Information Hiding Method Using Best DCT and Wavelet Coefficients and ItsWatermark Competition

In recent years, information hiding and its evaluation criteria have been developed by the IHC (Information Hiding and its Criteria) Committee of Japan. This committee was established in 2011 with the aim of establishing standard evaluation criteria for robust watermarks. In this study, we developed an information hiding method that satisfies the IHC evaluation criteria. The proposed method uses the difference of the frequency coefficients derived from a discrete cosine transform or a discrete wavelet transform. The algorithm employs a statistical analysis to find the best positions in the frequency domains for watermark insertion. In particular, we use the BCH (Bose-Chaudhuri-Hocquenghem) (511,31,109) code to error correct the watermark bits and the BCH (63,16,11) code as the sync signal to withstand JPEG (Joint Photographic Experts Group) compression and cropping attacks. Our experimental results showed that there were no errors in 10 HDTV-size areas after the second decompression. It should be noted that after the second compression, the file size should be less than 1 25 of the original size to satisfy the IHC evaluation criteria.

[1]  Nazim Fatès,et al.  Public automated web-based evaluation service for watermarking schemes: StirMark benchmark , 2001, IS&T/SPIE Electronic Imaging.

[2]  Pablo Pavón-Mariño,et al.  Third-generation mobile communications in europe: light and shadows , 2001, IEEE Communications Magazine.

[3]  Reihaneh Safavi-Naini,et al.  How to Compare Image Watermarking Algorithms , 2009, Trans. Data Hiding Multim. Secur..

[4]  Sanjay N. Talbar,et al.  A High Quality Steganographic Method Using Morphing , 2014, J. Inf. Process. Syst..

[5]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[6]  Stelvio Cimato,et al.  Encyclopedia of Cryptography and Security , 2005 .

[7]  Masaki Kawamura,et al.  Digital watermarking method using LDPC code for clipped image , 2014, IWIHC '14.

[8]  Benoit M. Macq,et al.  Benchmarking image watermarking algorithms with Openwatermark , 2006, 2006 14th European Signal Processing Conference.

[9]  Fabien A. P. Petitcolas,et al.  Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..

[10]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.

[11]  Fabien A. P. Petitcolas,et al.  Fair benchmark for image watermarking systems , 1999, Electronic Imaging.

[12]  G. Geethakumari,et al.  Detecting misinformation in online social networks using cognitive psychology , 2014, Human-centric Computing and Information Sciences.

[13]  Jana Dittmann,et al.  Theoretical Framework for a Practical Evaluation and Comparison of Audio Watermarking Schemes in the Triangle of Robustness, Transparency and Capacity , 2006, Trans. Data Hiding Multim. Secur..

[14]  Francesco G. B. De Natale,et al.  Watermarking Robustness Evaluation Based on Perceptual Quality via Genetic Algorithms , 2009, IEEE Transactions on Information Forensics and Security.

[15]  Motoi Iwata,et al.  Information Hiding and Its Criteria for Evaluation , 2017, IEICE Trans. Inf. Syst..

[16]  Francesco G. B. De Natale,et al.  Robustness and security assessment of image watermarking techniques by a stochastic approach , 2009, Electronic Imaging.

[17]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[18]  T. Moon Error Correction Coding: Mathematical Methods and Algorithms , 2005 .

[19]  Masaki Hakka,et al.  DCT-OFDM based watermarking scheme robust against clipping attack , 2014, IWIHC '14.

[20]  Edward J. Delp,et al.  The Watermark Evaluation Testbed (WET) , 2004, IS&T/SPIE Electronic Imaging.

[21]  Seong-Jun Lee,et al.  An exploratory study on the core spectrum for mobile telecommunication , 2014 .

[22]  Toru Fujiwara,et al.  Salt-and-pepper image watermarking system for IHC evaluation criteria , 2014, IWIHC '14.

[23]  Mamta Juneja,et al.  A New Approach for Information Security using an Improved Steganography Technique , 2013, J. Inf. Process. Syst..

[24]  Bruce Davis Signal rich art: enabling the vision of ubiquitous computing , 2011, Electronic Imaging.

[25]  S. Pereira,et al.  Attacks on digital watermarks: classification, estimation based attacks, and benchmarks , 2001, IEEE Communications Magazine.

[26]  Keiichi Iwamura,et al.  Watermarking based on the difference of discrete cosine transform coefficients and an error-correcting code , 2014, IWIHC '14.