A Comparative Study of Information Hiding Schemes Using Amplitude, Frequency and Phase Embedding

博士 === 國立成功大學 === 電機工程學系碩博士班 === 91 === Watermarking is a potential method for copyright protection and authentication of multimedia data in the internet. The watermarking process can be viewed as a communication task, where the watermark acting like information is embedded into a host image acting...

Full description

Bibliographic Details
Main Authors: Wen-Yuan Chen, 陳文淵
Other Authors: Chin-Hsing Chen
Format: Others
Language:en_US
Published: 2003
Online Access:http://ndltd.ncl.edu.tw/handle/86947057764355914276
id ndltd-TW-091NCKU5442024
record_format oai_dc
collection NDLTD
language en_US
format Others
sources NDLTD
description 博士 === 國立成功大學 === 電機工程學系碩博士班 === 91 === Watermarking is a potential method for copyright protection and authentication of multimedia data in the internet. The watermarking process can be viewed as a communication task, where the watermark acting like information is embedded into a host image acting like noise in a communication channel which susceptible to all kinds of attacks acting like jamming. In this thesis, two novel watermarking schemes using frequency embedding and phase embedding respectively are proposed. In the first proposed (frequency embedding) scheme, a secret bit is embedded into two rather than one DCT coefficients of a block. This is analogous to the FSK as opposed to the ASK modulation in digital communication. High variance block selection (HVBS) is employed to enhance robustness. In order to solve the synchronization problem caused by HVBS, local block selection and a novel technique called two states constraint is implemented. In order to demonstrate the effectness of the proposed scheme, simulations under various conditions were conducted. The empirical results show that our proposed scheme can sustain most common attacks including JPEG compression, rotating, resizing, cropping, painting, noising and blurring etc. The comparison between using HVBS and without shows that HVBS with the two state constraint can effectively enhance robustness without the sacrifice of imperceptibility. The enhancement is much more significant for host images with fluctuation characteristics than those with smooth characteristics. The comparison between ASK and FSK shows that the extracted watermark from the latter deteriorate gracefully and that from the former is blown out as the strength of a JPEG attack is beyond a threshold. For other common attacks, the ASK and FSK perform about the same except for the blurring attack for which the extracted watermark from the latter can be clearly identified while that from the former is blown out. In the second proposed (phase embedding) scheme, amplitude boost (AB) and low amplitude block selection (LABS) are used to achieve superior performance in terms of robustness and imperceptibility. AB is hired to increase the robustness while LABS is employed to improve the imperceptibility. In order to demonstrate the effectiveness of the proposed scheme, simulations under various conditions were conducted. The empirical results show that our proposed scheme can sustain most common attacks including JPEG compression, rotating, resizing, cropping, painting, noising and blurring etc. The comparison between using the scheme with AB and LABS properly combined and that without shows that the former can effectively enhance robustness without the sacrifice of imperceptibility. The enhancement is much more significant for host images with smooth characteristics than those with fluctuation characteristics. Steganography and copyright protection are closed related in the internet environment. In this thesis a public-key steganography system is proposed to offer safe exchange of a stego-image in the internet. In the proposed system, the secret image is first compressed by the quadtree partition vector quantization (QPVQ) coding into the indices bits stream which is then embedded into the Discrete Cosine Transform (DCT) of the cover image. In the embedding process, adaptive quantization and appropriate DCT coefficients are used to enhance the imperceptibility of the stago-image. On the other hand, The Rivest, Shamir and Adleman (RSA) algorithm is hired to provide the mechanism of a public-key system for secure communication in the internet. Our proposed system has two advantages compared with other data hiding techniques. One is the safety and convenience offered by the RSA system to exchange data in the internet. The other is the stego-image can pass through high quality Joint Photograph Experts Group (JPEG) compression without noticeable degradation.
author2 Chin-Hsing Chen
author_facet Chin-Hsing Chen
Wen-Yuan Chen
陳文淵
author Wen-Yuan Chen
陳文淵
spellingShingle Wen-Yuan Chen
陳文淵
A Comparative Study of Information Hiding Schemes Using Amplitude, Frequency and Phase Embedding
author_sort Wen-Yuan Chen
title A Comparative Study of Information Hiding Schemes Using Amplitude, Frequency and Phase Embedding
title_short A Comparative Study of Information Hiding Schemes Using Amplitude, Frequency and Phase Embedding
title_full A Comparative Study of Information Hiding Schemes Using Amplitude, Frequency and Phase Embedding
title_fullStr A Comparative Study of Information Hiding Schemes Using Amplitude, Frequency and Phase Embedding
title_full_unstemmed A Comparative Study of Information Hiding Schemes Using Amplitude, Frequency and Phase Embedding
title_sort comparative study of information hiding schemes using amplitude, frequency and phase embedding
publishDate 2003
url http://ndltd.ncl.edu.tw/handle/86947057764355914276
work_keys_str_mv AT wenyuanchen acomparativestudyofinformationhidingschemesusingamplitudefrequencyandphaseembedding
AT chénwényuān acomparativestudyofinformationhidingschemesusingamplitudefrequencyandphaseembedding
AT wenyuanchen shǐyòngzhènfúpínlǜyǔxiāngwèiqiànrùdezīxùnyǐncángjìshùbǐjiàoyánjiū
AT chénwényuān shǐyòngzhènfúpínlǜyǔxiāngwèiqiànrùdezīxùnyǐncángjìshùbǐjiàoyánjiū
AT wenyuanchen comparativestudyofinformationhidingschemesusingamplitudefrequencyandphaseembedding
AT chénwényuān comparativestudyofinformationhidingschemesusingamplitudefrequencyandphaseembedding
_version_ 1718314087082885120
spelling ndltd-TW-091NCKU54420242016-06-22T04:14:02Z http://ndltd.ncl.edu.tw/handle/86947057764355914276 A Comparative Study of Information Hiding Schemes Using Amplitude, Frequency and Phase Embedding 使用振幅、頻率與相位嵌入的資訊隱藏技術比較研究 Wen-Yuan Chen 陳文淵 博士 國立成功大學 電機工程學系碩博士班 91 Watermarking is a potential method for copyright protection and authentication of multimedia data in the internet. The watermarking process can be viewed as a communication task, where the watermark acting like information is embedded into a host image acting like noise in a communication channel which susceptible to all kinds of attacks acting like jamming. In this thesis, two novel watermarking schemes using frequency embedding and phase embedding respectively are proposed. In the first proposed (frequency embedding) scheme, a secret bit is embedded into two rather than one DCT coefficients of a block. This is analogous to the FSK as opposed to the ASK modulation in digital communication. High variance block selection (HVBS) is employed to enhance robustness. In order to solve the synchronization problem caused by HVBS, local block selection and a novel technique called two states constraint is implemented. In order to demonstrate the effectness of the proposed scheme, simulations under various conditions were conducted. The empirical results show that our proposed scheme can sustain most common attacks including JPEG compression, rotating, resizing, cropping, painting, noising and blurring etc. The comparison between using HVBS and without shows that HVBS with the two state constraint can effectively enhance robustness without the sacrifice of imperceptibility. The enhancement is much more significant for host images with fluctuation characteristics than those with smooth characteristics. The comparison between ASK and FSK shows that the extracted watermark from the latter deteriorate gracefully and that from the former is blown out as the strength of a JPEG attack is beyond a threshold. For other common attacks, the ASK and FSK perform about the same except for the blurring attack for which the extracted watermark from the latter can be clearly identified while that from the former is blown out. In the second proposed (phase embedding) scheme, amplitude boost (AB) and low amplitude block selection (LABS) are used to achieve superior performance in terms of robustness and imperceptibility. AB is hired to increase the robustness while LABS is employed to improve the imperceptibility. In order to demonstrate the effectiveness of the proposed scheme, simulations under various conditions were conducted. The empirical results show that our proposed scheme can sustain most common attacks including JPEG compression, rotating, resizing, cropping, painting, noising and blurring etc. The comparison between using the scheme with AB and LABS properly combined and that without shows that the former can effectively enhance robustness without the sacrifice of imperceptibility. The enhancement is much more significant for host images with smooth characteristics than those with fluctuation characteristics. Steganography and copyright protection are closed related in the internet environment. In this thesis a public-key steganography system is proposed to offer safe exchange of a stego-image in the internet. In the proposed system, the secret image is first compressed by the quadtree partition vector quantization (QPVQ) coding into the indices bits stream which is then embedded into the Discrete Cosine Transform (DCT) of the cover image. In the embedding process, adaptive quantization and appropriate DCT coefficients are used to enhance the imperceptibility of the stago-image. On the other hand, The Rivest, Shamir and Adleman (RSA) algorithm is hired to provide the mechanism of a public-key system for secure communication in the internet. Our proposed system has two advantages compared with other data hiding techniques. One is the safety and convenience offered by the RSA system to exchange data in the internet. The other is the stego-image can pass through high quality Joint Photograph Experts Group (JPEG) compression without noticeable degradation. Chin-Hsing Chen 陳進興 2003 學位論文 ; thesis 126 en_US