Abstract
This paper proposes a data hiding scheme composed of a synchronization technique by using content of the image and a DCT payload embedding method. The position of the center of gravity of each Delaunay triangle is embedded inside the red channel of the corresponding triangle. This information called synchronization information is afterward decoded robustly by fast correlation attacks used commonly in cryptanalysis. The synchronization information is used to recover the affine transform that has been done on the image. The best merit of correlation attack is its powerful error-correcting ability which can be used not only to get rid of false position information caused by a few missed or imagined features, but also to obtain enough error-free synchronization information in spite of the feature points undergoing geometry transformations. A DCT-based algorithm is used to embed secret messages in the blue channel of the image. The paper also explicitly analyses the channel noise model so as to provide a basis on which some important parameters used in fast correlation attacks are designed. Simulation results show that our data-hiding scheme is highly robust to geometrical distortions including RST and most of affine transformations, and common signal processing such as JPEG compression.
This work was supported by the National Natural Science Foundation of China (60673082,90204013), and Special Funds of Authors of Excellent Doctoral Dissertation in China(200084).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bas, P., Chassery, J.M., Macq, B.: Geometrically invariant watermarking using feature points. IEEE Trans. on Image Processing 11(9), 1014–1028 (2002)
Xue, G., Lu, P.: A counter-geometric distortions data hiding scheme using double channels in color images. In: Cox, I., Kalker, T., Lee, H.-K. (eds.) IWDW 2004. LNCS, vol. 3304, pp. 33–44. Springer, Heidelberg (2005)
Dong, P., Brankov, J.G.: Digital watermarking robust to geometric distortions. IEEE Trans. on Image Processing 14(12), 2140–2150 (2005)
Kang, X., Huang, J., Shi, Y.Q., et al.: A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans. Circuits Syst. Video Technol. 13(8), 776–785 (2003)
Harris, C., Stephen, M.: A combined corner and edge detector. In: Proc. of the 4th Alvey Vision Conf., pp.147–151 (1988)
Lowe, D.G.: Distinctive image features from scale-invariant keypoints. Int. J. Compute Vision 60, 99–110 (2004)
Siegenthaler, T.: Decrypting a class of stream ciphers using ciphertext only. IEEE Trans. on Comput. 34, 81–85 (1985)
Chose, P., Joux, A., Mitton, M.: Fast correlation attacks: an algorithmic point of view. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 76–88. Springer, Heidelberg (2002)
Mitchell, D.P., Netravali, A.N.: Reconstruction filters in computer graphics, Computer Graphics. Proceedings of SIGGRAPH 22(4), 221–228 (1988)
Lin, C.Y., Wu, M., Bloom, J.A., et al.: Rotation, scale, and translation resilient watermarking for images. IEEE Trans. on image Processing 10(5), 767–782 (2001)
Pereira, S., Pun, T.: Robust template matching for affine resistant image watermarks. IEEE Trans. Image Process. 9(6), 1123–1129 (2000)
Dong, P., Brankov, J., Galatsanos, N., Yang, Y.: Geometric robust watermarking based on a new mesh model correction approach. In: Proc. IEEE Int. Conf. Image Processing, pp. 493–496 (June 2002)
Hernández, J.R., Amado, M., Perez, F.: DCT-Domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Trans. on Image Processing 9(1), 55–68 (2000)
Petitcolas, F.: Stirmark4.0, [Online] (2006), http://www.cl.cam.ac.uk/users/fapp2/watermarking/stirmark/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lu, P., Wang, D. (2007). A Geometrical Robust Image Data Hiding Scheme Using FCA-Based Resynchronization. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds) Information Hiding. IH 2007. Lecture Notes in Computer Science, vol 4567. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77370-2_18
Download citation
DOI: https://doi.org/10.1007/978-3-540-77370-2_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77369-6
Online ISBN: 978-3-540-77370-2
eBook Packages: Computer ScienceComputer Science (R0)