A New Algorithm for Enhanced Robustness of Copyright Mark

This paper discusses a new heavy tailed distribution based data hiding into discrete cosine transform (DCT) coefficients of image, which provides statistical security as well as robustness against steganalysis attacks. Unlike other data hiding algorithms, the proposed technique does not introduce much effect in the stegoimage-s DCT coefficient probability plots, thus making the presence of hidden data statistically undetectable. In addition the proposed method does not compromise on hiding capacity. When compared to the generic block DCT based data-hiding scheme, our method found more robust against a variety of image manipulating attacks such as filtering, blurring, JPEG compression etc.





References:
[1] Petitcolas F. A. P., Anderson R. J. and Kuhn M. G., "Information hiding
- A survey", Proceedings of the IEEE, pp. 1062-1078, vol. 87, no. 7,
July 1999.
[2] Anderson R., "Information hiding", Lecture Notes in Computer Science,
vol. 1174, Springer -Verlag, 1996.
[3] Hopper N. J., Langford J., and Ahn L., "Provably secure
steganography," Advances in Cryptology: CRYPTO 2002, August, 2002.
[4] Maity, S.P., and Kundu, M.K., "An image watermarking scheme using
HVS characteristics and spread transform," Proceedings of the 17th
International Conference on Pattern Recognition, pp. 23-26, vol. 4,
2004.
[5] Delp, E.J., and Wolfgang, R.B., "A watermark for digital images,"
International Conference on Image Processing, pp. 219-222, 1996.
[6] Bruyndockx, J., Quisquater, J., and Macq, B., "Spatial method for
copyright labeling," IEEE Workshop on Image Processing, pp. 456-459,
1995.
[7] Wolfgang, R.B., and Delp, E.J., "A watermarking technique for digital
imagery: Further studies," International Conference on Imaging Science,
pp. 279-287, 1997.
[8] Schyndel V.R.G., Tirkel A.Z., and Osborne C.F., "A digital watermark,"
IEEE International Conference on Image Processing, pp. 86-89, 1994.
[9] Westfeld A., and Pfitzmann A., "Attacks on steganographic systems,"
Lecture Notes in Computer Science, pp. 61-75, vol. 1768, Springer-
Verlag, 2000.
[10] Ruanaidh J. J. K. 'O, Dowling W. J., and Boland F. M., "Phase
watermarking of digital images," Proceeding. International Conference
on Image Processing (ICIP), pp. 239-242, vol. 3, 1996.
[11] Koch E. and Zhao J., "Toward robust and hidden image copyright
labeling," Proceedings Workshop Nonlinear Signal and Image
Processing, Marmaros, Greece, June 1995.
[12] Hsieh M.S., Tseng D.C. and Huang Y.H., "Hiding digital watermarks
using multiresolution wavelet transform," IEEE Transactions on
Industrial Electronics, pp.875 - 882, vol. 48, Issue 5, 2001.
[13] Podilchuk C. and Zeng W., "Watermarking of the JPEG bitstream," in
Proceedings of International Conference on Imaging Science, Systems,
and Applications (CISST -97), pp. 253-260, Las Vegas, June 1997.
[14] Guan Y.L. and Jin J., "An objective comparison between spatial and
DCT watermarking schemes for MPEG video," Proceedings
International Conference on Information Technology: Coding and
Computing, pp.207- 211, 2001.
[15] Tao B. and Dickinson B., "Adaptive watermarking in the DCT domain,"
Proceedings of International Conference Image Processing, Lausanne,
Switzerland, Sept. 1996.
[16] Briassouli A and Tsakalides P, "Hidden Messages in heavy-tails: DCTdomain
watermark detection using alpha-stable models," IEEE
Transactions on Multimedia, pp. 700-716, vol. 7, August 2005
[17] Adler R., Feldman R., and Taqqu M. S., A Guide to Heavy Tails:
Statistical Techniques and Applications. Boston, MA: Birkhauser, 1998.
[18] Podilchuk C. I., "Digital image watermarking using visual models,"
Proceedings of Electronic Imaging, vol. 3016, San Jose, CA, 1996.
[19] Podilchuk C. I. and Zeng W., "Perceptual watermarking of still images,"
Proceedings of Workshop Multimedia Signal Processing, Princeton, NJ,
June 1997.
[20] Wang, H., and Wang, S., "Cyber warfare: steganography vs.
steganalysis," Communications of the ACM, pp. 76-82, vol. 47, 2004.
[21] Fridrich, J., and Goljan, M., "Practical steganalysis of digital imagesstate
of the art," In Proceedings of SPIE Photonics West, pp. 1-13, vol.
4675, 2002.
[22] Tescher A. G., "Transform image coding," Advances in Electronics and
Electron Physics. Suppl. 12. New York: Academic, pp. 113-115, 1979.
[23] Reininger R. C. and. Gibson J. D, "Distributions of the two-dimensional
DCT coefficients for images," IEEE Transactions on Communications,
pp. 835-839, vol. -31, June 1983.
[24] Clarke R. J., Transform Coding of Images, New York: Academic, 1985.
[25] Tanabe N. and Farvardin N., "Subband image coding using entropy
coded quantization over noisy channels," Computer Science Technical
Report Series, University of Maryland, College Park, MD, 1989.
[26] Birney K. A. and. Fischer T. R, "On the modeling of DCT and subband
image data for compression," IEEE Transaction on Image Processing,
pp. 186-193, vol. 4, 1995.
[27] Hernandez J.R., Amado M., and Perez Gonzalez F., "DCT-domain
watermarking techniques for still images: Detector performance analysis
and a new structure," IEEE Transaction on Image Processing, pp. 55-
68, vol. 9, 2000.
[28] Achim A., Bezerianos A. and Tsakalides P., "Novel bayesian multiscale
method for speckle removal in medical ultrasound images," IEEE
Transaction on Medical Image, pp. 772-783, vol. 20, 2001.
[29] Georgiou P., Tsakalides P. and Kyriakakis C., "Alpha-stable modeling
of noise and robust time-delay estimation in the presence of impulsive
noise," IEEE Transaction on Multimedia, pp. 291-301, vol. 1, no. 3,
1999.
[30] Amin P.K., Liu N. and. Subbalakshmi K.P, "Statistically secure digital
image data hiding," IEEE 7th Workshop on Multimedia Signal
Processing, pp. 1- 4, 2005.
[31] Schwartz M., Information Transmission, Modulation, and Noise.
McGRAW-HILL Book Company, 1985.
[32] Harmsen J.J., and Pearlman W.A. "Steganalysis of additive noise
modelable information hiding." Proceedings of SPIE Electronic
Imaging, Santa Clara, CA, vol. 5020, 2003.
[33] Gonzalez R.C. and Woods R.E., Digital Image Processing Using
MATLAB. PEARSON EDUCATION, 2004.