Rotation and cropping resilient data hiding with zernike moments

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

15 Scopus citations

Abstract

Most digital data hiding schemes are sensitive to simple geometric attacks namely rotation, cropping, and scaling. Of these, rotational attacks possess the capability to not only change each pixel value but also dislocate the image pixels in a circular fashion, thus creating a synchronization issue for any linear data hiding algorithm. So far, Fourier Mellin transform (FMT) based algorithms have been considered a standard for rotation invariant data hiding. This method causes some difficulties in implementation due to unstable log-polar mapping, iterative inversion of the interpolation and aliasing effects on the FMT magnitude and phase spectra. In this paper, we propose a data hiding algorithm that is based on the Zernike moment transform (ZMT), accompanied with an odd-even quantizer based embedding scheme to defeat the effects of rotation and cropping attacks. We note that this algorithm is robust to a combination of rotation and other popular attacks. The proposed algorithm has good embedding capacity and very low induced distortion. Experimental results over a range of rotational attacks (from 0° to 360°) show a recovery rate (of the embedded bits) of 97% or greater.

Original languageEnglish
Title of host publication2004 International Conference on Image Processing, ICIP 2004
Pages2175-2178
Number of pages4
DOIs
StatePublished - 2004
Event2004 International Conference on Image Processing, ICIP 2004 - , Singapore
Duration: 18 Oct 200421 Oct 2004

Publication series

NameProceedings - International Conference on Image Processing, ICIP
Volume4
ISSN (Print)1522-4880

Conference

Conference2004 International Conference on Image Processing, ICIP 2004
Country/TerritorySingapore
Period18/10/0421/10/04

Fingerprint

Dive into the research topics of 'Rotation and cropping resilient data hiding with zernike moments'. Together they form a unique fingerprint.

Cite this