Abstract
Data hiding plays an important role in privacy protection and authentication, but most data hiding methods fail to achieve satisfactory performance in resisting scaling attacks and additive attacks. To this end, this paper proposes a new quantization index modulation (QIM) variant based on division domains (D-QIM). It can not only resist the above two attacks well, but also adjust the performance trade-offs by controlling the parameters. Simulation results confirm the performance gain of D-QIM in terms of the bit error rate (BER).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Image processing institute (SIPI) database. https://sipi.usc.edu/database/. Accessed 30 Mar 2022
Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)
Chen, B., Wornell, G.W.: Quantization index modulation methods for digital watermarking and information embedding of multimedia. J. VLSI Signal Process. 27(1–2), 7–33 (2001)
Comesaña, P., Pérez-González, F.: On a watermarking scheme in the logarithmic domain and its perceptual advantages. In: Proceedings of the International Conference on Image Processing, ICIP 2007, San Antonio, Texas, USA, 16–19 September 2007, pp. 145–148. IEEE (2007). https://doi.org/10.1109/ICIP.2007.4379113
Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann, San Francisco (2007)
Evsutin, O., Melman, A., Meshcheryakov, R.V.: Digital steganography and watermarking for digital images: a review of current research directions. IEEE Access 8, 166589–166611 (2020). https://doi.org/10.1109/ACCESS.2020.3022779
Huang, Y., Niu, B., Guan, H., Zhang, S.: Enhancing image watermarking with adaptive embedding parameter and PSNR guarantee. IEEE Trans. Multim. 21(10), 2447–2460 (2019)
Hwang, M., Lee, J., Lee, M., Kang, H.: SVD-based adaptive QIM watermarking on stereo audio signals. IEEE Trans. Multim. 20(1), 45–54 (2018)
Kricha, Z., Kricha, A., Sakly, A.: Accommodative extractor for QIM-based watermarking schemes. IET Image Process. 13(1), 89–97 (2019)
Lin, J., Qin, J., Lyu, S., Feng, B., Wang, J.: Lattice-based minimum-distortion data hiding. IEEE Commun. Lett. 25(9), 2839–2843 (2021)
Liu, W., et al.: Secure halftone image steganography with minimizing the distortion on pair swapping. Signal Process. 167 (2020). https://doi.org/10.1016/j.sigpro.2019.107287
Moulin, P., Koetter, R.: Data-hiding codes. Proc. IEEE 93(12), 2083–2126 (2005)
Naderahmadian, Y., Beheshti, S.: Robustness of wavelet domain watermarking against scaling attack. In: 2015 IEEE 28th Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1218–1222 (2015). https://doi.org/10.1109/CCECE.2015.7129451
Ourique, F., Licks, V., Jordan, R., Pérez-González, F.: Angle QIM: a novel watermark embedding scheme robust against amplitude scaling distortions. In: 2005 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2005, Philadelphia, Pennsylvania, USA, 18–23 March 2005, pp. 797–800. IEEE (2005). https://doi.org/10.1109/ICASSP.2005.1415525
Terchi, Y., Bouguezel, S.: A blind audio watermarking technique based on a parametric quantization index modulation. Multimedia Tools Appl. 77(19), 25681–25708 (2018). https://doi.org/10.1007/s11042-018-5813-z
Verma, V., Muttoo, S.K., Singh, V.B.: Enhanced payload and trade-off for image steganography via a novel pixel digits alteration. Multim. Tools Appl. 79(11-12), 7471–7490 (2020). https://doi.org/10.1007/s11042-019-08283-9
Wang, X., Wang, P., Zhang, P., Xu, S., Yang, H.: A blind audio watermarking algorithm by logarithmic quantization index modulation. Multimedia Tools Appl. 71(3), 1157–1177 (2012). https://doi.org/10.1007/s11042-012-1259-x
Acknowledgment
This work was supported in part by the National Natural Science Foundation of China (61902149, 61932010 and 62032009) and the Natural Science Foundation of Guangdong Province (2020A1515010393).
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Yu, S., Qin, J., Deng, J., Lyu, S., Li, F. (2022). Data Hiding in the Division Domain: Simultaneously Achieving Robustness to Scaling and Additive Attacks. In: Wang, Y., Zhu, G., Han, Q., Zhang, L., Song, X., Lu, Z. (eds) Data Science. ICPCSEE 2022. Communications in Computer and Information Science, vol 1629. Springer, Singapore. https://doi.org/10.1007/978-981-19-5209-8_4
Download citation
DOI: https://doi.org/10.1007/978-981-19-5209-8_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-5208-1
Online ISBN: 978-981-19-5209-8
eBook Packages: Computer ScienceComputer Science (R0)