A Fragile Information Hiding Technique Based on Human Visual Gray Sensitivity

Article Preview

Abstract:

Based on human visual gray sensitivity, a fragile large capacity spatial domain information hiding algorithm, and a new calculation formula of image peak signal-to-noise ratio were put forward. An adaptive embedding method was proposed, which had the minimum visual gray sensitivity when massive information were hidden into an original image. Experiments showed that this algorithm had massive amount of embedded information and excellent masking properties, and what’s more, once there is a bit tampered randomly, the watermarking image could not be recovered correctly. So it was suitable for the situation where the received information must be very strict reliably.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 121-122)

Pages:

1048-1051

Citation:

Online since:

June 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] BU Y, CAO H Q. A modified algorithm of spatial bpcs-steganography[J]. Journal of Image and Graphics. 2008, 13(3): 406-410.

Google Scholar

[2] CHE S B, CHE Z G, MA B. An improved image scrambling algorithm[P]. Second International Conference on Genetic and Evolutionary Computing, 2008, pp.495-499.

DOI: 10.1109/wgec.2008.7

Google Scholar

[3] Yu Chen, Fang, Qu, Jianbin, Hu, Zhong, Chen. Density adjustable pseudorandom sequence and its applications in information hiding. . 1st International Conference on Multimedia Information Networking and Security, MINES 2009, v 2, P91-94, (2009).

DOI: 10.1109/mines.2009.94

Google Scholar

[4] WU Zhijun. LPC parameters substitution for speech information hiding. Journal of China Universities of Posts and Telecommunications, P103-112, December (2009).

DOI: 10.1016/s1005-8885(08)60295-2

Google Scholar

[5] Haroutunian, Mariam Tonoyan, Smbat. IEEE International Symposium on Information Hiding Theory. Proceedings 2008 IEEE International Symposium on Information Theory, ISIT (2008).

DOI: 10.1109/isit.2008.4595125

Google Scholar