Skip to main content

A Geometrical Robust Image Data Hiding Scheme Using FCA-Based Resynchronization

  • Conference paper
Information Hiding (IH 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4567))

Included in the following conference series:

Abstract

This paper proposes a data hiding scheme composed of a synchronization technique by using content of the image and a DCT payload embedding method. The position of the center of gravity of each Delaunay triangle is embedded inside the red channel of the corresponding triangle. This information called synchronization information is afterward decoded robustly by fast correlation attacks used commonly in cryptanalysis. The synchronization information is used to recover the affine transform that has been done on the image. The best merit of correlation attack is its powerful error-correcting ability which can be used not only to get rid of false position information caused by a few missed or imagined features, but also to obtain enough error-free synchronization information in spite of the feature points undergoing geometry transformations. A DCT-based algorithm is used to embed secret messages in the blue channel of the image. The paper also explicitly analyses the channel noise model so as to provide a basis on which some important parameters used in fast correlation attacks are designed. Simulation results show that our data-hiding scheme is highly robust to geometrical distortions including RST and most of affine transformations, and common signal processing such as JPEG compression.

This work was supported by the National Natural Science Foundation of China (60673082,90204013), and Special Funds of Authors of Excellent Doctoral Dissertation in China(200084).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bas, P., Chassery, J.M., Macq, B.: Geometrically invariant watermarking using feature points. IEEE Trans. on Image Processing 11(9), 1014–1028 (2002)

    Article  Google Scholar 

  2. Xue, G., Lu, P.: A counter-geometric distortions data hiding scheme using double channels in color images. In: Cox, I., Kalker, T., Lee, H.-K. (eds.) IWDW 2004. LNCS, vol. 3304, pp. 33–44. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  3. Dong, P., Brankov, J.G.: Digital watermarking robust to geometric distortions. IEEE Trans. on Image Processing 14(12), 2140–2150 (2005)

    Article  Google Scholar 

  4. Kang, X., Huang, J., Shi, Y.Q., et al.: A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans. Circuits Syst. Video Technol. 13(8), 776–785 (2003)

    Article  Google Scholar 

  5. Harris, C., Stephen, M.: A combined corner and edge detector. In: Proc. of the 4th Alvey Vision Conf., pp.147–151 (1988)

    Google Scholar 

  6. Lowe, D.G.: Distinctive image features from scale-invariant keypoints. Int. J. Compute Vision 60, 99–110 (2004)

    Google Scholar 

  7. Siegenthaler, T.: Decrypting a class of stream ciphers using ciphertext only. IEEE Trans. on Comput. 34, 81–85 (1985)

    Article  Google Scholar 

  8. Chose, P., Joux, A., Mitton, M.: Fast correlation attacks: an algorithmic point of view. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 76–88. Springer, Heidelberg (2002)

    Google Scholar 

  9. Mitchell, D.P., Netravali, A.N.: Reconstruction filters in computer graphics, Computer Graphics. Proceedings of SIGGRAPH 22(4), 221–228 (1988)

    Article  Google Scholar 

  10. Lin, C.Y., Wu, M., Bloom, J.A., et al.: Rotation, scale, and translation resilient watermarking for images. IEEE Trans. on image Processing 10(5), 767–782 (2001)

    Article  MATH  Google Scholar 

  11. Pereira, S., Pun, T.: Robust template matching for affine resistant image watermarks. IEEE Trans. Image Process. 9(6), 1123–1129 (2000)

    Article  Google Scholar 

  12. Dong, P., Brankov, J., Galatsanos, N., Yang, Y.: Geometric robust watermarking based on a new mesh model correction approach. In: Proc. IEEE Int. Conf. Image Processing, pp. 493–496 (June 2002)

    Google Scholar 

  13. Hernández, J.R., Amado, M., Perez, F.: DCT-Domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Trans. on Image Processing 9(1), 55–68 (2000)

    Article  Google Scholar 

  14. Petitcolas, F.: Stirmark4.0, [Online] (2006), http://www.cl.cam.ac.uk/users/fapp2/watermarking/stirmark/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lu, P., Wang, D. (2007). A Geometrical Robust Image Data Hiding Scheme Using FCA-Based Resynchronization. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds) Information Hiding. IH 2007. Lecture Notes in Computer Science, vol 4567. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77370-2_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77370-2_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77369-6

  • Online ISBN: 978-3-540-77370-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics