Transform Domain Techniques for Image Steganography

Author(s):  
Siddharth Singh ◽  
Tanveer J. Siddiqui

Recent advancement of multimedia technology has posed serious challenges to copyright protection, ownership, and integrity of digital data. This has made information security techniques a vital issue. Cryptography, Steganography, and Watermarking are three major techniques for securing information and ensuring copyright ownership. This chapter presents an overview of transform domain techniques for image steganography. The authors discuss the characteristics and applications of image steganography and briefly review Discrete Cosine and Wavelet transform-based image steganography techniques. They also discuss the various metrics that have been used to assess the performance of steganography techniques and shed light on the future of steganography.

2018 ◽  
pp. 170-186 ◽  
Author(s):  
Siddharth Singh ◽  
Tanveer J. Siddiqui

Recent advancement of multimedia technology has posed serious challenges to copyright protection, ownership, and integrity of digital data. This has made information security techniques a vital issue. Cryptography, Steganography, and Watermarking are three major techniques for securing information and ensuring copyright ownership. This chapter presents an overview of transform domain techniques for image steganography. The authors discuss the characteristics and applications of image steganography and briefly review Discrete Cosine and Wavelet transform-based image steganography techniques. They also discuss the various metrics that have been used to assess the performance of steganography techniques and shed light on the future of steganography.


Author(s):  
Hiroaki Date ◽  
Satoshi Kanai ◽  
Takeshi Kishinami

Abstract Recently, much interest is being taken in a method to protect the copyright of digital data and prevent illegal duplication of it. However, in the area of CAD/CAM and CG, there are no effective ways to protect the copyright of the 3D geometric models. As a first step to solve this problem, a new digital watermarking method for 3D polygonal models is introduced in this paper. Watermarking is one of the copyright protection methods where an invisible watermark is secretly embedded into the original data. The proposed watermarking method is based on the wavelet transform (WT) and multi-resolution representation (MRR) of the polygonal model. The watermark can be embedded in the large wavelet coefficient vectors at various resolution levels of the MRR. This makes the embedded watermark imperceptible and invariant to the affine transformation, and also makes the control of the geometric error caused by the watermarking reliable.


Author(s):  
V. Santhi ◽  
D. P. Acharjya

Advances in technologies facilitate the end users to carry out unauthorized manipulation and duplication of multimedia data with less effort. Because of these advancements, the two most commonly encountered problems are (1) copyright protection and (2) unauthorized manipulation of multimedia data. Thus a scheme is required to protect multimedia data from those two above said problems. Digital Watermarking is considered as one of the security mechanisms to protect copyrights of multimedia data. The literature review reveals that the calculation of scaling and embedding parameters are not completely automated. In order to automate the procedure of calculating scaling and embedding parameters the computational intelligence need to be incorporated in the watermarking algorithm. Moreover the quality of the watermarked images could also be preserved by combining computational intelligence concepts. Thus watermarking schemes utilizing computational intelligence concepts could be called as intelligence based watermarking schemes and it is presented in this chapter in detail.


Author(s):  
Chitra A. Dhawale ◽  
Naveen D. Jambhekar

Digital data transmitted over the insecure communication can be prone to attacks. Intruders try various attacks to unauthorized access of the confidential information. The Steganography is such as security system that provide the protection to the images, text and other type of data digitally transferred through the data communication network. This chapter elaborates the basics of Digital Image Steganographic techniques from ancient era to digital edge, types of images used for the steganography, payload used for the steganography, various attacks and different algorithms that can provide the information security. The performance analysis of the various Digital Image Steganographic algorithms are discussed. The current applications and their necessities are discussed in this chapter.


2020 ◽  
Vol 24 (3) ◽  
Author(s):  
Ariel Rodriguez Mendez ◽  
Clara Cruz Ramos ◽  
Rogelio Reyes Reyes ◽  
Volodymyr Ponomaryov

Biometrics ◽  
2017 ◽  
pp. 1483-1505
Author(s):  
V. Santhi ◽  
D. P. Acharjya

Advances in technologies facilitate the end users to carry out unauthorized manipulation and duplication of multimedia data with less effort. Because of these advancements, the two most commonly encountered problems are (1) copyright protection and (2) unauthorized manipulation of multimedia data. Thus a scheme is required to protect multimedia data from those two above said problems. Digital Watermarking is considered as one of the security mechanisms to protect copyrights of multimedia data. The literature review reveals that the calculation of scaling and embedding parameters are not completely automated. In order to automate the procedure of calculating scaling and embedding parameters the computational intelligence need to be incorporated in the watermarking algorithm. Moreover the quality of the watermarked images could also be preserved by combining computational intelligence concepts. Thus watermarking schemes utilizing computational intelligence concepts could be called as intelligence based watermarking schemes and it is presented in this chapter in detail.


2018 ◽  
Vol 3 (1) ◽  
pp. 75-79
Author(s):  
Harith Raad Hasan

This paper proposes a copyright protection system for digital certificate image using blind watermarking technique by applying discrete wavelet transform algorithm (DWT). The proposed technique utilizes three interrelated watermarks namely, Red watermark (RW), Green-watermark (GW) and Blue-watermark (BW). Firstly, RGB cover and RGB watermark image are divided for three color space R,G,B. Then the R component is chosen for embedding (RW), the B component is selected for embedding the (BW) and the G component is selected for embedding the (GW), R,G and B of the cover image are converted into the transform domain using DWT, and is subsequently decomposed into three levels viz.  LH1, LL2 and LL3 sub-bands. RW, GW and BW are then embedded onto LL3. Experimental results show that the performance of the proposed technique is very encouraging with average PSNR of 44 db, and NCC value of more than 0.99 for extracted watermarks after performing several types of attacks.


2008 ◽  
Vol 17 (01) ◽  
pp. 107-122 ◽  
Author(s):  
MOHAMED S. YASEIN ◽  
PAN AGATHOKLIS

In this paper, an algorithm for data embedding in images is proposed. The algorithm is based on using the Discrete Wavelet Transform domain to embed digital data into images. In order to increase the algorithm robustness and ensure the authentication of the data extracted, error detection/correction coding techniques are used to encode the embedded data. The proposed algorithm is blind, i.e., the embedded data are extracted and authenticated without any reference to the original image or data. Experimental results demonstrate the low perceptibility of distortions caused by the data embedding and the high algorithm robustness against several common image-processing operations.


Cryptography ◽  
2020 ◽  
pp. 332-354
Author(s):  
Chitra A. Dhawale ◽  
Naveen D. Jambhekar

Digital data transmitted over the insecure communication can be prone to attacks. Intruders try various attacks to unauthorized access of the confidential information. The Steganography is such as security system that provide the protection to the images, text and other type of data digitally transferred through the data communication network. This chapter elaborates the basics of Digital Image Steganographic techniques from ancient era to digital edge, types of images used for the steganography, payload used for the steganography, various attacks and different algorithms that can provide the information security. The performance analysis of the various Digital Image Steganographic algorithms are discussed. The current applications and their necessities are discussed in this chapter.


Sign in / Sign up

Export Citation Format

Share Document