A novel approach for data hiding based on combined application of discrete cosine transform and coupled chaotic map

Author(s):  
Rajwinder Kaur ◽  
Butta Singh
2021 ◽  
Author(s):  
Juan Zhao ◽  
Zhitang Li

This paper presents a two-dimensional histogram shifting technique for reversible data hiding algorithm. In order to avoid the distortion drift caused by hiding data into stereo H.264 video, we choose arbitrary embeddable blocks from 4×4 quantized discrete cosine transform luminance blocks which will not affect their adjacent blocks. Two coefficients in each embeddable block are chosen as a hiding coefficient pair. The selected coefficient pairs are classified into different sets on the basis of their values. Data could be hidden according to the set which the value of the coefficient pair belongs to. When the value of one coefficient may be changed by adding or subtracting 1, two data bits could be hidden by using the proposed method, whereas only one data bit could be embedded by employing the conventional histogram shifting. Experiments show that this two-dimensional histogram shifting method can be used to improve the hiding performance.


2007 ◽  
Vol 22 (4) ◽  
pp. 347-362 ◽  
Author(s):  
Faisal T. Alturki ◽  
Ali F. Almutairi ◽  
Russell M. Mersereauu

2011 ◽  
Vol 268-270 ◽  
pp. 1697-1700
Author(s):  
Jun Jie Wang ◽  
Qian Mo ◽  
Dong Xia Mei ◽  
Su Li

An image watermarking algorithm using Least Significant Bit is presented. Firstly, Logistic chaotic map is utilized to generate embedding bits for the watermark. Then, the discrete cosine transform is performed on the host image, and the hiding bit is embedded in the coefficient of discrete cosine transform by replacing Least Significant Bit, which causes minimal distortion of the host image.The original host image is not required when extracting the watermark . Experimental results show that the watermarked image almost has no difference from the original host image, and the quality of the extracted image is satisfying, the capacity of this algorithm is high. This algorithm is robust to many attacks, such as noise attack, JPEG Compression attack. Introduction


Sign in / Sign up

Export Citation Format

Share Document