Data hiding scheme with geometric distortions correction

被引:0
|
作者
Jiang, Xiaoxia [1 ]
Lu, Siwei [1 ]
机构
[1] Mem Univ Newfoundland, Dept Comp Sci, St John, NF A1C 5S7, Canada
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a new scheme for data hiding with robustness to rescale and rotation distortions. The most common geometrical distortion rescale factor and rotation factor during image manipulation can be easily estimated by comparing feature points location of original and distorted images. However, the decoder still has to have this prior information regarding the feature points of original image which is not practical. In this paper, two color spaces of RGB images can be considered as two independent channels. One is synchronization channel (SC) which transmit the prior information of original image, and another is communication channel (CC) carrying the hiding data. Contend-based image watermarking method is adopted in SC channel. The feature point extractor plays key role in our scheme. Image units are represented by Delaunay tessellations constructed from extracted feature points. The scale factor and rotation angle estimated from feature points are parsed into binary data as synchronization information and embedded to each image unit. The synchronization information can be extracted successfully if at least two image units are robustness against the distortion. Consequently, the rescaling factor and the rotation angle can be estimated and corrected. Several key problems such as the feature point detector improvement, image unit design and SC synchronization information hiding procedure are discussed in details. The experiment results and discussions are given as well.
引用
收藏
页码:1561 / +
页数:2
相关论文
共 50 条
  • [31] Improved BEMD data hiding Scheme Data hiding Binary Exploitation Modification Direction Scheme Using Image Steganography
    Agarwal, Shuchi
    Bisht, Jaipal Singh
    2017 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN SIGNAL PROCESSING AND EMBEDDED SYSTEMS (RISE), 2017, : 206 - 211
  • [32] A VQ-based data hiding scheme
    Qiu Yingqiang
    Feng Gui
    Du Jixiang
    Liu Jinghua
    2007 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATION SYSTEMS, VOLS 1 AND 2, 2007, : 554 - +
  • [33] An informed synchronization scheme for audio data hiding
    LoboGuerrero, A
    Bas, P
    Liénard, J
    SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VI, 2004, 5306 : 116 - 126
  • [34] A Multilayered Scheme for Transparent Audio Data Hiding
    Abdelsatir, Ei-Tigani B.
    Debnath, Narayan C.
    Abushama, Hisham
    2015 IEEE/ACS 12TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2015,
  • [35] An optimized data hiding scheme for Deflate codes
    Yuan Xue
    Yu-an Tan
    Chen Liang
    ChangYou Zhang
    Jun Zheng
    Soft Computing, 2018, 22 : 4445 - 4455
  • [36] Verifiable data hiding scheme with tamper detection
    Kuo, Wen-Chung
    Wang, Chun-Cheng
    Kuo, Shao-Hung
    Wuu, Lih-Chyau
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 36 (02) : 1311 - 1321
  • [37] A Reversible Data Hiding Scheme for SMVQ Indices
    Chang, Chin-Chen
    Thai-Son Nguyen
    INFORMATICA, 2014, 25 (04) : 523 - 540
  • [38] A discrete Gould transform data hiding scheme
    Varsaki, E. E.
    Fotopoulos, V.
    Skodras, A. N.
    MATHEMATICAL METHODS IN THE APPLIED SCIENCES, 2014, 37 (02) : 283 - 288
  • [39] A Reversible Data Hiding Scheme for JPEG Images
    Li, Qiming
    Wu, Yongdong
    Bao, Feng
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING-PCM 2010, PT I, 2010, 6297 : 653 - 664
  • [40] An optimized data hiding scheme for Deflate codes
    Xue, Yuan
    Tan, Yu-an
    Liang, Chen
    Zhang, ChangYou
    Zheng, Jun
    SOFT COMPUTING, 2018, 22 (13) : 4445 - 4455