Abstract : A method for hiding messages in the noise component of digital images in such a way that specific statistical characteristics of the carrier image are not disturbed is presented. The bits are injected in the secret message, taking into account the properties of the carrier image. Adaptive message hiding should be based on local properties of the carrier image. Secure steganographic techniques using digital images require message bits to be spread pseudo-randomly over the carrier image independently of the message lengths and not concentrated in the first rows or columns of the image. For this purpose, a simple but effective message-spreading algorithm based on parameterized chaotic maps was developed. The algorithm uses discretized two-dimensional chaotic maps as universal dispersers for random message scattering within the carrier image. This reports describes several new designs for secure watermarking schemes for digital images. The techniques offer a very high degree of robustness and security with respect to image modifications including noise and lossy compression. A technique is presented for overlaying the carrier image with a key-dependent image whose power is concentrated in the low frequencies. Message extraction is based on a discrete cosine transform. A second technique inserts bits into projections of image blocks onto random, smooth, orthogonal patterns individually generated for each image and user ID. This method avoids using publicly known basis functions, thereby increasing security against malicious attacks. Robustness test results against image distortion and manipulation techniques and security of attacks to removing hidden messages are presented. Patent application serial number PASN 08/986695, 8 Dec 97, Title "Digital Watermark" has been filed for this work.
[1]
Lawrence O'Gorman,et al.
Electronic marking and identification techniques to discourage document copying
,
1994,
Proceedings of INFOCOM '94 Conference on Computer Communications.
[2]
Christophe De Vleeschouwer,et al.
Digital watermarking of images
,
1996
.
[3]
Wenjun Zeng,et al.
Digital image watermarking using visual models
,
1997,
Electronic Imaging.
[4]
M. Yeung,et al.
Can invisible watermarks resolve rightful ownerships?
,
1997,
Electronic Imaging.
[5]
C. F. Osborne,et al.
A digital watermark
,
1994,
Proceedings of 1st International Conference on Image Processing.
[6]
Jian Zhao,et al.
Embedding Robust Labels into Images for Copyright Protection
,
1995,
KnowRight.
[7]
Jonathan N. Bradley,et al.
The data embedding method
,
1996
.
[8]
J. Fridrich.
Symmetric Ciphers Based on Two-Dimensional Chaotic Maps
,
1998
.
[9]
Eckhard Koch,et al.
Towards Robust and Hidden Image Copyright Labeling
,
1995
.
[10]
Lawrence O'Gorman,et al.
Document marking and identification using both line and word shifting
,
1995,
Proceedings of INFOCOM'95.
[11]
Ahmed H. Tewfik,et al.
Data hiding for video-in-video
,
1997,
Proceedings of International Conference on Image Processing.
[12]
Walter Bender,et al.
Techniques for data hiding
,
1995,
Electronic Imaging.
[13]
Joshua R. Smith,et al.
Modulation and Information Hiding in Images
,
1996,
Information Hiding.
[14]
Bernd Girod,et al.
Digital watermarking of raw and compressed video
,
1996,
Other Conferences.
[15]
H. R. Madhusudan.
Digital watermarks
,
1998
.