Adaptive image data hiding using transformation and error replacement

Watermarking is popular method for effective copyright protection of digital data. The invisible image watermarking is a type of watermarking which is used to conceal secret information in a cover image. In any watermarking system, there is a trade-off between imperceptibility and payload of the data to be hidden in the cover medium. Therefore, only a limited amount of data can be concealed in the cover image while watermark remain imperceptible. This paper proposes a new method of adaptive blind digital image data hiding in Discrete Cosine Transform (DCT) domain using Minimum Error Lease Significant Bit Replacement (MELSBR) method and Genetic Algorithm (GA). In the proposed method, the secret image is embedded into the DCT transformed cover image. Initially, the host and the secret image both are partitioned into equal sized blocks. Then for each secret image block, host image block is intelligently selected through GA and is embedded using MELSBR method. GA helps in identifying the target cover image blocks such that with the LSB embedding, both visual quality of the cover image and imperceptibility of the secret image remain least affected. In watermark extraction process, the watermarked image is decomposed into equal sized blocks and then using the Jigsaw Puzzle Solver (JPS) the secret image is reconstructed. In spite of doubling the payload of the data to hide, the experimental results have shown better imperceptibility and robustness results of the proposed method as compared to the current approaches in this domain.

[1]  Ponnuthurai N. Suganthan Solving jigsaw puzzles using Hopfield neural networks , 1999, IJCNN'99. International Joint Conference on Neural Networks. Proceedings (Cat. No.99CH36339).

[2]  Zbigniew Michalewicz,et al.  Genetic Algorithms Plus Data Structures Equals Evolution Programs , 1994 .

[3]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[4]  Ja-Chen Lin,et al.  Hiding data in images by optimal moderately-significant-bit replacement , 2000 .

[5]  Shih-Wei Lin,et al.  A hybrid watermarking technique applied to digital images , 2008, Appl. Soft Comput..

[6]  J. Watada,et al.  ICIC Express Letters , 2015 .

[7]  Muhammad Ishtiaq,et al.  Block-based digital image watermarking using Genetic Algorithm , 2010, 2010 6th International Conference on Emerging Technologies (ICET).

[8]  Asifullah Khan,et al.  Genetic perceptual shaping: Utilizing cover image and conceivable attack information during watermark embedding , 2007, Inf. Fusion.

[9]  Sung Wook Baik,et al.  Adaptive key frame extraction for video summarization using an aggregation mechanism , 2012, J. Vis. Commun. Image Represent..

[10]  Oguz Findik,et al.  Watermarking schema using an artificial immune system in spatial domain , 2009, ICIS '09.

[11]  Yeuan-Kuen Lee,et al.  An Adaptive Image Steganographic Model Based on Minimum-Error LSB Replacement , 1999 .

[12]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[13]  Fenghui Yao,et al.  A shape and image merging technique to solve jigsaw puzzles , 2003, Pattern Recognit. Lett..

[14]  Asifullah Khan,et al.  BCH coding and intelligent watermark embedding: Employing both frequency and strength selection , 2010, Appl. Soft Comput..

[15]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..

[16]  Zbigniew Michalewicz,et al.  Genetic Algorithms + Data Structures = Evolution Programs , 1996, Springer Berlin Heidelberg.

[17]  M. Arfan Jaffar,et al.  Adaptive Digital Watermarking of Images Using Genetic Algorithm , 2010, 2010 International Conference on Information Science and Applications.

[18]  Sung Wook Baik,et al.  Video summarization using a network of radial basis functions , 2012, Multimedia Systems.

[19]  Mitsuo Gen,et al.  Genetic algorithms and engineering design , 1997 .

[20]  Lee-Ming Cheng,et al.  Image hiding based on block difference , 2004, ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, 2004..

[21]  Mauro Barni,et al.  DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.

[22]  Yeuan-Kuen Lee,et al.  High capacity image steganographic model , 2000 .

[23]  Mitsuo Gen,et al.  Genetic Algorithms and Manufacturing Systems Design , 1996 .

[24]  Frank Boland,et al.  Watermarking digital images for copyright protection , 1995 .

[25]  Norman I. Badler,et al.  Jigsaw puzzle matching using a boundary-centered polar encoding , 1982, Comput. Graph. Image Process..

[26]  Sung Wook Baik,et al.  Efficient visual attention based framework for extracting key frames from videos , 2013, Signal Process. Image Commun..

[27]  Chi-Kwong Chan,et al.  A novel image-hiding scheme based on block difference , 2006, Pattern Recognit..

[28]  Ingemar J. Cox,et al.  A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.

[29]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..