A data hiding technique in JPEG compressed domain

被引:17
作者
Wong, PHW [1 ]
Au, OC [1 ]
Wong, JWC [1 ]
机构
[1] Hong Kong Univ Sci & Technol, Dept Elect & Elect Engn, Hong Kong, Hong Kong, Peoples R China
来源
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III | 2001年 / 4314卷
关键词
D O I
10.1117/12.435412
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
JPEG is a common image format in the world wide web. JPEG-compressed images can be used to hide data for secret internet communication and simply any auxiliary data. In this paper, we propose an algorithm called J-Mark to embed invisible watermark information into JPEG compressed images in the compress domain. There are three parts of J-Mark: block selection, DCT coefficient selection, and modification of selected DCT coefficients. Only the texture blocks with significant masking properties are selected in block selection. Only the DCT coefficients with significant energy in the selected blocks are selected. The watermark data are embedded as the "randomized parity" in the selected DCT coefficients. The embedded data can be recovered perfectly in the compressed domain without fully decoding the JPEG image. Experiment results suggest that the proposed J-Mark can hide the watermarking data without detectable visual artifacts. Although the data hiding capacity differs among images, some parameter of J-Mark can be used to achieve tradeoff between data hiding capacity and visual quality.
引用
收藏
页码:309 / 320
页数:12
相关论文
共 24 条
[1]  
[Anonymous], P SOC PHOTO INSTRUME
[2]  
Bors AG, 1996, INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, PROCEEDINGS - VOL III, P231, DOI 10.1109/ICIP.1996.560426
[3]   Protecting publicly-available images with a visible image watermark [J].
Braudaway, GW ;
Magerlein, KA ;
Mintzer, F .
OPTICAL SECURITY AND COUNTERFEIT DETERRENCE TECHNIQUES, 1996, 2659 :126-133
[4]  
CARONNI G, 1995, P REL IT SYST
[5]  
Choi CH, 1993, P INT C SIGN PROC, V2, P796
[6]   Watermarking by histogram specification [J].
Coltuc, D ;
Bolon, P .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS, 1999, 3657 :252-263
[7]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[8]  
Kim W. G., 1999, P IEEE INT C IM PROC, V2, P205
[9]  
Koch E., 1994, P INT C DIG MED EL P
[10]  
Kwon OH, 1999, ISCAS '99: PROCEEDINGS OF THE 1999 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL 4, P76, DOI 10.1109/ISCAS.1999.779946