Skip to main content

Image Information Hiding Based on Binary Holography of Iterative Conjugate-Symmetric Extension

  • Conference paper
Book cover The International Workshop on Digital Forensics and Watermarking 2012 (IWDW 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7809))

Included in the following conference series:

  • 2074 Accesses

Abstract

An image information hiding based on binary holography of iterative conjugate-symmetric extension hologram is proposed to significantly improve the method of binarizing traditional hologram. We binarize the conjugate symmetric extension hologram, and then iterate it between the spatial and transform domain. The binary hologram after iterative repetition loses much less information than the traditional binary interference hologram, so the reconstructed image is greatly improved. Binary hologram is embedded into the medium-frequency coefficient of discrete cosine transform (DCT) of the host image, and the watermark is extracted in the form of blind detection. The simulation results show that the algorithm has much better robustness to JPEG compression, cropping, filtering, noise contamination and other common image processing. Compared with traditional method of binary interference hologram, the robustness of the watermark has been significantly improved.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding—a survey. Proceedings of IEEE 87(7), 1062–1078 (1999)

    Article  Google Scholar 

  2. Cox, I.J., Miller, M.L.: The first 50 years of electronic watermarking. EURASIP J. of Applied Signal Processing 2, 126–132 (2002)

    Article  MATH  Google Scholar 

  3. Javidi, B., Nomura, T.: Securing information by use of digital holography. Optics Letters 25(1), 28–30 (2000)

    Article  Google Scholar 

  4. Kishk, S., Javidi, B.: Watermarking of three-dimensional objects by digital holography. Optics Letters 28(3), 167–169 (2003)

    Article  Google Scholar 

  5. Seo, D.H., Kim, S.J.: Interferometric phase-only optical encryption system that uses a reference wave. Optics Letters 28(5), 304–306 (2003)

    Article  Google Scholar 

  6. Okman, O.E., Akart, G.B.: Quantization index modulation-based image watermarking using digital holography. Opt. Soc. 24(1), 243–252 (2007)

    Article  Google Scholar 

  7. Daqing, C., Jihua, G.: An image digital watermarking with phase retrieval algorithm and Fourier transformation hologram. Acta Optica Sinica 29(12), 3310–3316 (2009) (in Chinese)

    Google Scholar 

  8. Takai, N., Mifune, Y.: Digital watermarking by a holographic technique. Applied Optics 41(5), 865–873 (2002)

    Article  Google Scholar 

  9. Chang, H., Tsian, T.: Image watermarking by use of digital holography embedded in the DCT domain. Applied Optics 44(29), 6211–6219 (2005)

    Article  Google Scholar 

  10. Chiliang, Y., Jihua, G., et al.: An image digital watermark technique based on digital holography and discrete cosine transform. Acta Optica Sinica 26, 355–361 (2006) (in Chinese)

    Google Scholar 

  11. Huang, S., Wang, S., et al.: Digital watermark technology based on conjugate symmetric extension algorithm. Acta Physica Sinica 58(2), 952–958 (2009) (in Chinese)

    Google Scholar 

  12. Wang, S., Huang, S., et al.: Hologram-based watermarking capable of surviving print-scan process. Applied Optics 49(7), 1170–1178 (2010)

    Article  Google Scholar 

  13. Guoming, L., Xianglin, L.: Holographic watermarking scheme based on DFT domain embedding. Computer Systems & Applications 20(5), 42–46 (2011) (in Chinese)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhao, Q., Chen, D., Tao, Z., Gu, J. (2013). Image Information Hiding Based on Binary Holography of Iterative Conjugate-Symmetric Extension. In: Shi, Y.Q., Kim, HJ., Pérez-González, F. (eds) The International Workshop on Digital Forensics and Watermarking 2012. IWDW 2012. Lecture Notes in Computer Science, vol 7809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40099-5_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40099-5_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40098-8

  • Online ISBN: 978-3-642-40099-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics