TY - JOUR
T1 - Security and robustness enhancement for image data hiding
AU - Liu, Ning
AU - Amin, Palak
AU - Subbalakshmi, K. P.
PY - 2007/4
Y1 - 2007/4
N2 - In many applications, data hiding can be viewed as a tradeoff between capacity, robustness (against attacks), and embedding induced distortion. In this paper, we consider a fourth parameter: the security of the hidden information. Specifically, we propose a hash-based randomized embedding algorithm (HRE) that increases the security of the hidden data. We then optimize this algorithm against JPEG attacks. We derive a mathematical expression for the security of our algorithm, using which we show that the security of our algorithm can be increased independent of capacity, robustness, and embedding induced distortion. The maximum security depends only on the length of the key sequence, which is limited only by the size of the host image. Using a joint security and capacity measure, we show that the proposed scheme performs better than current secure quantization based data hiding schemes. We also derive the optimal value of distortion compensation factor of the HRE algorithm against JPEG compression attack. Experimental results show that the operating points achieved by the proposed scheme are 7 dB better than current blind data hiding schemes against the JPEG attack.
AB - In many applications, data hiding can be viewed as a tradeoff between capacity, robustness (against attacks), and embedding induced distortion. In this paper, we consider a fourth parameter: the security of the hidden information. Specifically, we propose a hash-based randomized embedding algorithm (HRE) that increases the security of the hidden data. We then optimize this algorithm against JPEG attacks. We derive a mathematical expression for the security of our algorithm, using which we show that the security of our algorithm can be increased independent of capacity, robustness, and embedding induced distortion. The maximum security depends only on the length of the key sequence, which is limited only by the size of the host image. Using a joint security and capacity measure, we show that the proposed scheme performs better than current secure quantization based data hiding schemes. We also derive the optimal value of distortion compensation factor of the HRE algorithm against JPEG compression attack. Experimental results show that the operating points achieved by the proposed scheme are 7 dB better than current blind data hiding schemes against the JPEG attack.
KW - Blind data hiding
KW - JPEG compression attack
KW - Secure image data-hiding
KW - Steganography
KW - distortion compensation
UR - http://www.scopus.com/inward/record.url?scp=33947707398&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33947707398&partnerID=8YFLogxK
U2 - 10.1109/TMM.2006.888005
DO - 10.1109/TMM.2006.888005
M3 - Article
AN - SCOPUS:33947707398
SN - 1520-9210
VL - 9
SP - 466
EP - 474
JO - IEEE Transactions on Multimedia
JF - IEEE Transactions on Multimedia
IS - 3
ER -