A High-performance information hiding algorithm based on CL multi-wavelet transform and DCT

被引:0
作者
Ren, Shuai [1 ]
Zhang, Tao [2 ]
机构
[1] School of Information Engineering, Chang'an University
[2] College of Automation, Northwestern Polytechnical University
关键词
Algorithms; Chebyshev scrambling; CL multi-wavelet transform; Discrete cosine transform; Genetic algorithm; Information hiding (IH); Wavelet transforms;
D O I
10.4156/ijact.vol4.issue8.17
中图分类号
学科分类号
摘要
Taking advantage of the feature that the energy of the image would gather and spread on four components (LL 2, LH 2, HL 2 and HH 2) in the sub-image after first-order CL multi-wavelet transform, and Using the advantage of Discrete Cosine Transform in application of information hiding, propose an Information Hiding scheme based on CL multi-wavelet transform and Discrete Cosine Transform (abbreviated as CL-DCT). LL 2 is embedded module of robust parameters (including parity check code of RAID4, optimized code of Chebyshev scrambling and Hash value of embedding information). Embed hiding Information in LH 2 and HL 2 with RAID4 and fragile sign in HH2. Select a different range of DCT coefficients in LH 2, HL 2 and HH 2. Experimental results indicate that the proposed scheme can increase invisibility and robustness separately by 4.71% and 30.26% averagely. In particular, the scheme has better ability against cutting attacks. The scheme has certain ability against steganalysis such as Higher Order Statistics based on wavelet coefficients. Moreover, the scheme has excellent sensitivity of image processing.
引用
收藏
页码:137 / 144
页数:7
相关论文
共 11 条
[1]  
Abed F.S., Mustafa N.A.A., A proposed Technique for Information Hiding Based on DCT, IJACT:International Journal of Advancements in Computing Technology, 2, 5, pp. 140-152, (2010)
[2]  
Anuradha L.K., Palette Based Technique for Image Steganography, Proceedings of International Conference on Advances in Computing, Communication and Control(ICAC3 2011), pp. 364-371, (2011)
[3]  
Sun X., Robust adaptive image watermarking using visual models in DWT and DCT domain, Information Technology Journal, 9, 3, pp. 460-466, (2010)
[4]  
Wei L., Wei S., Hong-tao L., Robust watermarking based on DWT and nonnegative matrix factorization, Computers and Electrical Engineering, 35, 1, pp. 183-188, (2009)
[5]  
Run R.-S., Horng S.-J., Lai J.-L., Kao T.-W., Chen R.-J., An improved SVD-based watermarking technique for copyright protection, Expert Systems with Applications, 39, 1, pp. 673-689, (2011)
[6]  
Chui C.K., Lian J.A., A Study of orthonormal multi-wavelets, Applied Numerical Mathematics, 20, 3, pp. 273-298, (1996)
[7]  
Jun H.Z., Zheng-ming M., Statistical Analysis of Multiwavelet Image Transform, Journal of Image and Graphics, 12, 6 A, pp. 1198-1203, (2001)
[8]  
Zhang T., De-jun M., Ren S., Information hiding (IH) Algorithm Based on Gaussian Pyramid and GHM (Geronimo Hardin Massopust) Multi-wavelet Transformation, JDCTA: International Journal of Digital Content Technology and Its Applications, 5, 3, pp. 210-218, (2011)
[9]  
Goldberg D.E., Genetic, Algorithms in Search, Optimization, and Machine Learning, pp. 237-251, (2007)
[10]  
Hany F., Siwei L., Higher-order Wavelet Statistics and their Application to Digital Forensics, IEEE Workshop on Statistical Analysis in Computer Vision, 8, (2003)