Abstract
Based on the Beta elliptic Modeling, a new signature steganography color document image system is proposed in this paper. This system uses the Binary Robust Invariant Scalable Keypoint (BRISK) detector to obtain the potential feature points used for constructing the embedding regions. The Beta elliptic signature is transformed into a secret message bits representation using the Huffman Coding (HC) to increase the performance of our system. Then, the secret message bits are divided into three sub message bits \(\mathrm{m}_\mathrm{R}\), \(\mathrm{m}_\mathrm{G}\), and \(\mathrm{m}_\mathrm{B}\), using the weights \(\upalpha _\mathrm{R}\), \(\upalpha _\mathrm{G}\), and \(\upalpha _\mathrm{B}\), respectively. Finally, each sequence bits is embedded into the corresponding channel, red (R), green (G), and blue (B) by modifying the first Least Significant Bit (LSB) of the embedding regions pixels. The robustness evaluation, quantitative and qualitative experimental results on multiple datasets: L3iDocCopies, LRDE Document Binarization Dataset, and on standard test images, demonstrates that the proposed color document images steganography system in the spatial domain maintains a better visual quality measured by Peak Signal to Noise Ratio (PSNR), Structural Similarity Index Matrix (SSIM), and Human Visual System (HSV) metrics, with relatively less computational complexity, which approves its effectiveness as compared to existing systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abdulrahman, A.K., Ozturk, S.: A novel hybrid DCT and DWT based robust watermarking algorithm for color images. Multimed. Tools Appl. 78, 17027–17049 (2019)
Abraham, J., Paul, V.: An imperceptible spatial domain color image watermarking scheme. J. King Saud Univ.-Comput. Inf. Sci. (2016)
Al-Haj, A., Barouqa, H.: Copyright protection of e-government document images using digital watermarking. In: 2017 3rd International Conference on Information Management (ICIM), pp. 441–446. IEEE (2017)
Bezine, H., Alimi, A.M., Derbel, N.: Handwriting trajectory movements controlled by a beta-elliptic model. In: Proceedings of the Seventh International Conference on Document Analysis and Recognition, p. 1228. IEEE (2003)
Burie, J.C., Ogier, J.M., Loc, C.V.: A spatial domain steganography for grayscale documents using pattern recognition techniques. In: 2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR), vol. 9, pp. 21–26. IEEE (2017)
Dhieb, T., Njah, S., Boubaker, H., Ouarda, W., Ayed, M.B., Alimi, A.M.: An online writer identification system based on beta-elliptic model and fuzzy elementary perceptual codes. arXiv preprint arXiv:1804.05661 (2018)
Dhieb, T., Ouarda, W., Boubaker, H., Alimi, A.M.: Beta-elliptic model forwriter identification from online arabic handwriting. J. Inf. Assur. Secur. 11(5), 263–272 (2016)
Dhieb, T., Ouarda, W., Boubaker, H., Halima, M.B., Alimi, A.M.: Online Arabic writer identification based on beta-elliptic model. In: ISDA, pp. 74–79 (2015)
García-Soto, R., Hernández-Anaya, S., Nakano-Miyatake, M., Rosales-Roldan, L., Perez-Meana, H.: Sender verification system for official documents based on watermarking technique. In: 2013 10th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE), pp. 227–232. IEEE (2013)
Gonge, S.S., Ghatol, A.A.: Combined DWT-DCT digital watermarking technique software used for CTS of bank. In: 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), pp. 776–783. IEEE (2014)
Hamdani, M., El Abed, H., Kherallah, M., Alimi, A.M.: Combining multiple HMMS using on-line and off-line features for off-line Arabic handwriting recognition. In: 10th International Conference on Document Analysis and Recognition (ICDAR 2009), pp. 201–205. IEEE (2009)
Huffman, D.A.: A method for the construction of minimum-redundancy codes. Proc. IRE 40(9), 1098–1101 (1952)
Jarraya, I., Ouarda, W., Alimi, A.M.: Deep neural network features for horses identity recognition using multiview horses’ face pattern. In: Ninth International Conference on Machine Vision (ICMV 2016), vol. 10341, p. 103410B. International Society for Optics and Photonics (2017)
Lazzez, O., Ouarda, W., Alimi, A.M.: Age, gender, race and smile prediction based on social textual and visual data analyzing. In: Madureira, A.M., Abraham, A., Gamboa, D., Novais, P. (eds.) ISDA 2016. AISC, vol. 557, pp. 206–215. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-53480-0_21
Lazzez, O., Ouarda, W., Alimi, A.M.: Understand me if you can! Global soft biometrics recognition from social visual data. In: Abraham, A., Haqiq, A., Alimi, A.M., Mezzour, G., Rokbani, N., Muda, A.K. (eds.) HIS 2016. AISC, vol. 552, pp. 527–538. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-52941-7_52
Leutenegger, S., Chli, M., Siegwart, R.Y.: BRISK: binary robust invariant scalable keypoints. IEEE (2011)
Li, J., Yu, C., Gupta, B., Ren, X.: Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimed. Tools Appl. 77(4), 4545–4561 (2018)
Ltaief, M., Bezine, H., Alimi, A.M.: A neuro-beta-elliptic model for handwriting generation movements. In: 2012 International Conference on Frontiers in Handwriting Recognition (ICFHR 2012), pp. 803–808. IEEE (2012)
Muhammad, K., Ahmad, J., Rehman, N.U., Jan, Z., Sajjad, M.: CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multimed. Tools Appl. 76(6), 8597–8626 (2017)
Munib, S., Khan, A.: Robust image watermarking technique using triangular regions and Zernike moments for quantization based embedding. Multimed. Tools Appl. 76(6), 8695–8710 (2017)
Nasri, H., Ouarda, W., Alimi, A.M.: ReLiDSS: novel lie detection system from speech signal. In: 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), pp. 1–8. IEEE (2016)
Nissim, N., Cohen, A., Elovici, Y.: ALDOCX: detection of unknown malicious microsoft office documents using designated active learning methods based on new structural feature extraction methodology. IEEE Trans. Inf. Forensics Secur. 12(3), 631–646 (2016)
Ouarda, W., Trichili, H., Alimi, A.M., Solaiman, B.: Bag of face recognition systems based on holistic approaches. In: 2015 15th International Conference on Intelligent Systems Design and Applications (ISDA), pp. 201–206. IEEE (2015)
Ouarda, W., Trichili, H., Alimi, A.M., Solaiman, B.: Towards a novel biometricsystem for smart riding club. J. Inf. Assur. Secur. 11(4), 201–213 (2016)
Pandey, M.K., Parmar, G., Gupta, R., Sikander, A.: Non-blind Arnold scrambled hybrid image watermarking in YCbCr color space. Microsyst. Technol., 1–11 (2018)
Patvardhan, C., Kumar, P., Lakshmi, C.V.: Effective color image watermarking scheme using YCbCr color space and QR code. Multimed. Tools Appl., 1–23 (2018)
Pham, V.Q., Miyaki, T., Yamasaki, T., Aizawa, K.: Geometrically invariant object-based watermarking using SIFT feature. In: 2007 IEEE International Conference on Image Processing, vol. 5, pp. V–473. IEEE (2007)
Prasad, V., Dhavale, S.: H. 264/AVC video protection model based on private cloud for military organisation. In: 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT), pp. 1–9. IEEE (2016)
Sejpal, S., Shah, N.: Comparative performance analysis of secured LWT-SVD based color image watermarking technique in YUV, YIQ and YCbCr color spaces. Int. J. Comput. Appl. 147(7), 34–40 (2016)
Su, Q., Chen, B.: Robust color image watermarking technique in the spatial domain. Soft. Comput. 22(1), 91–106 (2018)
Wang, H.: Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks. J. Supercomput. 64(3), 883–897 (2013)
Acknowledgment
The research leading to these results has received funding from the Ministry of Higher Education and Scientific Research of Tunisia under the grant agreement number LR11ES48.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Zenati, A., Ouarda, W., Alimi, A.M. (2020). CDISS-BEMOS: A New Color Document Image Steganography System Based on Beta Elliptic Modeling of the Online Signature. In: Kallel, S., Cuppens, F., Cuppens-Boulahia, N., Hadj Kacem, A. (eds) Risks and Security of Internet and Systems. CRiSIS 2019. Lecture Notes in Computer Science(), vol 12026. Springer, Cham. https://doi.org/10.1007/978-3-030-41568-6_19
Download citation
DOI: https://doi.org/10.1007/978-3-030-41568-6_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-41567-9
Online ISBN: 978-3-030-41568-6
eBook Packages: Computer ScienceComputer Science (R0)