Study of Reversible Information Hiding Scheme Based on CARDBAL2 and Color Field Structure

Article Preview

Abstract:

Propose a new image processing method which named Color Field Structure (CFS). The direction of CFS represents the information. Take advantage of the feature that the energy of the image would gather and spread on four components (LL2, LH2, HL2 and HH2) in the sub-image after first-order CARDBAL2 multi-wavelet transform. Propose an Information Hiding Algorithm based on modifying the direction of CFS in four CARDBAL2 first-order sub-images. The maximum change of direction angle is usually less than π/2k. The information is divided into two parts, one part is embedded in LL2 and HH2, and the other part is embedded in LH2 and HL2. Use the Logistic chaotic map, Knight's Tour traversal and the genetic algorithm to improve the consistence of the embedded data bits’ order and the character of the sub-image. Experimental results indicate that the proposed scheme can increase invisibility and robustness separately by 28.64% and 23.06% averagely, and has certain ability against steganalysis such as Higher Order Statistics based on wavelet coefficients. Moreover, the scheme has excellent sensitivity of image processing.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 225-226)

Pages:

275-279

Citation:

Online since:

April 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Lebrun J, Vetterli M. High order balanced multiwavelets:theory factorization and design, IEEE Trans Signal Processing, 2001, 49(9): 1918-1929.

DOI: 10.1109/78.942621

Google Scholar

[2] HUANG Zhuo jun, MA Zheng-ming. Statistical Analysis of Multiwavelet Image Transform, Journal of Image and Graphics, 2001.12, (6A):1198-1203.

Google Scholar

[3] ZHANG Tao, MU De-jun, REN Shuai. Application of lαβ and combination bit plane in information hiding scheme, Computer Engineering and Applications, 2009, 45(20): 10-12.

Google Scholar

[4] ZHAO Yan-tao, MA Yun-fei, LI Zhi-quan. A robust chaos-based DCT-domain watermarking algorithm, Proceedings of the International Conference on Computer Science and Software Engineering (CSSE2008), 2008, 3: 935-938.

DOI: 10.1109/csse.2008.332

Google Scholar

[5] ZHANG Da-qi, QU Shi-ru, KANG Bao-sheng, A More Secure Information Images Using Hiding Technology for Digital DWT and DCT, Journal of Northwestern Polytechnical University, 2007, 25(3): 378-382.

Google Scholar