Advertisement

A Bit Modification Technique for Watermarking Images and Streaming Video

  • Kaliappan Gopalan
Part of the Communications in Computer and Information Science book series (CCIS, volume 193)

Abstract

This paper demonstrates a bit modification technique for embedding watermarks of known strings of data applied to a color image. For watermarking of images and video frames, low payload information can be embedded indiscernibly and with quick and easy manipulation of pixel bits. Robustness of the hidden watermark with added noise is shown as a tradeoff with visibility, as is the case with the size of the watermark. By retrieving the hidden watermark in an oblivious manner, the technique can be used in copyright and authentication applications. The simplicity of embedding and blind recovery with low level noise-resistance render the proposed technique suitable for imperceptible watermarking of still images and streaming video over public networks.

Keywords

Watermarking Data embedding Oblivious retrieval Visual perception Bit modification 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Anderson, R.J., Petitcolas, F.A.P.: On the limits of steganography. IEEE J. Selected Areas in Communications 16(4), 474–481 (1998)CrossRefGoogle Scholar
  2. 2.
    Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal 35(3&4), 313–336 (1996)CrossRefGoogle Scholar
  3. 3.
    Wu, M., Liu, B.: Data hiding in image and video.I. Fundamental issues and solutions. IEEE Transactions on Image Processing 12, 685–695 (2003)CrossRefGoogle Scholar
  4. 4.
    Wu, M., Yu, H., Liu, B.: Data hiding in image and video.II. Fundamental issues and solutions. IEEE Transactions on Image Processing 12, 696–705 (2003)CrossRefGoogle Scholar
  5. 5.
    Swanson, M.D., Kobayashi, M., Tewfik, A.H.: Multimedia data-embedding and watermarking technologies. Proc. IEEE 86, 1064–1087 (1998)CrossRefGoogle Scholar
  6. 6.
    Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Proc. 6, 1673–1687 (1997)CrossRefGoogle Scholar
  7. 7.
    Marvel, L.M., Boncelet Jr., C.G., Retter, C.T.: Spread spectrum image steganography. IEEE Trans. Image Proc. 8(8), 1075–1083 (1999)CrossRefGoogle Scholar
  8. 8.
    Gopalan, K.: Audio Steganography Using Bit Modification. In: Proc. of the IEEE 2003 International Conference on Multimedia and Exposition, ICME 2003 (July 2003)Google Scholar
  9. 9.
    Cvejic, N., Seppanen, T.: Increasing robustness of LSB audio steganography using a novel embedding method. In: Proc. of the International Conference on Information Technology: Coding and Computing (ITCC 2004), vol. 2(5-7) (April 2004)Google Scholar
  10. 10.
    Gopalan, K., Shi, Q.: Audio Steganography using Bit Modification – A Tradeoff on Perceptibility and Data Robustness for Large Payload Audio Embedding. In: Proc. of the 19th International Conference on Computer Communications and Networks (ICCCN 2010) – Workshop on Multimedia Computing and Communications, Zurich, Switzerland (August 2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Kaliappan Gopalan
    • 1
  1. 1.Department of Electrical and Computer EngineeringPurdue University CalumetHammondU.S.A.

Personalised recommendations