Abstract
We evaluated the resistance of image compression for the zero-watermarking-type steganography which proposed by us in 2005. As a result, even if we compressed to 1/100 of an original image, it still can extract its watermark information with an accuracy of 99 % or more. We also proposed a new type of sparse filtering for low-frequency spatial extraction, and confirmed its performance by computational experiments. Finally, we mentioned a study on the relevance of the proposed filter and biological visual systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Liu, R., Tan, T.: An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimedia 4(1), 121–128 (2002)
Lancini, R., Mapelli, F., Tubaro, S.: A robust video watermarking technique in the spatial domain. In: VIPromCom-2002, 4th EURASIP, pp. 251–256 (2002)
Suhail, M.A., Obaidat, M.S.: Digital watermarking-based DCT and JPEG model. IEEE Trans. Instrum. Measur. 52(5), 1640–1647 (2003)
Nikolaidis, A., Pitas, I.: Asymptotically optimal detection for additive watermarking in the DCT and DWT domains. IEEE Trans. Image Process. 12(5), 563–571 (2003)
Bao, P., Ma, X.: Image adaptive watermarking using wavelet domain singular value decomposition. IEEE Trans. Circ. Syst. Video Technol. 15(1), 96–102 (2005)
Chen, N., Zhu, J.: A robust zero-watermarking algorithm for audio. EURASIP J. on Adv. Sig. Procession 2008, 1–7 (2008)
Cheddad, A., Condell, J., Curran, K., Kevitt, P.M.: Digital image steganography: survey and analysis of current methods. Signal Process. 1, 727–752 (2010)
Zhang, L., Cai, P., Tian, X., Xia, S.: A novel zero-watermarking algorithm based on DWT and Edge detection. In: 4th International Congress on Image and Signal Processing (2011)
Han, S.C., Zhang, Z.N.: A novel zero-watermark algorithm based on LU decomposition in NSST domain. In: ICSP 2012, pp.1592–1596 (2012)
Ishizuka, H., Nishioka, T., Hasegawa, T., Tsurumaru, T.: An Evaluation of a Digital Steganographic Method(ANGO). In: SCIS 2005 (2005) (in Japanese)
Chanu, Y.J., Singh, K.M., Tuithung, T.: Image steganography and steganalysis: a survey. Int. J. Comput. Appl. 52(2), 1–11 (2012)
Raja, K.B., Sindhu, S., Mahalakshmi, T.D., Akshatha, S., Nithin, B.K., Sarvajith, M., Venugopal, K.R., Patnaik, L.M.: Robust image adaptive steganography using integer wavelets. In: Communication System Software and Middleware and Workshops (COMSWARE), pp. 614–621 (2008)
Hashad, A.I., Madani, A.S., Wahdan, A.E.M.A.: A robust steganography techniquie using discrete cosine transform insertion. In: Proceedings of IEEE/ITI, pp. 255–264 (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Ishizuka, H., Echizen, I., Iwamura, K., Sakurai, K. (2015). Evaluation of a Zero-Watermarking-Type Steganography. In: Shi, YQ., Kim, H., Pérez-González, F., Yang, CN. (eds) Digital-Forensics and Watermarking. IWDW 2014. Lecture Notes in Computer Science(), vol 9023. Springer, Cham. https://doi.org/10.1007/978-3-319-19321-2_47
Download citation
DOI: https://doi.org/10.1007/978-3-319-19321-2_47
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19320-5
Online ISBN: 978-3-319-19321-2
eBook Packages: Computer ScienceComputer Science (R0)