Skip to main content

New Data Hiding Scheme Using Method of Embedding Two Bits Data into Two DCT Coefficients

  • Conference paper
Signal Processing and Multimedia (MulGraB 2010, SIP 2010)

Abstract

Data hiding technologies are applicable in various application technologies. Generally, more the hiding volume of data is the better. One of the current methods embeds the data of one bit per two coefficients on the frequency domain that orthogonal converts the image. This paper proposes the method of embedding two bits per two DCT coefficients aiming to increase the embedding volume of data on the current method. First bit of embedding data is represented by amplitude relation between two DCT coefficients. Second bit is represented by mean of two DCT coefficients. These two use embedding strength parameters P and Q, respectively. These parameters were decided by preliminary experiment. Experimental results show that the proposed scheme achieved good image quality and robustness against JPEG data compression.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Iwata, M., Miyake, K., Shiozaki, A.: Digital Watermarking Method to Embed Indes Data into JPEG Images. IEICE, Trans. Fundamentals E85-A(10), 2267–2271 (2002)

    Google Scholar 

  2. Iwata, M., Miyake, K., Shiozaki, A.: Digital Steganography Utilizing Features of JPEG Images. IEICE, Trans. Fundamentals E87-A(4), 929–936 (2004)

    Google Scholar 

  3. Sugimoto, O., Kawada, R., Koike, A., Matsumoto, S.: Automatic Objective Picture Quality Measurement Method Using Invisible Marker Signal. IEICE Trans. Information and Systems J88-D-II(6), 1012–1023 (2005)

    Google Scholar 

  4. Kuroda, H., Fujimura, M., Hamano, K.: Considerations of Image Compression Scheme Hiding a Part of Coded Data into Own Image Coded Data. In: Proceedings of the International Conference, Signal Processing, Image Processing, and Pattern Recognition (SI 2009), pp. 312–319 (2009)

    Google Scholar 

  5. Fujimura, M., Miyata, S., Hamano, K., Kuroda, H., Imamura, H.: High Efficiency Coding of JPEG Method Using Watermarking Technique. IEICE, Trans. ISS, D J92-D(9), 1672–1676 (2009)

    Google Scholar 

  6. Kuroda, H., Fujimura, M., Imamura, H.: A Novel Image Coding Scheme using Digital Watermarking Techniques. The Journal of the Institute of Image Electronics Engineers of Japan 37(1), 63–68 (2008)

    Google Scholar 

  7. Johnson, N.F., Katezenbeisser, S.C.: A survey of steganographi techniques. In: Information Techniques for Steganography and Digital Watermarking, pp. 43–75 (December 1999)

    Google Scholar 

  8. Ishtiaq, M., Arfan Jaffar, M., Khan, M.A., Jan, Z., Mirza, A.M.: Robust and Imperceptible Watermarking of Video Stream for Low Power Devices. In: Proceedings of the International Conference, Signal Processing, Image Processing, and Pattern Recognition (SI 2009), pp. 177–184 (2009)

    Google Scholar 

  9. Dittman, J., Stabenau, M., Steinmetz, R.: Robust MPEG video Watermarking Technologies. In: ACM Multi,edia, Bristol, UK, pp. 71–80 (August 1998)

    Google Scholar 

  10. Henmandez, J.R., Amado, M., Perez-Gonzelez, F.: DCT-Domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Transactions on image processing 9(1), 55–68 (2000)

    Article  Google Scholar 

  11. Liu, Z., Karam, L.J., Watson, A.B.: JPEG2000 Encoding With Perceptual Distortion Control. IEEE Transactions on Image Processing 15(7), 1763–1778 (2006)

    Article  Google Scholar 

  12. Yen, E., Tsai, K.S.: HDWT-based grayscale watermarking for copyright protection. An International Journal Source Expart Systems with Applications 35(1-2), 301–306 (2008)

    Article  Google Scholar 

  13. Hassanin, A.E.: A Copyright Protection using Watermarking Algorithm. Informatica 17(2), 187–198 (2006)

    MATH  Google Scholar 

  14. Morita, K., Kawakami, K., Yamada, A., Fujimura, M., Imamura, H., Kuroda, H.: An Adaptive Data Hiding Method Using Best Combination Neighboring Parts of WTC for Division into Flat/Non-Flat Pairs. In: Proc. of The Pacific Rim Workshop on Digital Steganography, pp. 68–74 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fujimura, M., Takano, T., Baba, S., Kuroda, H. (2010). New Data Hiding Scheme Using Method of Embedding Two Bits Data into Two DCT Coefficients. In: Kim, Th., Pal, S.K., Grosky, W.I., Pissinou, N., Shih, T.K., Ślęzak, D. (eds) Signal Processing and Multimedia. MulGraB SIP 2010 2010. Communications in Computer and Information Science, vol 123. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17641-8_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17641-8_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17640-1

  • Online ISBN: 978-3-642-17641-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics