Cart (Loading....) | Create Account
Close category search window
 

Security and Robustness Enhancement for Image Data Hiding

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Ning Liu ; Dept. of Electr. & Comput. Eng., Stevens Inst. of Technol., Hoboken, NJ ; Amin, P. ; Subbalakshmi, K.P.

In many applications, data hiding can be viewed as a tradeoff between capacity, robustness (against attacks), and embedding induced distortion. In this paper, we consider a fourth parameter: the security of the hidden information. Specifically, we propose a hash-based randomized embedding algorithm (HRE) that increases the security of the hidden data. We then optimize this algorithm against JPEG attacks. We derive a mathematical expression for the security of our algorithm, using which we show that the security of our algorithm can be increased independent of capacity, robustness, and embedding induced distortion. The maximum security depends only on the length of the key sequence, which is limited only by the size of the host image. Using a joint security and capacity measure, we show that the proposed scheme performs better than current secure quantization based data hiding schemes. We also derive the optimal value of distortion compensation factor of the HRE algorithm against JPEG compression attack. Experimental results show that the operating points achieved by the proposed scheme are 7 dB better than current blind data hiding schemes against the JPEG attack

Published in:

Multimedia, IEEE Transactions on  (Volume:9 ,  Issue: 3 )

Date of Publication:

April 2007

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.