Marwa Saidi, Oussama Benrhouma, W. Adi, S. Belghith
{"title":"Combined Image Data Hiding Techniques in a Clone-Resistant SoC Environment","authors":"Marwa Saidi, Oussama Benrhouma, W. Adi, S. Belghith","doi":"10.1109/EST.2015.20","DOIUrl":null,"url":null,"abstract":"In this paper, a combined algorithm of a chaotic data hiding scheme based on DCT transform and a watermarking technique based on Singular Value Decomposition(SVD) transform is proposed. Our scheme offers the feature to check the integrity of the extracted secret image. Basically, we will embed the watermarked secret bits in the least significant coefficients of the DCT transform and check the integrity of the embedded message by comparing the extracted version with the calculated one using a tamper detection key introduced in the watermarking technique. A possible future scenario application of embedding and extracting the watermark in SoC environment is proposed.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Sixth International Conference on Emerging Security Technologies (EST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EST.2015.20","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In this paper, a combined algorithm of a chaotic data hiding scheme based on DCT transform and a watermarking technique based on Singular Value Decomposition(SVD) transform is proposed. Our scheme offers the feature to check the integrity of the extracted secret image. Basically, we will embed the watermarked secret bits in the least significant coefficients of the DCT transform and check the integrity of the embedded message by comparing the extracted version with the calculated one using a tamper detection key introduced in the watermarking technique. A possible future scenario application of embedding and extracting the watermark in SoC environment is proposed.