Histogram Preserving QIM-Based Watermarking

作者: Chang-Tsun Li , Yue Li , None

DOI:

关键词:

摘要: Quantisation-based watermarking schemes are known to be strongly robust noise and widely applied for image authentication. However, such tend create specific patterns in the histogram of watermarked image, thus opening security gap analysis attack. As such, a secure quantisation-based scheme should preserving. That is say original statistical characteristics preserved image. In this paper, we propose preserving quantisation index modulation (HPQIM)-based watermarking, which can preserve after watermark embedding. This originates from (QIM)-based scheme, but highly increases QIM-based schemes. Meanwhile, proposed HPQIM-based also achieve lower embedding distortion than

参考文章(26)
S. Grgic, M. Mrak, M. Grgic, B. Zovko-Cihlar, Comparative study of JPEG and JPEG2000 image coders international conference on applied electromagnetics and communications. pp. 109- 112 ,(2003) , 10.1109/ICECOM.2003.1290966
P. Moulin, A. Briassouli, A stochastic QIM algorithm for robust, undetectable image watermarking international conference on image processing. ,vol. 2, pp. 1173- 1176 ,(2004) , 10.1109/ICIP.2004.1419513
Jan Tobochnik, Harvey Gould, Julia Berrisford, An Introduction to Computer Simulation Methods: Applications to Physical Systems ,(2006)
A.T.S. Ho, Feng Shu, A robust spread-spectrum watermarking method using two-level quantization international conference on image processing. ,vol. 2, pp. 725- 728 ,(2004) , 10.1109/ICIP.2004.1419400
J. E. Vila-Forcén, S. Voloshynovskiy, O. Koval, T. Pun, Performance analysis of nonuniform quantization-based data hiding conference on security steganography and watermarking of multimedia contents. ,vol. 6072, pp. 354- 361 ,(2006) , 10.1117/12.642148
Jessica Fridrich, Miroslav Goljan, Dorin Hogea, New methodology for breaking steganographic techniques for JPEGs electronic imaging. ,vol. 5020, pp. 143- 155 ,(2003) , 10.1117/12.473142
Chang-Tsun Li, Yinyin Yuan, Digital watermarking scheme exploiting nondeterministic dependence for image authentication Optical Engineering. ,vol. 45, pp. 127001- ,(2006) , 10.1117/1.2402932
B. R. Matam, David Lowe, Watermark-Only Security Attack on DM-QIM Watermarking International Journal of Digital Crime and Forensics. ,vol. 2, pp. 64- 87 ,(2010) , 10.4018/JDCF.2010040105
Andrew D. Ker, Locally Square Distortion and Batch Steganographic Capacity International Journal of Digital Crime and Forensics. ,vol. 1, pp. 29- 44 ,(2009) , 10.4018/JDCF.2009010102