An Efficient Digital Watermarking Algorithm Based on DCT and BCH Error Correcting Code
Abstract
Keywords
Full Text:
PDFReferences
M. Kaur, S. Jindal and S. Behal, “A Study of Digital Image Watermarking,” vol 2, February 2012.
S. A. Vanstone, An Introduction to Error Correcting Codes with Applications,Springer Science Business Media, New York, 1989.
C. Munuera, “Steganography and error-correcting codes,” Signal Process, vol. 87, pp. 1528-1533, 2007.
A. Westfeld, “F5: A steganographic algorithm, “High capacity despite better steganalysis”,” in Information Hiding, ser. Lecture Notes Comput. Sci... Berlin, Germany: Springer, 2001, vol. 2137, pp. 289–302.
R. Zhang, V. Sachnev, and H. J. Kim, “Fast BCH syndrome coding for steganography,” in Information Hiding, ser. Lecture Notes Comput. Sci.. Berlin, Germany: Springer, vol. 5806, pp. 48–58, 2009.
D. Schonfeld, A. Winkler, “Embedding with syndrome coding based on BCH codes,” Proceedings of the workshop on Multimedia and Secrity, pp. 214-223, 2006.
V. Sachnev, H. Joong Kim and R. Zhang, “Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding,” Proceedings of the 11th ACM workshop on Multimedia and Secrity, pp. 131-140, 2009.
P. Cika, M. Zukal, “Efficiency of BCH codes in digita image watermarking, ”Telecommunications and Signal Processing (TSP), 2012 35th International Conference on, , pp. 745-748, 2012.
C. Fontaine, F. Galand, “How Reed–Solomon codes can improve steganographic schemes,” EURASIP J. Inf. Security, vol. 2009, pp.274845-1–274845-10, 2009.
Y. Wu, “New list decoding algorithms for Reed–Solomon and BCH codes,” in Proc. Int. Symp. Inf. Theory, 2007, pp. 2806–2810.
S. Maity, C. Delpha and R. Boyer, “Watermarking on compressed data integrating convolution coding in integer wavelets,” International Journal of Wavelets Multiresolution and Information Processing, 2012.
W. Zhang, C. Li, X. Zhang, L. Xi, X. Tang and W. He, “A good performance watermarking LDPC code used in high-speed optical fiber communication system” Journal Optics Communications Elsevier, pp. 99–105, 2015.
C. Nafornita, A. Isar and M. Kovaci, “Increasing watermarking robustness using turbo codes,” Intelligent Signal Processing, WISP IEEE International Symposium on, pp. 113-118, 2009.
L. Marvel, Image Steganography for Hidden Communication. PhD thesis, Univ. of Delaware, 1999.
A. M. Alattar, O. M, Alattar, “Watermarking electronic text documents containing justified paragraphs and irregular line spacing,” Proc. Of SPIE Security, Stegano-graphy, and watermarking of Multimedia Context VI, San Jose, CA, pp. 685-695, 2004.
O. Findik, I. Babaoglu and E. Ulker, “Implementation of BCH coding on artificial neural network-based color image watermarking,” International Journal of Innovative Computing, Information and Control, vol. 7, no. 8, pp. 4805-4814, 2011.
R. Crandall, Some notes on steganography 1998 [Online]. Available: http://os.inf.tudresden.de/westfeld/crandall.pdf.
J. Fridrich, M. Goljan, and D. Soukal, “Wet paper codes with improved embedding efficiency,” IEEE Trans. Inf. Forensics Security, vol. 1, no.1, pp. 102–110, Mar. 2006.
J. Fridrich and D. Soukal, “Matrix embedding for large payloads,” IEEE Trans. Inf. Forensics Security, vol. 1, no. 3, pp. 390–395, Sep. 2006.
A. Westfeld, “F5: A steganographic algorithm, “High capacity despite better steganalysis”,” in Information Hiding, ser. Lecture Notes Comput. Sci... Berlin, Germany: Springer, 2001, vol. 2137, pp. 289–302.
D. Schönfeld, A. Winkler, “Reducing the complexity of syndrome coding for embedding,” in Information Hiding, ser. Lecture Notes Comput. Sci... Berlin, Germany: Springer, vol. 4567, pp. 145–158, 2007.
S. Lin, D. J. Costello, Error Control Coding. Norwood: Prentice Hall, 2004.
Y. Jiang, A Practical Guide to Error-Control Coding Using Matlab. Boston, London, 2010.
R. Zhang, V. Sachnev, M. B. Botnan, H. J. Kim and J. Jeo, “An efficient embedder for BCH coding for steganography,” IEEE Transactions on information theory, vol. 58, no. 12, pp. 7272-7279, December 2012.
Z. Zhao, F. Wu, S. Yu, and J. Zhou, “A lookup table based fast algorithm for finding roots of quadric or cubic polynomials in the ,” J. Huazhong Univ. Sci. Technol. (Nature Science Edition), vol. 33, no. 2, pp. 70–72, 2005.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.