Open Access Open Access  Restricted Access Subscription or Fee Access

An Efficient Data Hiding and Content Protection Technique

Diana Susan Joseph, N.S. Sanitha

Abstract


Data hiding technique can facilitate security and the safe transmission of important information. A steganographic technique known as wet paper coding has been utilized as an effective strategy in image hiding to achieve the requirements of high embedding payload, good quality and robust security and to remove the constraint that message embedding cannot produce zero coefficients when using the MPSteg-color algorithm and in addition to this matrix embedding has also been added to decrease the embedding distortion. Client-side watermark embedding systems have been proposed as a possible solution for the copyright protection in large-scale content distribution environments. In the ST-DM client side watermarking is using a look up table based method. And at the same time, in the new proposed method a compression method is used to reduce the bandwidth usage at the server side. Steganography and watermarking techniques have been integrated to improve the advantages of the author of the proposed system. Watermarking gives copyright protection of the content and only authorized person can access the content and extract the embedded message

Keywords


High Redundant Basis, Matching Pursuit (MP), Security, Wet Paper Coding, Client-Side Embedding, Secure Watermark Embedding, Spread Transform Dither Modulation (ST-DM).

Full Text:

PDF

References


G. Cancelli and M. Barni, “MPSteg-color: data hiding through redundant basis decomposition,” IEEE Trans on information forensics and security, vol. 4, no. 3, september 2009.

G. Cancelli, M. Barni, and G. Menegaz, “MPSteg: Hiding a message in the matching pursuit domain,” Proc. SPIE, vol. 6072, pp.60720P_1–60720P_9, 2006.

G. Cancelli and M. Barni, “MPSteg-color: A new steganographic technique for color images,” in Information Hiding: 9th Int. Workshop (IH 2007), Saint Malo, France, Jun. 11–13, 2007, vol. 4567, pp. 1–15.

J. Fridrich, M. Goljan, P. Lisonek, and D. Soukal, “Writing on wet paper,” IEEE Trans. Signal Process., vol. 53, no. 10, pt. 2, pp. 3923–3935, Oct. 2005.

Chin-Chen Chang a,c, Jung-San Lee a,∗, T. Hoang Ngan Leb, "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector" Digital Signal Processing 20 (2010) 1286–1307.

P. Vandergheynst and P. Frossard, “Image coding using redundant dictionaries,” in Document Image Compression, M. Barni, Ed. Boca Raton, FL: CRC Press, May 2006.

M. Celik, A. Lemma, S. Katzenbeisser, and M. van der Veen, “Look-up table based secure client-side embedding for spread-spectrum watermarks,” IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 475–487, Sep. 2008.

F. Frattolillo, “Watermarking protocol for web context,” IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 350–363, Sep. 2007.

S. Mallat and Z. Zhang, “Matching pursuit with time-frequency dictionaries,”IEEE Trans. Signal Process., vol. 41, no. 12, pp. 3397–3415,Dec. 1993.

P. Jost, P.Vandergheynst, and P. Frossard, “Redundant image representations in security applications,” in Proc. Int. Conf. Image Processing (ICIP 2004), Singapore, 2004, vol. 4, pp. 2151–2154.

M. Goljan, J. Fridrich, and T. Holotyak,“New blind steganalysis and its implications,” Proc. SPIE, vol. 6072, pp. 1–13, 2006.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.