Abstract
In this paper, a novel steganography of digital watermark scheme which contains digital watermark embedding and extraction processes is proposed. The proposed scheme is based on an iterative process of Arnold scrambling transform which is controlled by secret key shared by copyright owner and authorized users, and the extension of morphological component analysis theory which utilizes morphological diversity as the kernel role in blind source separation. This scheme overcomes the problem of too narrow hidden data bandwidth in traditional LSB replacement or LSB matching schemes. Compared with classic JPEG steganography schemes, the proposed scheme has much higher embedding capacity and broader applicability scope. Images acquired in experiments and the analysis of experimental results both prove the effectiveness of proposed scheme. Objective quantitative results of the peak signal to noise ratio, structural similarity, and normalized correlation indices confirm its brilliant steganography capability as well as its fine robustness to different noise attacks through communication channel.
References
Petitcolas, Fabien AP, Anderson RJ, Kuhn MG (1999) Information hiding—a survey. Proc IEEE 87(7):1062–1078
Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3.4):313–336
Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5(2):201–214
Yang C, Liu F, Luo X, Liu B (2008) Steganalysis frameworks of embedding in multiple least-significant bits. IEEE Trans Inf Forensics Secur 3(4):662–672
Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color, and gray-scale images. IEEE Multimed 8(4):22–28
Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB steganography via sample pair analysis. IEEE Trans Signal Process 51(7):1995–2007
Zhang T, Ping X (2003) A new approach to reliable detection of LSB steganography in natural images. Signal Process 83(10):2085–2093
Westfeld A (2001) F5—a steganographic algorithm high capacity despite better steganalysis. In: Proceedings of 4th international workshop on information hiding, vol 1768, pp 289–302
Sallee P (2003) Model based steganography. In: Proceedings of international workshop on digital watermarking, pp 174–188
Hetzl S, Mutzel P (2005) A graph theoretic approach to steganography. In: Proceedings of 9th IFIP TC-6 TC-11 international conference of communications and multimedia security, vol 3677, pp 119–128
Elad M, Starck J-L, Querre P, Donoho DL (2005) Simultaneous cartoon and texture image inpainting using morphological component analysis (MCA). Appl Comput Harmon Anal 19(3):340–358
Bobin J, Starck J-L, Fadili J, Moudden Y (2007) Sparsity and morphological diversity in blind source separation. IEEE Trans Image Process 16(11):2662–2674
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612
Chou C-H, Liu K-C (2010) A perceptually tuned watermarking scheme for color images. IEEE Trans Image Process 19(11):2966–2982
Subramanyam AV, Emmanuel S, Kankanhalli MS (2012) Robust watermarking of compressed and encrypted JPEG2000 images. IEEE Trans Multimedia 14(3):703–716
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yu, C. Steganography of Digital Watermark Based on Artificial Neural Networks in Image Communication and Intellectual Property Protection. Neural Process Lett 44, 307–316 (2016). https://doi.org/10.1007/s11063-015-9459-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11063-015-9459-9