Study of Reversible Information Hiding Scheme Based on CARDBAL2 and Color Field Structure

2011 ◽  
Vol 225-226 ◽  
pp. 275-279
Author(s):  
Shuai Ren ◽  
Tao Zhang

Propose a new image processing method which named Color Field Structure (CFS). The direction of CFS represents the information. Take advantage of the feature that the energy of the image would gather and spread on four components (LL2, LH2, HL2 and HH2) in the sub-image after first-order CARDBAL2 multi-wavelet transform. Propose an Information Hiding Algorithm based on modifying the direction of CFS in four CARDBAL2 first-order sub-images. The maximum change of direction angle is usually less than π/2k. The information is divided into two parts, one part is embedded in LL2 and HH2, and the other part is embedded in LH2 and HL2. Use the Logistic chaotic map, Knight's Tour traversal and the genetic algorithm to improve the consistence of the embedded data bits’ order and the character of the sub-image. Experimental results indicate that the proposed scheme can increase invisibility and robustness separately by 28.64% and 23.06% averagely, and has certain ability against steganalysis such as Higher Order Statistics based on wavelet coefficients. Moreover, the scheme has excellent sensitivity of image processing.

Author(s):  
Masaaki Fujiyoshi ◽  
Hitoshi Kiya

This chapter addresses a new class of Reversible Information Hiding (RIH) and its application to verifying the integrity of images. The method of RIH distorts an image once to hide information in the image itself, and it not only extracts embedded information but also recovers the original image from the distorted image. The well-known class of RIH is based on the expansion of prediction error in which a location map, which indicates the pixel block positions of a certain block category, is required to recover the original image. In contrast, the method described in this chapter is free from having to memorize any parameters including location maps. This feature suits the applications of image authentication in which the integrity of extracted information guarantees that of a suspected image. If image-dependent parameters such as location maps are required, the suspected image should first be identified from all possible images. The method described in this chapter reduces such costly processes.


2013 ◽  
Vol 61 (2) ◽  
pp. 195-203 ◽  
Author(s):  
C-T Huang ◽  
W-J Wang ◽  
C-H Yang ◽  
S-J Wang

Sign in / Sign up

Export Citation Format

Share Document