A blind watermarking algorithm based on HVS applied for covert communication

被引:0
作者
Wei Fang [1 ,2 ]
Liu Jian [1 ]
Cao Hanqiang [3 ]
Yang Jun [1 ,2 ]
机构
[1] Huazhong Univ Sci & Technol, Inst Pattern Recognit & Artificial Intelligence, Wuhan 430074, Peoples R China
[2] Wuhan Inst Technol, Wuhan 430074, Peoples R China
[3] HUST, Dept Elec & Info Eng, Wuhan 430074, Peoples R China
来源
SECOND INTERNATIONAL CONFERENCE ON SPACE INFORMATION TECHNOLOGY, PTS 1-3 | 2007年 / 6795卷
关键词
watermarking; covert communication; HVS; wavelet transform;
D O I
10.1117/12.775014
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
There are two ways for transmitting data in a secure manner: Cryptography and steganography. Digital watermarking is a specific branch of steganography, which can be used in various applications, including covert communication, owner identification, authentication and copy control. In this paper, we proposed a blind adaptive watermarking algorithm based on HVS is proper for covert communication. The secret information that can be seen as a watermarking is hidden into a host image, which can be publicly accessed, so the transportation of the secret information will not attract the attention of illegal receiver. With our approach, the secret information is embedded in the wavelet domain. By the background luminance and the texture mask characters of HVS, we divide the wavelet coefficients of carrier image into different classes. According to the classes of the wavelet coefficients the watermark image is embedded. The result of our experimental shows that this approach is imperceptible and robust some image processing such as JPEG lossy compression, cropping, median filtering, grads sharpening, Gaussian white noise attacks and so on.
引用
收藏
页数:6
相关论文
共 8 条
[1]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[2]  
COX I, 2003, DIGITAL WATERMARKING
[3]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[4]  
COX IJ, 2000, IEEE
[5]   Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications [J].
Craver, S ;
Memon, N ;
Yeo, BL ;
Yeung, MM .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :573-586
[6]   Information hiding - A survey [J].
Petitcolas, FAP ;
Anderson, RJ ;
Kuhn, MG .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1062-1078
[7]   Image-adaptive watermarking using visual models [J].
Podilchuk, CI ;
Zeng, WJ .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :525-539
[8]  
SAFRANEK RJ, 1998, ICASSP89 GLASG, P1945