Araştırma Makalesi
BibTex RIS Kaynak Göster

BLOCK BASED DATA HIDING METHOD FOR IMAGES

Yıl 2017, Cilt: 7 Sayı: 2, 85 - 95, 30.11.2017

Öz

In this article, a new block based data
hiding method is presented. The proposed data hiding method uses
non-overlapping blocks and this method consists of block type determination,
data hiding and data extraction functions. The most significant bit of the
secret data determines the block type. If the most significant bit of the
secret data is 1, the block type is the odd, otherwise the block type is even.
The other bits of secret data determine index of abnormal pixel. We use ±1
operator to set abnormal pixel and pre-processing in this paper. To extract
secret data, we use index of abnormal pixel and block type. Capacity, execution
time and visual quality parameters are used for measuring performance of the
proposed method. Experimental results show that the proposed method is a
successful data hiding method and that the proposed data hiding method can be
used in methods such as image authentication, fragile watermarking etc.

Kaynakça

  • [1] Ma, X., Pan, Z., Hu, S., Wang, L., Reversible data hiding scheme for VQ indices based on modified locally adaptive coding and double-layer embedding strategy, J. Vis. Commun. Image R., (2015), 28, 60–70.
  • [2] Furon, T., A survey of watermarking security, International workshop on digital watermarking, Lecture notes on computer science, (2005), Vol. 3710, Springer, 201–215.
  • [3] Fridrich, J., Steganography in digital media: Principles, algorithms, and applications, Cambridge University Press, 2005.
  • [4] Yang, C.H., Lin, Y.C., Fractal curves to improve the reversible data embedding for VQ-indexes based on locally adaptive coding, J. Vis. Commun. Image Represent. , (2010), 21 (4), 334–342..
  • [5] Bhat, V., Sengupta, I., Das, A., An adaptive audio watermarking based on the singular value decomposition in the wavelet domain, Digital Signal Processing, (2010), 20, 1547–155.
  • [6] Daemen, J., Rijmen, V., The Design of Rijndael: AES-the Advanced Encryption Standard, Springer, 2002.
  • [7] Said, A., Pearlman, W.A., A new, fast, and efficient image codec based on set partitioning in hierarchical trees, IEEE Trans Circuits Syst Video Technol, (1996), 6, 243–250.
  • [8] Shropshire, J., Warkentin, M., Sharma, S., Personality, attitudes, and intentions: Predicting initial adoption of information security behavior, Computers & Security, (2015), Volume 49, 177-191.
  • [9] Dogan, S., A reversible data hiding scheme based on graph neigbourhood degree, Journal of Experimental & Theoretical Artifical Intelligence, (2017), 29 (4), 741-753.
  • [10] Chen, B., Design and analysis of digital watermarking, information embedding, and data hiding systems, Ph.D. dissertation, MIT, Cambridge, MA, June 2000.
  • [11] Celik, M.U., Sharma, G., Tekalp, A.M., Sable, E., Lossless generalized-LSB data embedding, IEEE Trans. Image Process. (2005), 14 (2), 253–266.
  • [12] Lin, Y. K., A data hiding scheme based upon DCT coefficient modification, Computer Standards & Interfaces, (2014), Volume 36, Issue 5, 855-862.
  • [13] Liu, Y., Zhao, J., A new video watermarking algorithm based on 1D DFT and Radon transform, Signal Processing, (2010), Volume 90, Issue 2, 626-639.
  • [14] Lee, S. H., DWT based coding DNA watermarking for DNA copyright protection, Information Sciences, (2014), 273, 263-286,.
  • [15] Vaishnavi, D., Subashini, T.S., Robust and Invisible Image Watermarking in RGB Color Space Using SVD, Procedia Computer Science, 2015, Volume 46, 1770-1777.
  • [16] Tanchenko, A., Visual-PSNR measure of image quality, J. Vis. Commun. Image R., (2014), 25,874–878.
  • [17] A-Eldayem, M. M., A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine, Egyptian Informatics Journal, (2013), 14,1–13.
  • [18] Wang, C. C., Chang, Y. F., Chang, C. C., Jan, J. K., Lin, C. C., A high capacity data hiding scheme for binary images based on block patterns, The Journal of Systems and Software, (2014), 93, 152–162.
  • [19] Lin, C.C., Tsai, W.H., Secret image sharing with steganography and authentication, Journal of System and Software, (2004), 73: 405-414.
  • [20] Yang, C.N., Chen, T.S., Yu, K.H., Wang C.C., Improvements of image sharing with steganography and authentication, Journal of System and Software, (2007), 80, 1070-1076.
  • [21] Chang, C.C., Hsieh, Y.P., Lin, C.H., Sharing secrets in stego images with authentication. Pattern Recognition, (2008), 41 (10), 3130-3137.
  • [22] Eslami, Z., Ahmadabadi, J.Z., Secret image sharing with authentication-chaining and dynamic embedding, Journal of System and Software, (2011), 84, 803-809.
  • [23] Wu, W.-C., Lin, Z.-W., SVD-based self-embedding image authentication scheme using quick response code features, Journal of Visual Communication and Image Representation, (2016), 38, 18-28.
Yıl 2017, Cilt: 7 Sayı: 2, 85 - 95, 30.11.2017

Öz

Kaynakça

  • [1] Ma, X., Pan, Z., Hu, S., Wang, L., Reversible data hiding scheme for VQ indices based on modified locally adaptive coding and double-layer embedding strategy, J. Vis. Commun. Image R., (2015), 28, 60–70.
  • [2] Furon, T., A survey of watermarking security, International workshop on digital watermarking, Lecture notes on computer science, (2005), Vol. 3710, Springer, 201–215.
  • [3] Fridrich, J., Steganography in digital media: Principles, algorithms, and applications, Cambridge University Press, 2005.
  • [4] Yang, C.H., Lin, Y.C., Fractal curves to improve the reversible data embedding for VQ-indexes based on locally adaptive coding, J. Vis. Commun. Image Represent. , (2010), 21 (4), 334–342..
  • [5] Bhat, V., Sengupta, I., Das, A., An adaptive audio watermarking based on the singular value decomposition in the wavelet domain, Digital Signal Processing, (2010), 20, 1547–155.
  • [6] Daemen, J., Rijmen, V., The Design of Rijndael: AES-the Advanced Encryption Standard, Springer, 2002.
  • [7] Said, A., Pearlman, W.A., A new, fast, and efficient image codec based on set partitioning in hierarchical trees, IEEE Trans Circuits Syst Video Technol, (1996), 6, 243–250.
  • [8] Shropshire, J., Warkentin, M., Sharma, S., Personality, attitudes, and intentions: Predicting initial adoption of information security behavior, Computers & Security, (2015), Volume 49, 177-191.
  • [9] Dogan, S., A reversible data hiding scheme based on graph neigbourhood degree, Journal of Experimental & Theoretical Artifical Intelligence, (2017), 29 (4), 741-753.
  • [10] Chen, B., Design and analysis of digital watermarking, information embedding, and data hiding systems, Ph.D. dissertation, MIT, Cambridge, MA, June 2000.
  • [11] Celik, M.U., Sharma, G., Tekalp, A.M., Sable, E., Lossless generalized-LSB data embedding, IEEE Trans. Image Process. (2005), 14 (2), 253–266.
  • [12] Lin, Y. K., A data hiding scheme based upon DCT coefficient modification, Computer Standards & Interfaces, (2014), Volume 36, Issue 5, 855-862.
  • [13] Liu, Y., Zhao, J., A new video watermarking algorithm based on 1D DFT and Radon transform, Signal Processing, (2010), Volume 90, Issue 2, 626-639.
  • [14] Lee, S. H., DWT based coding DNA watermarking for DNA copyright protection, Information Sciences, (2014), 273, 263-286,.
  • [15] Vaishnavi, D., Subashini, T.S., Robust and Invisible Image Watermarking in RGB Color Space Using SVD, Procedia Computer Science, 2015, Volume 46, 1770-1777.
  • [16] Tanchenko, A., Visual-PSNR measure of image quality, J. Vis. Commun. Image R., (2014), 25,874–878.
  • [17] A-Eldayem, M. M., A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine, Egyptian Informatics Journal, (2013), 14,1–13.
  • [18] Wang, C. C., Chang, Y. F., Chang, C. C., Jan, J. K., Lin, C. C., A high capacity data hiding scheme for binary images based on block patterns, The Journal of Systems and Software, (2014), 93, 152–162.
  • [19] Lin, C.C., Tsai, W.H., Secret image sharing with steganography and authentication, Journal of System and Software, (2004), 73: 405-414.
  • [20] Yang, C.N., Chen, T.S., Yu, K.H., Wang C.C., Improvements of image sharing with steganography and authentication, Journal of System and Software, (2007), 80, 1070-1076.
  • [21] Chang, C.C., Hsieh, Y.P., Lin, C.H., Sharing secrets in stego images with authentication. Pattern Recognition, (2008), 41 (10), 3130-3137.
  • [22] Eslami, Z., Ahmadabadi, J.Z., Secret image sharing with authentication-chaining and dynamic embedding, Journal of System and Software, (2011), 84, 803-809.
  • [23] Wu, W.-C., Lin, Z.-W., SVD-based self-embedding image authentication scheme using quick response code features, Journal of Visual Communication and Image Representation, (2016), 38, 18-28.
Toplam 23 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Elektrik Mühendisliği
Bölüm Araştırma Makalesi
Yazarlar

Türker Tuncer

Yasin Sönmez Bu kişi benim

Yayımlanma Tarihi 30 Kasım 2017
Yayımlandığı Sayı Yıl 2017 Cilt: 7 Sayı: 2

Kaynak Göster

APA Tuncer, T., & Sönmez, Y. (2017). BLOCK BASED DATA HIDING METHOD FOR IMAGES. European Journal of Technique (EJT), 7(2), 85-95.

All articles published by EJT are licensed under the Creative Commons Attribution 4.0 International License. This permits anyone to copy, redistribute, remix, transmit and adapt the work provided the original work and source is appropriately cited.Creative Commons Lisansı