Skip to main content
Log in

Steganography of Digital Watermark Based on Artificial Neural Networks in Image Communication and Intellectual Property Protection

  • Published:
Neural Processing Letters Aims and scope Submit manuscript

Abstract

In this paper, a novel steganography of digital watermark scheme which contains digital watermark embedding and extraction processes is proposed. The proposed scheme is based on an iterative process of Arnold scrambling transform which is controlled by secret key shared by copyright owner and authorized users, and the extension of morphological component analysis theory which utilizes morphological diversity as the kernel role in blind source separation. This scheme overcomes the problem of too narrow hidden data bandwidth in traditional LSB replacement or LSB matching schemes. Compared with classic JPEG steganography schemes, the proposed scheme has much higher embedding capacity and broader applicability scope. Images acquired in experiments and the analysis of experimental results both prove the effectiveness of proposed scheme. Objective quantitative results of the peak signal to noise ratio, structural similarity, and normalized correlation indices confirm its brilliant steganography capability as well as its fine robustness to different noise attacks through communication channel.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

References

  1. Petitcolas, Fabien AP, Anderson RJ, Kuhn MG (1999) Information hiding—a survey. Proc IEEE 87(7):1062–1078

    Article  Google Scholar 

  2. Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3.4):313–336

    Article  Google Scholar 

  3. Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5(2):201–214

    Article  MathSciNet  Google Scholar 

  4. Yang C, Liu F, Luo X, Liu B (2008) Steganalysis frameworks of embedding in multiple least-significant bits. IEEE Trans Inf Forensics Secur 3(4):662–672

    Article  Google Scholar 

  5. Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color, and gray-scale images. IEEE Multimed 8(4):22–28

    Article  Google Scholar 

  6. Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB steganography via sample pair analysis. IEEE Trans Signal Process 51(7):1995–2007

    Article  MATH  Google Scholar 

  7. Zhang T, Ping X (2003) A new approach to reliable detection of LSB steganography in natural images. Signal Process 83(10):2085–2093

    Article  MATH  Google Scholar 

  8. Westfeld A (2001) F5—a steganographic algorithm high capacity despite better steganalysis. In: Proceedings of 4th international workshop on information hiding, vol 1768, pp 289–302

  9. Sallee P (2003) Model based steganography. In: Proceedings of international workshop on digital watermarking, pp 174–188

  10. Hetzl S, Mutzel P (2005) A graph theoretic approach to steganography. In: Proceedings of 9th IFIP TC-6 TC-11 international conference of communications and multimedia security, vol 3677, pp 119–128

  11. Elad M, Starck J-L, Querre P, Donoho DL (2005) Simultaneous cartoon and texture image inpainting using morphological component analysis (MCA). Appl Comput Harmon Anal 19(3):340–358

    Article  MathSciNet  MATH  Google Scholar 

  12. Bobin J, Starck J-L, Fadili J, Moudden Y (2007) Sparsity and morphological diversity in blind source separation. IEEE Trans Image Process 16(11):2662–2674

    Article  MathSciNet  MATH  Google Scholar 

  13. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  14. Chou C-H, Liu K-C (2010) A perceptually tuned watermarking scheme for color images. IEEE Trans Image Process 19(11):2966–2982

    Article  MathSciNet  Google Scholar 

  15. Subramanyam AV, Emmanuel S, Kankanhalli MS (2012) Robust watermarking of compressed and encrypted JPEG2000 images. IEEE Trans Multimedia 14(3):703–716

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chong Yu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yu, C. Steganography of Digital Watermark Based on Artificial Neural Networks in Image Communication and Intellectual Property Protection. Neural Process Lett 44, 307–316 (2016). https://doi.org/10.1007/s11063-015-9459-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11063-015-9459-9

Keywords

Navigation