Copyright protection of images on a social network

被引:0
作者
Kedmenec, Luka [1 ]
Poljicak, Ante [1 ]
Mandic, Lidija [1 ]
机构
[1] Univ Zagreb, Fac Graph Arts, Zagreb 41000, Croatia
来源
2014 56TH INTERNATIONAL SYMPOSIUM ELMAR (ELMAR) | 2014年
关键词
Steganography; DCT; Social Networks; Copyright protection; DWT;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper we developed a steganographic method for image protection on Facebook social network. The method hides additional information such as a logo or serial number. Uploading the images on the social network has induced image degradation on the original images. Based on the analysis of this attack we developed a method based on the discrete cosine transform - DCT where additional information is hidden by modifying the coefficients in the cosine domain. The method was evaluated and it is shown that bit error rate (BER) for different attacks was below 1%.
引用
收藏
页码:179 / 182
页数:4
相关论文
共 14 条
[1]  
Alvarez P., 2004, INT J DIGITAL EVIDEN, V2, P1
[2]  
Bamatraf A., 2010, 2010 International Conference on Computer Applications and Industrial Electronics (ICCAIE), P155, DOI 10.1109/ICCAIE.2010.5735066
[3]   A new robust reference watermarking scheme based on DWT-SVD [J].
Bhatnagar, Gaurav ;
Raman, Balasubramanian .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) :1002-1013
[4]   Lossless generalized-LSB data embedding [J].
Celik, MU ;
Sharma, G ;
Tekalp, AM ;
Saber, E .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2005, 14 (02) :253-266
[5]   Digital image steganography: Survey and analysis of current methods [J].
Cheddad, Abbas ;
Condell, Joan ;
Curran, Kevin ;
Mc Kevitt, Paul .
SIGNAL PROCESSING, 2010, 90 (03) :727-752
[6]  
Cox IJ, 2008, MKS MULTIMED INFORM, P1
[7]  
Dey Sandipan, 2007, 2007 3rd International Symposium on Information Assurance and Security, P101
[8]  
Hashad A. I., 2005 INT C INF COMM, P255
[9]   Efficient General Print-Scanning Resilient Data Hiding Based on Uniform Log-Polar Mapping [J].
Kang, Xiangui ;
Huang, Jiwu ;
Zeng, Wenjun .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (01) :1-12
[10]   Digital Image Authentication From JPEG Headers [J].
Kee, Eric ;
Johnson, Micah K. ;
Farid, Hany .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :1066-1075