Chih-Chien Wu, T. Tu, Jyh-Chian Chang, Chien-Ping Chang, P. Huang
{"title":"秘密文本隐藏的盲彩色水印方法","authors":"Chih-Chien Wu, T. Tu, Jyh-Chian Chang, Chien-Ping Chang, P. Huang","doi":"10.1109/IIH-MSP.2007.352","DOIUrl":null,"url":null,"abstract":"This paper presents a new secret text hiding technique, where the secret text is embedded into the low frequency sub-band of the saturation component of a color image via redundant discrete wavelet transform (RDWT), while the intensity and hue components are preserved with direct saturation adjustment. The secret text can be extracted from the watermarked image based on independent component analysis (ICA) without the existences of the original cover image. Experimental results demonstrate that our scheme successfully makes the secret text invisible and provides sufficient robustness to against the most prominent attacks.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Blind Color Watermarking Approach for Secret Text Hiding\",\"authors\":\"Chih-Chien Wu, T. Tu, Jyh-Chian Chang, Chien-Ping Chang, P. Huang\",\"doi\":\"10.1109/IIH-MSP.2007.352\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a new secret text hiding technique, where the secret text is embedded into the low frequency sub-band of the saturation component of a color image via redundant discrete wavelet transform (RDWT), while the intensity and hue components are preserved with direct saturation adjustment. The secret text can be extracted from the watermarked image based on independent component analysis (ICA) without the existences of the original cover image. Experimental results demonstrate that our scheme successfully makes the secret text invisible and provides sufficient robustness to against the most prominent attacks.\",\"PeriodicalId\":385132,\"journal\":{\"name\":\"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)\",\"volume\":\"103 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-11-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IIH-MSP.2007.352\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IIH-MSP.2007.352","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Blind Color Watermarking Approach for Secret Text Hiding
This paper presents a new secret text hiding technique, where the secret text is embedded into the low frequency sub-band of the saturation component of a color image via redundant discrete wavelet transform (RDWT), while the intensity and hue components are preserved with direct saturation adjustment. The secret text can be extracted from the watermarked image based on independent component analysis (ICA) without the existences of the original cover image. Experimental results demonstrate that our scheme successfully makes the secret text invisible and provides sufficient robustness to against the most prominent attacks.