IWIHC '14最新文献

筛选
英文 中文
Salt-and-pepper image watermarking system for IHC evaluation criteria 盐和胡椒图像水印系统的IHC评价标准
IWIHC '14 Pub Date : 2014-06-03 DOI: 10.1145/2598908.2598917
Hironobu Tozuka, Maki Yoshida, T. Fujiwara
{"title":"Salt-and-pepper image watermarking system for IHC evaluation criteria","authors":"Hironobu Tozuka, Maki Yoshida, T. Fujiwara","doi":"10.1145/2598908.2598917","DOIUrl":"https://doi.org/10.1145/2598908.2598917","url":null,"abstract":"This paper presents an image watermarking system for the IHC evaluation criteria (ver.3) which require tolerance against both compression and cropping. To meet the requirement, our system repeatedly embeds watermark information into the DCT domain with significantly high watermark strength. On the other hand, to keep high image quality, only one DCT coefficient is used for each watermark bit. Thus, the system adds spike noise (or salt-and-pepper noise) to the DCT domain at embedding. The experimental results show that the watermarking system satisfies the IHC criteria ver.3 and achieves high performance in the contest categories called highest tolerance and highest image quality. Specifically, in the highest tolerance category, the embedded watermark information is detected without error even against compression reducing the file size by 0.5 of its original size. On the other hand, in the highest image quality, PSNR is not lower than 41 dB without error against the specified compression ratio, namely, 4%.","PeriodicalId":117756,"journal":{"name":"IWIHC '14","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129967673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
High capacity data hiding method in DNA with mutation handling 基于突变处理的DNA高容量数据隐藏方法
IWIHC '14 Pub Date : 2014-06-03 DOI: 10.1145/2598908.2598911
K. Santoso, Ki-Ryong Kwon, Suk-Hwan Lee, Seong-Geun Kwon
{"title":"High capacity data hiding method in DNA with mutation handling","authors":"K. Santoso, Ki-Ryong Kwon, Suk-Hwan Lee, Seong-Geun Kwon","doi":"10.1145/2598908.2598911","DOIUrl":"https://doi.org/10.1145/2598908.2598911","url":null,"abstract":"DNA engineering and sequencing technology have great influence to boost DNA computing world. With superior capability to record information to magnetic storage, many researches are done to achieve the maturity of DNA storage and secure communication. The new data embedding method explained in this paper is designed to insert binary data into noncoding regions of DNA sequence in order to preserve its biological function. To reach a high standard of security and capacity, data is encrypted, translated, and then encoded accordingly into DNA sectors using a reference-dependent mechanism. Error correction method using Reed-Solomon encoder and parity check gives a good error handling against substitution and insertion or deletion (indel) mutations. Simulations show that proposed method has higher bit-per-nucleotide (bpn) value even it is restricted to noncoding regions only.","PeriodicalId":117756,"journal":{"name":"IWIHC '14","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115234683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
DCT-OFDM based watermarking scheme robust against clipping attack 基于DCT-OFDM的水印方案具有抗剪切攻击的鲁棒性
IWIHC '14 Pub Date : 2014-06-03 DOI: 10.1145/2598908.2598914
Masaki Hakka, M. Kuribayashi, M. Morii
{"title":"DCT-OFDM based watermarking scheme robust against clipping attack","authors":"Masaki Hakka, M. Kuribayashi, M. Morii","doi":"10.1145/2598908.2598914","DOIUrl":"https://doi.org/10.1145/2598908.2598914","url":null,"abstract":"Robustness against various attacks involving lossy compression like JPEG and clipping is inevitable requirements for digital watermarking schemes. In this paper, we propose a watermarking scheme robust against the JPEG compression and a clipping attack using the DCT-OFDM based watermarking method. Robustness against the JPEG compression can be achieved by embedding watermark information into the low-frequency components. We employ the QIM method to the DCT-OFDM modulated signal. By embedding a synchronization signal, we attempt to recover the synchronization loss from a clipped image. In a preliminary experiment, we can detect the embedded synchronization signal around a correct synchronization point because the synchronization signal is mainly embedded into the low-frequency components in a spread form. Then, we determine the center among the detected points as the correct synchronization point. We evaluate the performance of our method by computer simulation. It is revealed that our method satisfies the evaluation criteria determined by IHC Committee, while maintaining high image quality.","PeriodicalId":117756,"journal":{"name":"IWIHC '14","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125867684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Protection and utilization of privacy information 隐私信息的保护和利用
IWIHC '14 Pub Date : 2014-06-03 DOI: 10.1145/2598908.2614450
N. Babaguchi
{"title":"Protection and utilization of privacy information","authors":"N. Babaguchi","doi":"10.1145/2598908.2614450","DOIUrl":"https://doi.org/10.1145/2598908.2614450","url":null,"abstract":"Our society has been getting more privacy-sensitive. Diverse information is given by users to ICT systems such as IC cards that can benefit them. The information is stored as so-called big data, and there is concern over privacy violation. Visual information such as images and videos is also considered privacy-sensitive. The growing deployment of surveillance cameras and social network services has caused a privacy problem of information given from various sensors. As image analysis technologies have made considerable progress, many attempts to automatically process flexible privacy protection have been made since 2000, and utilization of privacy information under some restrictions has been taken into account in recent years. This speech addresses the recent progress of privacy protection for visual information, showing our research projects: PriSurv, Digital Diorama (DD), and Mobile Privacy Protection (MPP). Furthermore, we discuss Harmonized Information Field (HIFI) for appropriate utilization of protected privacy information in a specific area.","PeriodicalId":117756,"journal":{"name":"IWIHC '14","volume":"441 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131670085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital watermarking method using LDPC code for clipped image 利用LDPC编码对图像进行数字水印
IWIHC '14 Pub Date : 2014-06-03 DOI: 10.1145/2598908.2598913
Nobuhiro Hirata, Masaki Kawamura
{"title":"Digital watermarking method using LDPC code for clipped image","authors":"Nobuhiro Hirata, Masaki Kawamura","doi":"10.1145/2598908.2598913","DOIUrl":"https://doi.org/10.1145/2598908.2598913","url":null,"abstract":"A method of watermarking using low-density parity-check (LDPC) code was evaluated according to Information Hiding Criteria (IHC). Joint Photographic Experts Group (JPEG) compression and clipping are assumed to be attacks against stego-images in these criteria. Markers or synchronization codes were embedded into stego-images to find the starting positions of marked areas to defend against clipping attacks. LDPC code effectively decoded messages without errors for JPEG compression. We could use quantization index modulation (QIM) for embedding and extracting watermarks without the original images.\u0000 As a result, our method could achieve an average peak signal-to-noise ratio (PSNR) of 47.141 dB when we assessed image quality. It could achieve an average compression ratio of 1.334% with JPEG compression when we assessed tolerance.","PeriodicalId":117756,"journal":{"name":"IWIHC '14","volume":"84 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130700595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Audio watermarking based on amplitude modulation and modulation masking 基于调幅和调制掩蔽的音频水印
IWIHC '14 Pub Date : 2014-06-03 DOI: 10.1145/2598908.2598915
Akira Nishimura
{"title":"Audio watermarking based on amplitude modulation and modulation masking","authors":"Akira Nishimura","doi":"10.1145/2598908.2598915","DOIUrl":"https://doi.org/10.1145/2598908.2598915","url":null,"abstract":"An audio watermarking system based on amplitude modulation (AM) is tested under the evaluation criteria proposed by the Information Hiding Criteria committee. Sinusoidal AMs at relatively low modulation frequencies, applied in opposite phase to neighboring subband signals, are used as the carrier of embedded information. The embedded information is encoded in the form of the relative phase differences between the AMs applied to several groups of subband signals. Results of computer simulation to test robustness and objective sound quality of stego audio showed that the quality degradation caused by the watermarking was tolerable and the detectability of the watermark under mandatory attack tests (DA/AD conversion and MP3 coding) and optional attack tests (bandpass filtering, tandem MP3 coding, MPEG4AAC coding) was sufficiently maintained.","PeriodicalId":117756,"journal":{"name":"IWIHC '14","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133623019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Robust video watermarking for MPEG compression and DA-AD conversion 用于MPEG压缩和DA-AD转换的鲁棒视频水印
IWIHC '14 Pub Date : 2014-06-03 DOI: 10.1145/2598908.2598909
Jong-Uk Hou, Jin-Seok Park, Do-Guk Kim, Seung-Hun Nam, Heung-Kyu Lee
{"title":"Robust video watermarking for MPEG compression and DA-AD conversion","authors":"Jong-Uk Hou, Jin-Seok Park, Do-Guk Kim, Seung-Hun Nam, Heung-Kyu Lee","doi":"10.1145/2598908.2598909","DOIUrl":"https://doi.org/10.1145/2598908.2598909","url":null,"abstract":"In this paper, we proposed a robust video watermarking system. Using DCT domain spread-spectrum watermarking, our system achieved robustness to various non-hostile video processings such as MPEG compression, and DA-AD conversion. Our proposed system guarantees that 16-bit data can be extracted in any 15 second interval, even in a long video, by using adaptive frame selection. To verify the performance of the proposed system, various experiments were carried out under a DA-AD conversion environment. Experimental results show that the proposed method is not only robust to non-hostile video processings but also achieves invisibility.","PeriodicalId":117756,"journal":{"name":"IWIHC '14","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130439704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A detection method of subliminal channel based on VoIP communication 基于VoIP通信的阈下信道检测方法
IWIHC '14 Pub Date : 2014-06-03 DOI: 10.1145/2598908.2598910
Huaizhou Tao, Donghong Sun, Yongfeng Huang, P. Hu
{"title":"A detection method of subliminal channel based on VoIP communication","authors":"Huaizhou Tao, Donghong Sun, Yongfeng Huang, P. Hu","doi":"10.1145/2598908.2598910","DOIUrl":"https://doi.org/10.1145/2598908.2598910","url":null,"abstract":"With VoIP (Voice over IP) is widely applied in the Internet, Using the subliminal channel based on VoIP to transmit secret message has been a significant issue in Information Security. At present, many kinds of information hiding algorithms have been designed and applied in real-time VoIP communication, and the most widely used algorithm among them is the LSB (Least Significant Bit) hiding. However, it is difficult to detect the LSB matching steganography in real time. In response to this challenge, this paper raised a structure of system, which is able to capture the VoIP streams on the Internet and detect the real-time subliminal channel in them. We also designed a new steganalysis algorithm for the system which is aimed at the LSB matching steganography algorithm. It used the feature extraction method based on correlation and SVM (Support Vector Machine) classification. The experiment results demonstrated that while the embedding rate was over 50%, the new algorithm raised the accuracy of detecting the LSB matching by about 20% compared with existing algorithms. At the same time, the length of the samples cannot obviously affect the accuracy of the new algorithm; it can detect the information hiding in the samples whose length is only 3s. From this point of view, the new algorithm has good real-time performance.","PeriodicalId":117756,"journal":{"name":"IWIHC '14","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130579714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reversible data hiding by adaptive modification of prediction errors 预测误差自适应修正的可逆数据隐藏
IWIHC '14 Pub Date : 2014-06-03 DOI: 10.1145/2598908.2598916
Reza Moradi Rad, Simying Ong, Koksheik Wong
{"title":"Reversible data hiding by adaptive modification of prediction errors","authors":"Reza Moradi Rad, Simying Ong, Koksheik Wong","doi":"10.1145/2598908.2598916","DOIUrl":"https://doi.org/10.1145/2598908.2598916","url":null,"abstract":"Histogram Shifting (HS) is one of the most popular reversible data hiding techniques that has received tremendous attention from the research community in recent years. While histogram shifting offers many advantages, it suffers from relatively low payload, which restricts its applications significantly. In this work, a new reversible data hiding technique based on the modification of the histogram of prediction errors is proposed. The proposed method employs an adaptive strategy to vacate multiple bins as the embedding venues in order to increase the effective payload. The histogram bins are shifted dynamically based on their magnitudes. To maintain high quality for the output image, the distance of shifting is minimized for smaller prediction errors. On the other hand, the distance of shifting is allowed to be larger for larger prediction errors, which are of lower occurrences, to create more space for embedding. The proposed data hiding method is able to reversibly hide larger number of bits into the host image while achieving comparable output image quality when compared to the conventional histogram shifting based methods. The experimental results suggest that, on average, the proposed method is able to embed 0.247bpp into various standard test images, while still maintaining the visual quality at satisfactory level of ~48.9 dB.","PeriodicalId":117756,"journal":{"name":"IWIHC '14","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121638178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Watermarking based on the difference of discrete cosine transform coefficients and an error-correcting code 基于离散余弦变换系数差和纠错码的水印
IWIHC '14 Pub Date : 2014-06-03 DOI: 10.1145/2598908.2598912
Hyunho Kang, Keiichi Iwamura
{"title":"Watermarking based on the difference of discrete cosine transform coefficients and an error-correcting code","authors":"Hyunho Kang, Keiichi Iwamura","doi":"10.1145/2598908.2598912","DOIUrl":"https://doi.org/10.1145/2598908.2598912","url":null,"abstract":"Digital watermarking has been considered as a solution for copyright protection applications. However, very few researchers have published extensive tests of their algorithms. In recent years, Information Hiding and its Criteria for evaluation (IHC) was developed by the IHC Committee of Japan. In this study, we developed a method that satisfies the IHC evaluation criteria. The proposed method uses a discrete cosine transform and an error-correcting code. In particular, we selected the BCH(511,31,109) code for error correcting the watermark bits and the BCH(63,16,11) code for the sync signal to withstand JPEG compression and cropping attack. The experimental results showed that there were no errors in 10 HDTV-size areas after the second decompression.","PeriodicalId":117756,"journal":{"name":"IWIHC '14","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126569539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信