Browse > Article

Adaptive Data Hiding based on Turbo Coding in DCT Domain  

Yang, Jie (Wuhan University)
Lee, Moon Ho (Institute of Information & Communication, Chonbuk National University)
Chen, Xinhao (South-Central University)
Publication Information
Journal of Broadcast Engineering / v.7, no.2, 2002 , pp. 192-201 More about this Journal
Abstract
This paper develops a novel robust information hiding technique that uses channel codes derived from the error-correcting coder. The message encoded by the cover encoder is hidden in DCT transform domain of the cover image. The method exploits the sensitivity of human eyes to adaptively embed a visually recognizable message in an image without affecting the perceptual quality of the underlying cover image. Experimental results show that the proposed data hiding technique is robust to cropping operations, lossy JPEG compression, noise interference and secure against known stego attacks. The performance of the proposed scheme with turbo coder is superior to that without turbo coder.
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 F.L. Bauer, 'Decrypted secrets: methods and maxims of cryptology,' Berlin, Heidelberg, Germany, Springer-Verlag, 1997
2 C.Berrou, A. Glavirux and P. Thitimajshima, 'Near shannon limit error-correcting coding and decoding: Turbo-codes,' Proceedings of the 1993 International Conference on Communication (ICC'93), pp. 1064-1070, 1993
3 C.Berrou and A. Glavirux, 'Near optimum error correcting coding and decoding: Turbo-codes,' IEEE Transactions on Communications vol. 44, pp.1261-1271, Oct. 1996
4 Soonyoung Kim, Jinsu Chang and Moon Ho Lee, 'Simple iterative decoding stop criterion for wireless packet transmission,' Electronics Letters, Vol.36, pp.2026-2027, Nov. 2000
5 F. Alturki and R. Mersereau, 'Secure blind image steganographic technique using discrete fourier transformation,', 2001 International Conference on Image Processing, Vol. 2, pp. 542 -545, Oct. 2001
6 David Kahn, 'The Codebreakers: the comprehensive history of secret communication from ancient time to the Internet,' Scribner 1996
7 B.Pfitzmann, 'Trials of traced traitors,' Workshop on Information Hiding, Cambridge, Springer-Verlag, Berlin, pp.49-64. 1996
8 S.Katzenbeisser and F.A.Petitcolas, 'Information hiding techniques for steganography and digital watermarking,' Artech House, Boston, MA, 2000
9 T.M. Cover and J.A.Thomas, Elements of Information Theory, John Wiley, New York, 1991
10 I.J.Cox, J.Kilian, T.Leighton and T. Shamoon, 'Secure spread spectrum watermarking for images, audio and video,' Proceedings of the IEEE International Conference on Image Processing, Lausanne, Switzerland, pp.243-246, Sep. 1996
11 Chang Hsing Lee and Yeuan Kuen Lee, 'An adaptive digital image watermarking technique for copyright protection,' IEEE Transactions on Consumer Electronics, Vol.45, pp.1005-1015, Nov. 1999
12 C.Cachin, 'An information theoretic model for steganography,' Information Hiding: Second International Workshop, Lecture notes in Computer Science, Spring-Verlag, Germany, pp.306-318, 1998