Security and Robustness Enhancement for Image Data Hiding

In many applications, data hiding can be viewed as a tradeoff between capacity, robustness (against attacks), and embedding induced distortion. In this paper, we consider a fourth parameter: the security of the hidden information. Specifically, we propose a hash-based randomized embedding algorithm (HRE) that increases the security of the hidden data. We then optimize this algorithm against JPEG attacks. We derive a mathematical expression for the security of our algorithm, using which we show that the security of our algorithm can be increased independent of capacity, robustness, and embedding induced distortion. The maximum security depends only on the length of the key sequence, which is limited only by the size of the host image. Using a joint security and capacity measure, we show that the proposed scheme performs better than current secure quantization based data hiding schemes. We also derive the optimal value of distortion compensation factor of the HRE algorithm against JPEG compression attack. Experimental results show that the operating points achieved by the proposed scheme are 7 dB better than current blind data hiding schemes against the JPEG attack

[1]  B. S. Manjunath,et al.  Robust image-adaptive data hiding using erasure and error correction , 2004, IEEE Transactions on Image Processing.

[2]  Bernd Girod,et al.  Scalar Costa scheme for information embedding , 2003, IEEE Trans. Signal Process..

[3]  Pierre Moulin,et al.  QIM watermarking games , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[4]  Dimitrios Hatzinakos,et al.  Multiresolution digital watermarking: algorithms and implications for multimedia signals , 1999 .

[5]  Robert F. H. Fischer,et al.  Additive non-Gaussian noise attacks on the scalar Costa scheme (SCS) , 2005, IS&T/SPIE Electronic Imaging.

[6]  Peizhong Lu,et al.  An Optimized Spatial Data Hiding Scheme Combined with Convolutional Codes and Hilbert Scan , 2002, IEEE Pacific Rim Conference on Multimedia.

[7]  Min Wu,et al.  Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[8]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[9]  Ece Dept,et al.  A STOCHASTIC QIM ALGORITHM FOR ROBUST, UNDETECTABLE IMAGE WATERMARKING , 2004 .

[10]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[11]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[12]  Chun-Shien Lu,et al.  Denoising and copy attacks resilient watermarking by exploiting prior knowledge at detector , 2002, IEEE Trans. Image Process..

[13]  Shih-Fu Chang,et al.  Watermarking capacity of digital images based on domain-specific masking effects , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[14]  Ingemar J. Cox,et al.  The First 50 Years of Electronic Watermarking , 2002, EURASIP J. Adv. Signal Process..

[15]  Edward J. Delp,et al.  Advances in Digital Video Content Protection , 2005, Proceedings of the IEEE.

[16]  Haisang Wu,et al.  Optimal segmentation of cell images , 1998 .

[17]  Gregory W. Cook,et al.  An overview of security issues in streaming video , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[18]  G. Wornell,et al.  Quantization index modulation: a class of provably good methods for digital watermarking and information embedding , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).

[19]  Khalid Sayood,et al.  Introduction to Data Compression , 1996 .

[20]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[21]  Henrique S. Malvar,et al.  Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..

[22]  Ning Liu,et al.  Vector-quantization-based scheme for data embedding for images , 2004, IS&T/SPIE Electronic Imaging.

[23]  Fernando Pérez-González,et al.  Performance analysis of existing and new methods for data hiding with known-host information in additive channels , 2003, IEEE Trans. Signal Process..

[24]  Mahalingam Ramkumar Data hiding in multimedia - theory and applications , 1999 .

[25]  Ching-Yung Lin Watermarking and Digital Signature Techniques for Multimedia Authentication and Copyright Protection , 2000 .

[26]  Ton Kalker,et al.  Digital watermarking for DVD video copy protection , 2000 .

[27]  A. Kot,et al.  BINARY IMAGE WATERMARKING THROUGH BLURRING AND BIASED BINARIZATION , 2003 .

[28]  Fernando Pérez-González,et al.  Worst-case additive attack against quantization-based data-hiding methods , 2005, IS&T/SPIE Electronic Imaging.

[29]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[30]  Edward J. Delp,et al.  Benchmarking of image watermarking algorithms for digital rights management , 2004, Proceedings of the IEEE.

[31]  Joan L. Mitchell,et al.  JPEG: Still Image Data Compression Standard , 1992 .

[32]  B. S. Manjunath,et al.  A robust data hiding technique using multidimensional lattices , 1998, Proceedings IEEE International Forum on Research and Technology Advances in Digital Libraries -ADL'98-.

[33]  Ahmed H. Tewfik,et al.  Multiresolution scene-based video watermarking using perceptual models , 1998, IEEE J. Sel. Areas Commun..

[34]  A. Murat Tekalp,et al.  Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..

[35]  Gregory W. Wornell,et al.  Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia , 2001, J. VLSI Signal Process..

[36]  Minerva M. Yeung,et al.  Effective and ineffective digital watermarks , 1997, Proceedings of International Conference on Image Processing.

[37]  Oscar C. Au,et al.  A capacity estimation technique for JPEG-to-JPEG image watermarking , 2003, IEEE Trans. Circuits Syst. Video Technol..

[38]  Yan Lin,et al.  A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression , 2003, IEEE Trans. Circuits Syst. Video Technol..

[39]  Min Wu Joint security and robustness enhancement for quantization based data embedding , 2003, IEEE Trans. Circuits Syst. Video Technol..

[40]  Ramarathnam Venkatesan,et al.  Image watermarking with better resilience , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[41]  Min Wu,et al.  Data hiding in image and video .I. Fundamental issues and solutions , 2003, IEEE Trans. Image Process..

[42]  Jiri Fridrich,et al.  Applications of data hiding in digital images , 1999, ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No.99EX359).

[43]  Ning Liu,et al.  Nonuniform quantizer design for image data hiding , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[44]  Khalid Sayood,et al.  Introduction to data compression (2nd ed.) , 2000 .

[45]  Thomas H. Cormen,et al.  Introduction to algorithms [2nd ed.] , 2001 .

[46]  B. S. Manjunath,et al.  Color image embedding using multidimensional lattice structures , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).