Steganography Based on the Hadamard Transform and Modification of the DEMD

被引:0
|
作者
Leontiev, V. V. [1 ]
Saragishvilli, S. E. [1 ]
机构
[1] Peter Great St Petersburg Univ, St Petersburg, Russia
关键词
Steganography; stegan container; Hadamard transformation; Data hiding;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In the modern world, the problem of copyright protection by watermarks and trade preserving secrets is very acute. There is a large number of steganography methods that allow us to solve this problem. The most resistant to statistical attacks are the methods that operate with the frequency domain of the container, but small container distortions lead to an error in the lower bits of the reverse transform. The article presents a method included in the class of the frequency domain methods that embed information into the frequency domain of the cover image. To improve the resistance to transformation errors, noise and compression, we proposed the modification of the DEMD embedding method. For the frequency transformation we used the Hadamard transform, because this transform is orthogonal and operates with integers which results in a smaller error in the reverse transform. Embedding occurs in the high-middle frequency of the container. Based on the results of the audit, the proposed solution proved to be more resistant to errors and preserved information to a greater extent.
引用
收藏
页数:4
相关论文
共 50 条
  • [31] An improved codeword search algorithm based on Hadamard transform
    Dong, Enqing
    Cai, Guangyue
    2006 8TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-4, 2006, : 880 - +
  • [32] Adaptive visible image watermarking based on Hadamard transform
    Favorskaya, Margarita
    Savchina, Eugenia
    Popov, Aleksei
    IX INTERNATIONAL MULTIDISCIPLINARY SCIENTIFIC AND RESEARCH CONFERENCE MODERN ISSUES IN SCIENCE AND TECHNOLOGY / WORKSHOP ADVANCED TECHNOLOGIES IN AEROSPACE, MECHANICAL AND AUTOMATION ENGINEERING, 2018, 450
  • [33] Ultratrace analysis based on Hadamard transform capillary electrophoresis
    Kaneta, T
    Kosai, K
    Imasaka, T
    ANALYTICAL CHEMISTRY, 2002, 74 (10) : 2257 - 2260
  • [34] BIFORE OR HADAMARD TRANSFORM
    AHMED, N
    RAO, KR
    ABDUSSATTAR, AL
    IEEE TRANSACTIONS ON AUDIO AND ELECTROACOUSTICS, 1971, AU19 (03): : 225 - +
  • [35] Breaking through the limitations of multiplexing based on Hadamard transform
    Yue, Jiang
    Han, Jing
    Zhao, Zhuang
    Bai, Lian-fa
    OPTICS COMMUNICATIONS, 2020, 460 (460)
  • [36] Efficient codeword search algorithm based on Hadamard transform
    Lu, ZM
    Pan, JS
    Sun, SH
    ELECTRONICS LETTERS, 2000, 36 (16) : 1364 - 1365
  • [37] Visual cryptography based on ghost imaging and Hadamard transform
    Kang, Yi
    Zhang, Leihong
    Ye, Hualong
    Liu, Baolin
    Pu, Shengli
    Zhang, Dawei
    Zhuang, Songlin
    QUANTUM INFORMATION PROCESSING, 2023, 22 (02)
  • [38] A Generalised Hadamard Transform
    Horadam, KJ
    2005 IEEE International Symposium on Information Theory (ISIT), Vols 1 and 2, 2005, : 1006 - 1008
  • [39] Modification in spatial, extraction from transform: Keyless side-information steganography for JPEG
    Hosseini, Morteza Darvish Morshedi
    Mahdavi, Mojtaba
    Borujeni, Shahram Etemadi
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2024, 103
  • [40] Audio-to-image wavelet transform based audio steganography
    Santosa, RA
    Bao, P
    PROCEEDINGS ELMAR-2005, 2005, : 209 - 212