Adaptive Data Hiding based on Turbo Coding in DCT Domain

  • Published : 2002.06.01

Abstract

This paper develops a novel robust information hiding technique that uses channel codes derived from the error-correcting coder. The message encoded by the cover encoder is hidden in DCT transform domain of the cover image. The method exploits the sensitivity of human eyes to adaptively embed a visually recognizable message in an image without affecting the perceptual quality of the underlying cover image. Experimental results show that the proposed data hiding technique is robust to cropping operations, lossy JPEG compression, noise interference and secure against known stego attacks. The performance of the proposed scheme with turbo coder is superior to that without turbo coder.

Keywords

References

  1. David Kahn, 'The Codebreakers: the comprehensive history of secret communication from ancient time to the Internet,' Scribner 1996
  2. F.L. Bauer, 'Decrypted secrets: methods and maxims of cryptology,' Berlin, Heidelberg, Germany, Springer-Verlag, 1997
  3. I.J.Cox, J.Kilian, T.Leighton and T. Shamoon, 'Secure spread spectrum watermarking for images, audio and video,' Proceedings of the IEEE International Conference on Image Processing, Lausanne, Switzerland, pp.243-246, Sep. 1996
  4. B.Pfitzmann, 'Trials of traced traitors,' Workshop on Information Hiding, Cambridge, Springer-Verlag, Berlin, pp.49-64. 1996
  5. C.Berrou, A. Glavirux and P. Thitimajshima, 'Near shannon limit error-correcting coding and decoding: Turbo-codes,' Proceedings of the 1993 International Conference on Communication (ICC'93), pp. 1064-1070, 1993
  6. C.Berrou and A. Glavirux, 'Near optimum error correcting coding and decoding: Turbo-codes,' IEEE Transactions on Communications vol. 44, pp.1261-1271, Oct. 1996
  7. Soonyoung Kim, Jinsu Chang and Moon Ho Lee, 'Simple iterative decoding stop criterion for wireless packet transmission,' Electronics Letters, Vol.36, pp.2026-2027, Nov. 2000
  8. S.Katzenbeisser and F.A.Petitcolas, 'Information hiding techniques for steganography and digital watermarking,' Artech House, Boston, MA, 2000
  9. C.Cachin, 'An information theoretic model for steganography,' Information Hiding: Second International Workshop, Lecture notes in Computer Science, Spring-Verlag, Germany, pp.306-318, 1998
  10. T.M. Cover and J.A.Thomas, Elements of Information Theory, John Wiley, New York, 1991
  11. F. Alturki and R. Mersereau, 'Secure blind image steganographic technique using discrete fourier transformation,', 2001 International Conference on Image Processing, Vol. 2, pp. 542 -545, Oct. 2001
  12. Chang Hsing Lee and Yeuan Kuen Lee, 'An adaptive digital image watermarking technique for copyright protection,' IEEE Transactions on Consumer Electronics, Vol.45, pp.1005-1015, Nov. 1999