Data hiding in angle quantization
نویسنده
چکیده
In this paper, we present a non-linear method of embedding a signature in colour and monochrome images and demonstrate its recovery. The embedding process can be viewed as pseudo-random perturbations to angles between vector elements. The derived angles are dithered by the addition of a watermark, and encoded as a pseudo-noise sequence of dither angle offsets. This is followed by a re-quantisation for storage or transmission. The dither angles are recovered by scaling according to the pre-determined angle quantisation intervals. These intervals may be fixed according to some pattern, or they could be obtained adaptively from the local image. Performing a complex correlation with the known sequence enables recovery of sub-degree dither angles embedded in 8-bit data. This occurs without recourse to the original image. This embedding process is additive in the angular domain and therefore multiplicative in the signal domain. Since the magnitude of the image vector is conserved, the image energy is largely unaltered by the embedding process. Colour watermarks can be treated as sets of ordered triples (RGB), as pixel pairs in spatial or YIQ/YCbCr colour domain , or in a transform domain.
منابع مشابه
Detection of perturbed quantization (PQ) steganography based on empirical matrix
Perturbed Quantization (PQ) steganography scheme is almost undetectable with the current steganalysis methods. We present a new steganalysis method for detection of this data hiding algorithm. We show that the PQ method distorts the dependencies of DCT coefficient values; especially changes much lower than significant bit planes. For steganalysis of PQ, we propose features extraction from the e...
متن کاملA Survey on Joint Data-Hiding and Compression Techniques based on SMVQ and Improved Locally Adaptive Coding Method
Today Reversible data hiding is latest research area in the field of secret data hiding technique. Data hiding is a technique in which conceal secret data is hidden in some cover image like video, audio, movie, file, and image. Data hiding popularly used in medical and military application. This paper covers many hiding and compression techniques like vector quantization (VQ), side match vector...
متن کاملA Review Paper on Joint Data Hiding and Compression Scheme based on SMVQ and Image Inpainting
Data hiding is mainly used to hide the secret data into a cover data like a video file, an audio file, an image, etc. It is popularly used in medical and military applications. Nowadays reversible data hiding is the latest research area in the field of secret data hiding techniques. This paper covers many hiding and compression techniques like vector quantization (VQ), side match vector quantiz...
متن کاملPerformance analysis of nonuniform quantization-based data hiding
In this paper, we tackle the problem of performance improvement of quantization-based data-hiding in the middle-watermark-to-noise ratio (WNR) regime. The objective is to define the quantization-based framework that maximizes the performance of the known-host-state data-hiding in the middle-WNR taking into account the host probability density function (pdf). The experimental results show that t...
متن کاملHigh Efficiency Reversible Data Hiding for Two-stage Vector Quantization Compressed Images
Data hiding is a booming technique aiming to embed secret data into digital media for content authentication, annotation or copyright protection. Reversible data hiding is a special type of data hiding technique that guarantees the host digital media can be losslessly recovered after the secret data are correctly extracted. In the past several years, some reversible data hiding schemes for Vect...
متن کاملImage Adaptive High Volume Data Hiding Based on Scalar Quantization
Information-theoretic analysis for data hiding prescribe embedding the hidden data in the choice of quantizer for the host data. In this paper, we consider a suboptimal implementation of this prescription, with a view to hiding high volumes of data in images with low perceptual degradation. The three main findings are as follows: (i) Scalar quantization based data hiding schemes incur about 2 d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001