A New Algorithm for Enhanced Robustness of Copyright Mark

This paper discusses a new heavy tailed distribution based data hiding into discrete cosine transform (DCT) coefficients of image, which provides statistical security as well as robustness against steganalysis attacks. Unlike other data hiding algorithms, the proposed technique does not introduce much effect in the stegoimage’s DCT coefficient probability plots, thus making the presence of hidden data statistically undetectable. In addition the proposed method does not compromise on hiding capacity. When compared to the generic block DCT based data-hiding scheme, our method found more robust against a variety of image manipulating attacks such as filtering, blurring, JPEG compression etc. Keywords—Information Security, Robust Steganography, Steganalysis, Pareto Probability Distribution function.

[1]  Yong Liang Guan,et al.  An objective comparison between spatial and DCT watermarking schemes for MPEG video , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[2]  Fernando Pérez-González,et al.  DCT-domain watermarking techniques for still images: detector performance analysis and a new structure , 2000, IEEE Trans. Image Process..

[3]  Wenjun Zeng,et al.  Digital image watermarking using visual models , 1997, Electronic Imaging.

[4]  Eckhard Koch,et al.  Towards Robust and Hidden Image Copyright Labeling , 1995 .

[5]  Francis M. Boland,et al.  Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[6]  Jerry D. Gibson,et al.  Distributions of the Two-Dimensional DCT Coefficients for Images , 1983, IEEE Trans. Commun..

[7]  L. Marton,et al.  Advances in Electronics and Electron Physics , 1958 .

[8]  K A Birney,et al.  On the modeling of DCT and subband image data for compression , 1995, IEEE Trans. Image Process..

[9]  Markus G. Kuhn,et al.  Information hiding-A survey : Identification and protection of multimedia information , 1999 .

[10]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[11]  Bijan G. Mobasseri,et al.  Watermarking in JPEG bitstream , 2005, IS&T/SPIE Electronic Imaging.

[12]  Wenjun Zeng,et al.  Perceptual watermarking of still images , 1997, Proceedings of First Signal Processing Society Workshop on Multimedia Signal Processing.

[13]  R. R. Clarke Transform coding of images , 1985 .

[14]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[15]  Edward J. Delp,et al.  A WATERMARKING TECHNIQUE FOR DIGITAL IMAGERY: FURTHER STUDIES , 2001 .

[16]  Santi P. Maity,et al.  An image watermarking scheme using HVS characteristics and spread transform , 2004, ICPR 2004.

[17]  John Langford,et al.  Provably Secure Steganography , 2009, IEEE Trans. Computers.

[18]  Panagiotis Tsakalides,et al.  Hidden messages in heavy-tails: DCT-domain watermark detection using alpha-stable models , 2005, IEEE Transactions on Multimedia.

[19]  R. Adler,et al.  A practical guide to heavy tails: statistical techniques and applications , 1998 .

[20]  Rafael C. González,et al.  Local Determination of a Moving Contrast Edge , 1985, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[21]  Jessica J. Fridrich,et al.  Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.

[22]  Rafael C. González,et al.  Digital image processing using MATLAB , 2006 .

[23]  Bo Tao,et al.  Adaptive watermarking in the DCT domain , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[24]  Yong-Huai Huang,et al.  Hiding digital watermarks using multiresolution wavelet transform , 2001, IEEE Trans. Ind. Electron..

[25]  Nariman Farvardin,et al.  Subband Image Coding Using Entropy-Coded Quantization over Noisy Channels , 1992, IEEE J. Sel. Areas Commun..

[26]  Andrew G Tescher Transform Image Coding. , 1978 .

[27]  Edward J. Delp,et al.  A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[28]  Panayiotis G. Georgiou,et al.  Alpha-Stable Modeling of Noise and Robust Time-Delay Estimation in the Presence of Impulsive Noise , 1999, IEEE Trans. Multim..

[29]  Ning Liu,et al.  Statistically Secure Digital Image Data Hiding , 2005, 2005 IEEE 7th Workshop on Multimedia Signal Processing.

[30]  Alin Achim,et al.  Novel Bayesian multiscale method for speckle removal in medical ultrasound images , 2001, IEEE Transactions on Medical Imaging.

[31]  Mischa Schwartz,et al.  Information transmission, modulation, and noise , 1959 .

[32]  Huaiqing Wang,et al.  Cyber warfare: steganography vs. steganalysis , 2004, CACM.

[33]  J. van Leeuwen,et al.  Information Hiding , 1999, Lecture Notes in Computer Science.

[34]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.