16 December 2013 Spread spectrum image data hiding in the encrypted discrete cosine transform coefficients
Xiaoqiang Zhang, Z. Jane Wang
Author Affiliations +
Abstract
Digital watermarking and data hiding are important tools for digital rights protection of media data. Spread spectrum (SS)-based watermarking and data-hiding approaches are popular due to their outstanding robustness, but their security might not be sufficient. To improve the security of SS, a SS-based image data-hiding approach is proposed by encrypting the discrete cosine transform coefficients of the host image with the piecewise linear chaotic map, before the operation of watermark embedding. To evaluate the performance of the proposed approach, simulations and analyses of its robustness and security are carried out. The average bit-error-rate values on 100 real images from the Berkeley segmentation dataset under the JPEG compression, additive Gaussian noise, salt and pepper noise, and cropping attacks are reported. Experimental results show that the proposed approach can maintain the high robustness of traditional SS schemes and, meanwhile, also improve the security. The proposed approach can extend the key space of traditional SS schemes from 1019 to 1047and thus can resist brute-force attack and unauthorized detection watermark attack.
© 2013 SPIE and IS&T 0091-3286/2013/$25.00 © 2013 SPIE and IS&T
Xiaoqiang Zhang and Z. Jane Wang "Spread spectrum image data hiding in the encrypted discrete cosine transform coefficients," Journal of Electronic Imaging 22(4), 043029 (16 December 2013). https://doi.org/10.1117/1.JEI.22.4.043029
Published: 16 December 2013
Lens.org Logo
CITATIONS
Cited by 3 scholarly publications and 2 patents.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Image encryption

Computer security

Data hiding

Image compression

Complex systems

Image segmentation

RELATED CONTENT

Toward a secure JPEG
Proceedings of SPIE (August 24 2006)
Principles and applications of BPCS steganography
Proceedings of SPIE (January 22 1999)

Back to Top