Skip to main content

Data Hiding in the Division Domain: Simultaneously Achieving Robustness to Scaling and Additive Attacks

  • Conference paper
  • First Online:
Data Science (ICPCSEE 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1629))

  • 773 Accesses

Abstract

Data hiding plays an important role in privacy protection and authentication, but most data hiding methods fail to achieve satisfactory performance in resisting scaling attacks and additive attacks. To this end, this paper proposes a new quantization index modulation (QIM) variant based on division domains (D-QIM). It can not only resist the above two attacks well, but also adjust the performance trade-offs by controlling the parameters. Simulation results confirm the performance gain of D-QIM in terms of the bit error rate (BER).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Image processing institute (SIPI) database. https://sipi.usc.edu/database/. Accessed 30 Mar 2022

  2. Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001)

    Article  MathSciNet  Google Scholar 

  3. Chen, B., Wornell, G.W.: Quantization index modulation methods for digital watermarking and information embedding of multimedia. J. VLSI Signal Process. 27(1–2), 7–33 (2001)

    Article  Google Scholar 

  4. Comesaña, P., Pérez-González, F.: On a watermarking scheme in the logarithmic domain and its perceptual advantages. In: Proceedings of the International Conference on Image Processing, ICIP 2007, San Antonio, Texas, USA, 16–19 September 2007, pp. 145–148. IEEE (2007). https://doi.org/10.1109/ICIP.2007.4379113

  5. Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann, San Francisco (2007)

    Google Scholar 

  6. Evsutin, O., Melman, A., Meshcheryakov, R.V.: Digital steganography and watermarking for digital images: a review of current research directions. IEEE Access 8, 166589–166611 (2020). https://doi.org/10.1109/ACCESS.2020.3022779

  7. Huang, Y., Niu, B., Guan, H., Zhang, S.: Enhancing image watermarking with adaptive embedding parameter and PSNR guarantee. IEEE Trans. Multim. 21(10), 2447–2460 (2019)

    Article  Google Scholar 

  8. Hwang, M., Lee, J., Lee, M., Kang, H.: SVD-based adaptive QIM watermarking on stereo audio signals. IEEE Trans. Multim. 20(1), 45–54 (2018)

    Article  Google Scholar 

  9. Kricha, Z., Kricha, A., Sakly, A.: Accommodative extractor for QIM-based watermarking schemes. IET Image Process. 13(1), 89–97 (2019)

    Article  Google Scholar 

  10. Lin, J., Qin, J., Lyu, S., Feng, B., Wang, J.: Lattice-based minimum-distortion data hiding. IEEE Commun. Lett. 25(9), 2839–2843 (2021)

    Article  Google Scholar 

  11. Liu, W., et al.: Secure halftone image steganography with minimizing the distortion on pair swapping. Signal Process. 167 (2020). https://doi.org/10.1016/j.sigpro.2019.107287

  12. Moulin, P., Koetter, R.: Data-hiding codes. Proc. IEEE 93(12), 2083–2126 (2005)

    Article  Google Scholar 

  13. Naderahmadian, Y., Beheshti, S.: Robustness of wavelet domain watermarking against scaling attack. In: 2015 IEEE 28th Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1218–1222 (2015). https://doi.org/10.1109/CCECE.2015.7129451

  14. Ourique, F., Licks, V., Jordan, R., Pérez-González, F.: Angle QIM: a novel watermark embedding scheme robust against amplitude scaling distortions. In: 2005 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2005, Philadelphia, Pennsylvania, USA, 18–23 March 2005, pp. 797–800. IEEE (2005). https://doi.org/10.1109/ICASSP.2005.1415525

  15. Terchi, Y., Bouguezel, S.: A blind audio watermarking technique based on a parametric quantization index modulation. Multimedia Tools Appl. 77(19), 25681–25708 (2018). https://doi.org/10.1007/s11042-018-5813-z

    Article  Google Scholar 

  16. Verma, V., Muttoo, S.K., Singh, V.B.: Enhanced payload and trade-off for image steganography via a novel pixel digits alteration. Multim. Tools Appl. 79(11-12), 7471–7490 (2020). https://doi.org/10.1007/s11042-019-08283-9

  17. Wang, X., Wang, P., Zhang, P., Xu, S., Yang, H.: A blind audio watermarking algorithm by logarithmic quantization index modulation. Multimedia Tools Appl. 71(3), 1157–1177 (2012). https://doi.org/10.1007/s11042-012-1259-x

    Article  Google Scholar 

Download references

Acknowledgment

This work was supported in part by the National Natural Science Foundation of China (61902149, 61932010 and 62032009) and the Natural Science Foundation of Guangdong Province (2020A1515010393).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Shanxiang Lyu or Fagang Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yu, S., Qin, J., Deng, J., Lyu, S., Li, F. (2022). Data Hiding in the Division Domain: Simultaneously Achieving Robustness to Scaling and Additive Attacks. In: Wang, Y., Zhu, G., Han, Q., Zhang, L., Song, X., Lu, Z. (eds) Data Science. ICPCSEE 2022. Communications in Computer and Information Science, vol 1629. Springer, Singapore. https://doi.org/10.1007/978-981-19-5209-8_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-5209-8_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-5208-1

  • Online ISBN: 978-981-19-5209-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics