IWIHC '14Pub Date : 2014-06-03DOI: 10.1145/2598908.2598917
Hironobu Tozuka, Maki Yoshida, T. Fujiwara
{"title":"Salt-and-pepper image watermarking system for IHC evaluation criteria","authors":"Hironobu Tozuka, Maki Yoshida, T. Fujiwara","doi":"10.1145/2598908.2598917","DOIUrl":"https://doi.org/10.1145/2598908.2598917","url":null,"abstract":"This paper presents an image watermarking system for the IHC evaluation criteria (ver.3) which require tolerance against both compression and cropping. To meet the requirement, our system repeatedly embeds watermark information into the DCT domain with significantly high watermark strength. On the other hand, to keep high image quality, only one DCT coefficient is used for each watermark bit. Thus, the system adds spike noise (or salt-and-pepper noise) to the DCT domain at embedding. The experimental results show that the watermarking system satisfies the IHC criteria ver.3 and achieves high performance in the contest categories called highest tolerance and highest image quality. Specifically, in the highest tolerance category, the embedded watermark information is detected without error even against compression reducing the file size by 0.5 of its original size. On the other hand, in the highest image quality, PSNR is not lower than 41 dB without error against the specified compression ratio, namely, 4%.","PeriodicalId":117756,"journal":{"name":"IWIHC '14","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129967673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IWIHC '14Pub Date : 2014-06-03DOI: 10.1145/2598908.2598911
K. Santoso, Ki-Ryong Kwon, Suk-Hwan Lee, Seong-Geun Kwon
{"title":"High capacity data hiding method in DNA with mutation handling","authors":"K. Santoso, Ki-Ryong Kwon, Suk-Hwan Lee, Seong-Geun Kwon","doi":"10.1145/2598908.2598911","DOIUrl":"https://doi.org/10.1145/2598908.2598911","url":null,"abstract":"DNA engineering and sequencing technology have great influence to boost DNA computing world. With superior capability to record information to magnetic storage, many researches are done to achieve the maturity of DNA storage and secure communication. The new data embedding method explained in this paper is designed to insert binary data into noncoding regions of DNA sequence in order to preserve its biological function. To reach a high standard of security and capacity, data is encrypted, translated, and then encoded accordingly into DNA sectors using a reference-dependent mechanism. Error correction method using Reed-Solomon encoder and parity check gives a good error handling against substitution and insertion or deletion (indel) mutations. Simulations show that proposed method has higher bit-per-nucleotide (bpn) value even it is restricted to noncoding regions only.","PeriodicalId":117756,"journal":{"name":"IWIHC '14","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115234683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IWIHC '14Pub Date : 2014-06-03DOI: 10.1145/2598908.2598914
Masaki Hakka, M. Kuribayashi, M. Morii
{"title":"DCT-OFDM based watermarking scheme robust against clipping attack","authors":"Masaki Hakka, M. Kuribayashi, M. Morii","doi":"10.1145/2598908.2598914","DOIUrl":"https://doi.org/10.1145/2598908.2598914","url":null,"abstract":"Robustness against various attacks involving lossy compression like JPEG and clipping is inevitable requirements for digital watermarking schemes. In this paper, we propose a watermarking scheme robust against the JPEG compression and a clipping attack using the DCT-OFDM based watermarking method. Robustness against the JPEG compression can be achieved by embedding watermark information into the low-frequency components. We employ the QIM method to the DCT-OFDM modulated signal. By embedding a synchronization signal, we attempt to recover the synchronization loss from a clipped image. In a preliminary experiment, we can detect the embedded synchronization signal around a correct synchronization point because the synchronization signal is mainly embedded into the low-frequency components in a spread form. Then, we determine the center among the detected points as the correct synchronization point. We evaluate the performance of our method by computer simulation. It is revealed that our method satisfies the evaluation criteria determined by IHC Committee, while maintaining high image quality.","PeriodicalId":117756,"journal":{"name":"IWIHC '14","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125867684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IWIHC '14Pub Date : 2014-06-03DOI: 10.1145/2598908.2614450
N. Babaguchi
{"title":"Protection and utilization of privacy information","authors":"N. Babaguchi","doi":"10.1145/2598908.2614450","DOIUrl":"https://doi.org/10.1145/2598908.2614450","url":null,"abstract":"Our society has been getting more privacy-sensitive. Diverse information is given by users to ICT systems such as IC cards that can benefit them. The information is stored as so-called big data, and there is concern over privacy violation. Visual information such as images and videos is also considered privacy-sensitive. The growing deployment of surveillance cameras and social network services has caused a privacy problem of information given from various sensors. As image analysis technologies have made considerable progress, many attempts to automatically process flexible privacy protection have been made since 2000, and utilization of privacy information under some restrictions has been taken into account in recent years. This speech addresses the recent progress of privacy protection for visual information, showing our research projects: PriSurv, Digital Diorama (DD), and Mobile Privacy Protection (MPP). Furthermore, we discuss Harmonized Information Field (HIFI) for appropriate utilization of protected privacy information in a specific area.","PeriodicalId":117756,"journal":{"name":"IWIHC '14","volume":"441 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131670085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IWIHC '14Pub Date : 2014-06-03DOI: 10.1145/2598908.2598913
Nobuhiro Hirata, Masaki Kawamura
{"title":"Digital watermarking method using LDPC code for clipped image","authors":"Nobuhiro Hirata, Masaki Kawamura","doi":"10.1145/2598908.2598913","DOIUrl":"https://doi.org/10.1145/2598908.2598913","url":null,"abstract":"A method of watermarking using low-density parity-check (LDPC) code was evaluated according to Information Hiding Criteria (IHC). Joint Photographic Experts Group (JPEG) compression and clipping are assumed to be attacks against stego-images in these criteria. Markers or synchronization codes were embedded into stego-images to find the starting positions of marked areas to defend against clipping attacks. LDPC code effectively decoded messages without errors for JPEG compression. We could use quantization index modulation (QIM) for embedding and extracting watermarks without the original images.\u0000 As a result, our method could achieve an average peak signal-to-noise ratio (PSNR) of 47.141 dB when we assessed image quality. It could achieve an average compression ratio of 1.334% with JPEG compression when we assessed tolerance.","PeriodicalId":117756,"journal":{"name":"IWIHC '14","volume":"84 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130700595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IWIHC '14Pub Date : 2014-06-03DOI: 10.1145/2598908.2598915
Akira Nishimura
{"title":"Audio watermarking based on amplitude modulation and modulation masking","authors":"Akira Nishimura","doi":"10.1145/2598908.2598915","DOIUrl":"https://doi.org/10.1145/2598908.2598915","url":null,"abstract":"An audio watermarking system based on amplitude modulation (AM) is tested under the evaluation criteria proposed by the Information Hiding Criteria committee. Sinusoidal AMs at relatively low modulation frequencies, applied in opposite phase to neighboring subband signals, are used as the carrier of embedded information. The embedded information is encoded in the form of the relative phase differences between the AMs applied to several groups of subband signals. Results of computer simulation to test robustness and objective sound quality of stego audio showed that the quality degradation caused by the watermarking was tolerable and the detectability of the watermark under mandatory attack tests (DA/AD conversion and MP3 coding) and optional attack tests (bandpass filtering, tandem MP3 coding, MPEG4AAC coding) was sufficiently maintained.","PeriodicalId":117756,"journal":{"name":"IWIHC '14","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133623019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IWIHC '14Pub Date : 2014-06-03DOI: 10.1145/2598908.2598909
Jong-Uk Hou, Jin-Seok Park, Do-Guk Kim, Seung-Hun Nam, Heung-Kyu Lee
{"title":"Robust video watermarking for MPEG compression and DA-AD conversion","authors":"Jong-Uk Hou, Jin-Seok Park, Do-Guk Kim, Seung-Hun Nam, Heung-Kyu Lee","doi":"10.1145/2598908.2598909","DOIUrl":"https://doi.org/10.1145/2598908.2598909","url":null,"abstract":"In this paper, we proposed a robust video watermarking system. Using DCT domain spread-spectrum watermarking, our system achieved robustness to various non-hostile video processings such as MPEG compression, and DA-AD conversion. Our proposed system guarantees that 16-bit data can be extracted in any 15 second interval, even in a long video, by using adaptive frame selection. To verify the performance of the proposed system, various experiments were carried out under a DA-AD conversion environment. Experimental results show that the proposed method is not only robust to non-hostile video processings but also achieves invisibility.","PeriodicalId":117756,"journal":{"name":"IWIHC '14","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130439704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IWIHC '14Pub Date : 2014-06-03DOI: 10.1145/2598908.2598910
Huaizhou Tao, Donghong Sun, Yongfeng Huang, P. Hu
{"title":"A detection method of subliminal channel based on VoIP communication","authors":"Huaizhou Tao, Donghong Sun, Yongfeng Huang, P. Hu","doi":"10.1145/2598908.2598910","DOIUrl":"https://doi.org/10.1145/2598908.2598910","url":null,"abstract":"With VoIP (Voice over IP) is widely applied in the Internet, Using the subliminal channel based on VoIP to transmit secret message has been a significant issue in Information Security. At present, many kinds of information hiding algorithms have been designed and applied in real-time VoIP communication, and the most widely used algorithm among them is the LSB (Least Significant Bit) hiding. However, it is difficult to detect the LSB matching steganography in real time. In response to this challenge, this paper raised a structure of system, which is able to capture the VoIP streams on the Internet and detect the real-time subliminal channel in them. We also designed a new steganalysis algorithm for the system which is aimed at the LSB matching steganography algorithm. It used the feature extraction method based on correlation and SVM (Support Vector Machine) classification. The experiment results demonstrated that while the embedding rate was over 50%, the new algorithm raised the accuracy of detecting the LSB matching by about 20% compared with existing algorithms. At the same time, the length of the samples cannot obviously affect the accuracy of the new algorithm; it can detect the information hiding in the samples whose length is only 3s. From this point of view, the new algorithm has good real-time performance.","PeriodicalId":117756,"journal":{"name":"IWIHC '14","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130579714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IWIHC '14Pub Date : 2014-06-03DOI: 10.1145/2598908.2598916
Reza Moradi Rad, Simying Ong, Koksheik Wong
{"title":"Reversible data hiding by adaptive modification of prediction errors","authors":"Reza Moradi Rad, Simying Ong, Koksheik Wong","doi":"10.1145/2598908.2598916","DOIUrl":"https://doi.org/10.1145/2598908.2598916","url":null,"abstract":"Histogram Shifting (HS) is one of the most popular reversible data hiding techniques that has received tremendous attention from the research community in recent years. While histogram shifting offers many advantages, it suffers from relatively low payload, which restricts its applications significantly. In this work, a new reversible data hiding technique based on the modification of the histogram of prediction errors is proposed. The proposed method employs an adaptive strategy to vacate multiple bins as the embedding venues in order to increase the effective payload. The histogram bins are shifted dynamically based on their magnitudes. To maintain high quality for the output image, the distance of shifting is minimized for smaller prediction errors. On the other hand, the distance of shifting is allowed to be larger for larger prediction errors, which are of lower occurrences, to create more space for embedding. The proposed data hiding method is able to reversibly hide larger number of bits into the host image while achieving comparable output image quality when compared to the conventional histogram shifting based methods. The experimental results suggest that, on average, the proposed method is able to embed 0.247bpp into various standard test images, while still maintaining the visual quality at satisfactory level of ~48.9 dB.","PeriodicalId":117756,"journal":{"name":"IWIHC '14","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121638178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IWIHC '14Pub Date : 2014-06-03DOI: 10.1145/2598908.2598912
Hyunho Kang, Keiichi Iwamura
{"title":"Watermarking based on the difference of discrete cosine transform coefficients and an error-correcting code","authors":"Hyunho Kang, Keiichi Iwamura","doi":"10.1145/2598908.2598912","DOIUrl":"https://doi.org/10.1145/2598908.2598912","url":null,"abstract":"Digital watermarking has been considered as a solution for copyright protection applications. However, very few researchers have published extensive tests of their algorithms. In recent years, Information Hiding and its Criteria for evaluation (IHC) was developed by the IHC Committee of Japan. In this study, we developed a method that satisfies the IHC evaluation criteria. The proposed method uses a discrete cosine transform and an error-correcting code. In particular, we selected the BCH(511,31,109) code for error correcting the watermark bits and the BCH(63,16,11) code for the sync signal to withstand JPEG compression and cropping attack. The experimental results showed that there were no errors in 10 HDTV-size areas after the second decompression.","PeriodicalId":117756,"journal":{"name":"IWIHC '14","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126569539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}