2018.11.22)] 2018 25th International Conference on Mechatronics and Machine Vision in Practice (M2VIP) - Secure and Robust Color Image Watermarking for Copyright Protection Based on Lifting Wavelet Transform
摘要: This paper presents a secure and robust color image watermarking algorithm for copyright protection. This method uses lifting wavelet transform (LWT) to decompose both the host image and the watermark into different sub-bands and performs watermark embedding in the transform domain. A security key is introduced in the algorithm for security purpose. Two color images are used to test the performance of the proposed algorithm. Results show that the scheme not only has good imperceptibility and but also are robust to various geometric and image processing attacks.
关键词: image processing,watermarking,robust and secure,lifting wavelet transform
更新于2025-09-23 15:22:29
-
Hybrid secure and robust image watermarking scheme based on SVD and sharp frequency localized contourlet transform
摘要: In this paper, using singular value decomposition (SVD) and sharp frequency localized contourlet transform (SFLCT) a secure and robust image watermarking procedure is introduced. The SVD and SFLCT are applied on both watermark and original images and using the properties of the SVD and utilizing the advantages of the SFLCT, noticeable results of the watermarking requirements are obtained. Since most of the SVD based watermarking schemes are not resistant against ambiguity attacks and suffer from the false positive problem, this objection is resolved without adding extra steps to the watermarking algorithm and the suggested scheme is secure and resistant against ambiguity attacks. The simulation of the scheme is implemented and its robustness against various types of attacks is experimented. In comparison with some of the recent schemes this procedure shows high imperceptibility, capacity and robustness and these features make the scheme a suitable choice for the image processing applications.
关键词: Ambiguity attacks,Contourlet transform,Image processing,Singular values,Image watermarking
更新于2025-09-23 15:22:29
-
[Lecture Notes in Computational Vision and Biomechanics] Computer Aided Intervention and Diagnostics in Clinical and Medical Images Volume 31 || Secured Image Transmission in Medical Imaging Applications—A Survey
摘要: Radiology Information Systems (RIS) involves the transmission of medical images between the PACS server and the workstation over the network for analysis. The images during transmission are vulnerable due to the intruders, and it is essential to secure the images. Because processing the adulterated images is unethical and can mislead the radio diagnosis. The combination of image processing and the cryptographic techniques can resolve this problem to some extent. Over a period, the technology has improved a lot, and several images securing methods are discussed by various researchers. This review paper is an effort in reviewing the existing secured image transmission technologies, their pros, and cons and the scope of the future work.
关键词: Watermarking techniques,Medical image exchanging,DICOM,Joint encryption
更新于2025-09-23 15:22:29
-
LSBs-based quantum color images watermarking algorithm in edge region
摘要: Based on the NEQR representation for quantum color and binary images, an enhanced quantum watermarking scheme is investigated through Gray code transform and least significant bit (LSB) steganography, which embeds a quantum binary image (i.e., watermark image) into the edge region of a quantum color image (i.e., carrier image) LSB and second LSB. The size of the carrier and watermark images are assumed to be 2n × 2n and 2n?1 × 2n?1, respectively. At first, the watermark image is resized into an appropriate size image with 4-qubit grayscale based on the nearest neighbor interpolation method, which is of the same size with the preselected edge region in carrier image. To enhance the security of the watermark image, the binary code of 4-qubit grayscale of watermark image is transformed into the corresponding Gray code, and one 3-Controlled-NOT gate is utilized to generate a quantum binary image |K 1(cid:2). To further scatter the watermark image qubits that are embedded into the LSB and second LSB of carrier image, the quantum image |K 1(cid:2) is employed to choose any two channels from the color image among the three channels of R, G and B (i.e., R, G or R, B channels would be chosen as the embedding channels). Furthermore, a quantum binary image |K 2(cid:2) is generated through XOR operation decided by the quantum image |K 1(cid:2), which is used to determine the embedding order of watermark image qubits. The extraction process is the inverse operation of embedding, which also needs the two quantum binary key images |K 1(cid:2) and |K 2(cid:2). Finally, the experiment results are simulated under the classical computer software MATLAB 2016(b), which illustrates that our investigated LSBs-based quantum watermarking has a better visual effect than some related works in terms of PSNR value.
关键词: Nearest neighbor interpolation,Gray code transform,Quantum watermarking,Least significant bit
更新于2025-09-23 15:21:21
-
Estimation of Data Hiding Capacities in Spatio-Chromatic Fourier Transform (SCFT) Representations of Color Images
摘要: Despite the abundance of color images, a vast majority of digital image watermarking algorithms are specifically designed for gray-scale images in terms of perceptual modeling, watermark embedding and data hiding capacity. This paper tries to bridge this gap and provides information theoretic estimates of data hiding capacities for standard color images using an improved version of the CIEL*a*b* color space. These capacity estimates are derived based on appropriate color models of the spatio-chromatic Fourier transform (SCFT) of the host image, distortion constraints imposed on the watermarking game players (watermark embedder and attacker), and side information available to both players. This paper considers full-frame and block-based SCFT statistical representations for color images and derive data hiding bounds for these image sources assuming invariance to affine and geometric attacks. Finally, the estimated data hiding capacities are used to assess the performance of a color-based SCFT image watermarking algorithm. The performance results highlight the importance of combining the estimated hiding capacities and perceptual model in designing a high capacity, robust and perceptual color image watermarking system.
关键词: Spatio-chromatic Fourier transform (SCFT),Watermarking games,Color image watermarking,Data hiding capacity
更新于2025-09-23 15:21:01
-
Performance comparison of recent optimization algorithm Jaya with particle swarm optimization for digital image watermarking in complex wavelet domain
摘要: Nowadays copyright protection is mandatory in the field of image processing to removes the illegitimate utilization and imitation of digital images. The digital image watermarking is one of the most reliable methods for protecting the illegal validation of data. In this paper, singular value decomposition based digital image watermarking scheme is proposed in complex wavelet transform (CWT) domain using intelligence algorithms like particle swarm optimization (PSO) and recently proposed Jaya algorithm. The watermark image is embedded into high frequency CWT subband of cover image. At the time of watermark embedding and extraction, optimization algorithms Jaya and PSO are applied to improve the robustness and imperceptibility by assessing the fitness function. The perceptual quality of watermarked image and robustness of extracted watermark image are verified under the filtering, rotation, scaling, Gaussian noise and JPEG compression attacks. From the comparative analysis it is proved that Jaya algorithm is better as compared to PSO algorithm under most types of attacks with higher magnitudes whereas identical under the lower magnitude of applied attacks. Moreover, using variety of cover images, it is found that, the elapse time and value of fitness function given by Jaya algorithm are also better as compared to PSO.
关键词: Particle swarm optimization,Singular value decomposition,Jaya algorithm,Complex wavelet domain watermarking,Fitness function,Elapse time
更新于2025-09-23 15:21:01
-
[IEEE 2019 IEEE 46th Photovoltaic Specialists Conference (PVSC) - Chicago, IL, USA (2019.6.16-2019.6.21)] 2019 IEEE 46th Photovoltaic Specialists Conference (PVSC) - Failure mechanisms limiting the lifetime of thin film photovoltaic semi fabricates with alternative moisture barrier foils
摘要: A novel quantization watermarking method is presented in this paper, which is developed following the established feature modulation watermarking model. In this method, a feature signal is obtained by computing the normalized correlation (NC) between the host signal and a random signal. Information modulation is carried out on the generated NC by selecting a codeword from the codebook associated with the embedded information. In a simple case, the structured codebooks are designed using uniform quantizers for modulation. The watermarked signal is produced to provide the modulated NC in the sense of minimizing the embedding distortion. The performance of the NC-based quantization modulation (NCQM) is analytically investigated, in terms of the embedding distortion and the decoding error probability in the presence of valumetric scaling and additive noise attacks. Numerical simulations on artificial signals confirm the validity of our analyses and exhibit the performance advantage of NCQM over other modulation techniques. The proposed method is also simulated on real images by using the wavelet-based implementations, where the host signal is constructed by the detail coefficients of wavelet decomposition at the third level and transformed into the NC feature signal for the information modulation. Experimental results show that the proposed NCQM not only achieves the improved watermark imperceptibility and a higher embedding capacity in high-noise regimes, but also is more robust to a wide range of attacks, e.g., valumetric scaling, Gaussian filtering, additive noise, Gamma correction, and Gray-level transformations, as compared with the state-of-the-art watermarking methods.
关键词: quantization watermarking,valumetric scaling,Decoding error probability,normalized correlation,spread transform
更新于2025-09-23 15:19:57