Conference Paper

Optimal weighted watermarking for still images

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

The secure digital watermarking method for digital images is proposed. This method is based on error correcting codes (ECC) that are perfect in weighted Hamming metric. The usage of perfect ECC guarantees the limited number of errors (distortions of initial image) that occur in watermarking process. The use of ECC that are perfect in weighted Hamming metric increases the efficiency of the watermarking, such as increasing container volume, taking into account specific of human vision system by applying the concept of weighted container. The method of security increasing for weighted watermarking is represented in this paper.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... This authentication information about the user is further utilized to calculate a signature of the signed document. Obtained signature is embedded into the document as a digital watermark by using syndrome based steganographic algorithm for weighted container WF5 [10,11]. ...
... To sign an electronic document, you need to insert secret information into it. In order for the built-in information to be visually not detectable, you can use the W F 5 method [10,11]. It is much less distorting the document when embedding information than the usual LSB replacement method [21]. ...
... The study revealed that the information could be embedded not only in the first least significant bits of the image but also in the next three. The analysis of visual quality indicators (distortion level) such as PSNR and SSIM show that there is no strong distortion of the container and such embedding method is not visually detectable [11]. ...
Chapter
The importance of verification of the user could not be neglected in the technological world of today. In this work, we focus on the Multi-Factor Authentication (MFA) system with a first factor as the user signature and with his fingerprint as a second biometrical factor. This authentication information about the user is further utilized to calculate a signature of the signed document. Obtained signature is embedded into the document as a digital watermark by using syndrome based steganographic algorithm for weighted container WF5.
... One of the most effective approaches for DWM is invisible embedding based on syndrome coding algorithms such as F 5 [1] that use perfect error correcting codes . Syndrome based embedding based on Hamming code can be expanded from the LSB container model to weighted container model approach [2], [6] that take into account the weighted significance structure of initial container. As a result the more efficient embedding methods could be found. ...
... As a result the more efficient embedding methods could be found. In this paper the comparison of efficiency of two such approaches linear error-block codes(LEBC) embedding method (π-metric) [3] and weighted F 5 embedding (W Hmetric) [2], [5], [6] that are used for weighted structures of container and F 5 method (H-metric) that is used for LSB embedding is made. The comparison metric was found for correct comparison of weighted and unweighed syndrome coding embedding. ...
... Coset leader 000 000 000 100 000 000 010 000 000 001 000 000 110 000 000 101 000 000 011 000 000 111 000 000 000 100 000 000 010 000 000 001 000 100 100 000 010 100 000 001 100 000 100 010 000 010 010 000 001 010 000 100 001 000 010 001 000 001 001 000 110 100 000 011 100 000 101 100 000 110 010 000 011 010 000 101 010 000 110 001 000 011 001 000 101 001 000 000 000 100 000 000 010 000 000 001 Number of distortions for bitplanes 39 21 3 approach the weighted container model [6] could be defined in accordance to the structure [3][2][1] [1]. To construct similar structure for weighted information embedding it is necessary to define weights of corresponding blocks [9]. ...
Article
The paper deals with the problems of peer-to-peer systems such as Device-to-Device (D2D) operating in 5G networks. First, we consider the task of ensuring secure, direct connections between mobile users by utilizing the developed simulator. We present results of the dynamic user clustering in geographical proximity exchanging packet data and Levy flight mobility model. The study results give the possibility to determine benefits of the technology integration in the 3GPP LTE network in terms of throughput. We have shown that technology implementation provides a system capacity increase up to 30% with a slight growth in the time required for the initialization of direct connections. The results may be useful for the academy and industrial experts working in the field of telecommunication systems and information security
Chapter
In this paper the weighted container concept of cover image jointly with error correcting codes perfect in weighted Hamming metric (ECCPWH) is consider. Such approach can improve the efficient of the ECC embedding schemes based on syndrome coding. To show the effectiveness of ECCPWH based scheme the example of multi-level significant bit (MLSB)embedding scheme applied to digital image is provided. ECCPWH based method is compared with the linear error-block codes (LEBC) steganography method that is based on linear error-block codes perfect in \(\pi \)- metric. The examples show that proposed MLSB embedding scheme that is based on ECCPWH approach is efficient for syndrome coding embedding algorithms.
Conference Paper
Full-text available
Fast and wide-scale spreading of the image data on the Internet creates great opportunities for illegal access by the different kinds of intruders. In order to solve the problem of intellectual property protection, digital image watermarking can be successfully used. We describe a new method of digital watermarking based on the embedding of the local maxima into the Fourier transform area of the image. Simulation results are presented, which confirm that the proposed method is resistant to cyclic shifts, row and column removal, cropping, addition of noise, rotation and JPEG transforms.
Conference Paper
This paper discusses the approach to construction of steganographic method for the weighted container. To find the efficient solution, concept of Penalty Function is introduced. The analysis of the efficiency of the weighted embedding for the simple model of weighted container is shown.
Article
Many steganographic systems are weak against visual and statistical attacks. Systems without these weaknesses offer only a relatively small capacity for steganographic messages. The newly developed algorithm F5 withstands visual and statistical attacks, yet it still offers a large steganographic capacity. F5 implements matrix encoding to improve the efficiency of embedding. Thus it reduces the number of necessary changes. F5 employs permutative straddling to uniformly spread out the changes over the whole steganogram.
Article
We propose a class of binary generalized (L,G) codes that are perfect in a weighted Hamming metric.
Conference Paper
Steganography is the art of hiding information in information is gaining momentum as it scores over cryptography because it enables to embedd the secret message to cover images. Steganographic techniques offer more promise in digital image processing. The Least Significant Bit embedding technique suggests that data can be hidden in the least significant bits of the cover image and the human eye would be unable to notice the hidden image in the cover file. This technique can be used for hiding images in 24-bit, 8-bit or gray scale format. We emphasize strongly on image Steganography providing a strong focus on the LSB techniques in image Steganography. This paper explains the LSB embedding technique and presents the evaluation results for 2,4,6 Least significant bits for a .pngfile and a .bmp file.
Special class of codes for steganographic systems
  • S Bezzateev
  • N Voloshina
  • K Zhidanov
Special Class of (L, G) Codes for Watermark Protection in DRM
  • S Bezzateev
  • N Voloshina
  • V Minchenkov