DWT Domain Information Hiding Approach Using Detail Sub-band Feature Adjustment

نویسندگان

  • Qiudong Sun
  • Ping Guan
  • Yongping Qiu
  • Wenying Yan
چکیده

In recent years, many algorithms based on HVS and DWT had been proposed for watermarking. But most of them aimed at the binary iconic watermark. So they are unsuitable for embedding other format watermarks such as the text file, the gray image or even the color image. This paper proposed a multiformat data source file supporting algorithm for watermarking and information hiding. Firstly, the algorithm transformed a source file into a binary watermark sequence and put redundant encoding and random scrambling on it. Then, the algorithm selected two neighboring blocks each time from the Hilbert scanning sequence of the host image blocks, and transformed them by DWT. Lastly, according to the different codes of each two sequential watermark bits, the algorithm chose one of two thresholds of just noticeable difference (JND) to modify the average value features of two corresponding detail sub-bands to insert the watermark into the host image. Extracting hidden information only to need the embedded image without the original host images and the data source file, implemented the blind extraction to improve the security of secret information. The experimental results show that the embedded watermark is invisible, and the algorithm is robust to common image processing operations.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Biometrical Image Stegenography by Using Wavelet Transform Techniques

The proposed steganography method used in this paper is based on biometrics. And the biometric feature used to implement steganography is skin tone region of images. Here secret data is embedded within skin region of image that will provide an excellent secure location for data hiding. For this skin tone detection is performed using HSV (Hue, Saturation and Value) color space. Additionally secr...

متن کامل

Robust and Secure Data Hiding in Image Using Biometric Technique

-Steganography method used in this paper is based on biometrics. And the biometric feature used to implement steganography is skin tone region of images. Here secret data is embedded within skin region of image that will provide an excellent secure location for data hiding. For this skin tone detection is performed using HSV (Hue, Saturation and Value) color space. Additionally secret data embe...

متن کامل

Information Hiding Method Based on Block DWT Sub-Band Feature Encoding

For realizing of long text information hiding and covert communication, a binary watermark sequence was obtained firstly from a text file and encoded by a redundant encoding method. Then, two neighboring blocks were selected at each time from the Hilbert scanning sequence of carrier image blocks, and transformed by 1-level discrete wavelet transformation (DWT). And then the double block based J...

متن کامل

Skin Tone Based Secret Data Hiding in Images Using Wavelet Transform

Biometric feature accustomed implement steganography is skin tone region of pictures. Here secret information is embedded inside skin region of image that may offer a wonderful secure location for information activity. For this skin tone detection is performed exploitation HSV (Hue, Saturation and Value) colour area to boot secret information embedding is performed exploitation frequency domain...

متن کامل

A Secure Skin Tone based Steganography Using Wavelet Transform

16 Abstract—Steganography is the art of hiding the existence of data in another transmission medium to achieve secret communication. Steganography method used in this paper is based on biometrics. And the biometric feature used to implement Steganography is skin tone region of images [1]. Here secret data is embedded within skin region of image that will provide an excellent secure location for...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013