Skip to main content

Advertisement

Log in

Adaptive image data hiding using transformation and error replacement

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Watermarking is popular method for effective copyright protection of digital data. The invisible image watermarking is a type of watermarking which is used to conceal secret information in a cover image. In any watermarking system, there is a trade-off between imperceptibility and payload of the data to be hidden in the cover medium. Therefore, only a limited amount of data can be concealed in the cover image while watermark remain imperceptible. This paper proposes a new method of adaptive blind digital image data hiding in Discrete Cosine Transform (DCT) domain using Minimum Error Lease Significant Bit Replacement (MELSBR) method and Genetic Algorithm (GA). In the proposed method, the secret image is embedded into the DCT transformed cover image. Initially, the host and the secret image both are partitioned into equal sized blocks. Then for each secret image block, host image block is intelligently selected through GA and is embedded using MELSBR method. GA helps in identifying the target cover image blocks such that with the LSB embedding, both visual quality of the cover image and imperceptibility of the secret image remain least affected. In watermark extraction process, the watermarked image is decomposed into equal sized blocks and then using the Jigsaw Puzzle Solver (JPS) the secret image is reconstructed. In spite of doubling the payload of the data to hide, the experimental results have shown better imperceptibility and robustness results of the proposed method as compared to the current approaches in this domain.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Anwar MJ, Ishtiaq M, Jaffar MA (2010) Block-based digital image watermarking using Genetic Algorithm, International Conference on Emerging Technologies (ICET), pp 204–209

  2. Bender W, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3/4):313–336

    Article  Google Scholar 

  3. Boland FM, Ruanaidh JJKO, Dautzenberg C (1995) Watermarking digital images for copyright protection, Proc. IEEE Conference on Image Processing and Its Applications, pp 326–331

  4. Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recognit 37(3):469–474

    Google Scholar 

  5. Chan CK, Cheng LM, Leung KC, Li SL (2004) Image hiding based on block difference. Proceedings of the 8th International Conference on Control, Automation, Robotics and Vision (ICARCV 2004), Kuming, PRC, pp 968–972

  6. Cox IJ, Kilian J, Leighton T, Shamoon T (1996) A Secure, robust watermark for multimedia, Workshop on Information Hiding, Newton Institute, Univ. of Cambridge

  7. Ejaz N, Baik SW (2012) Video summarization using a network of radial basis functions. Multimedia Systems 18(6):483–497

    Google Scholar 

  8. Ejaz N, Mehmood I, Baik SW (2013) Efficient visual attention based framework for extracting key frames from videos. Signal Process Image Commun 28(1):34–44

    Article  Google Scholar 

  9. Ejaz N, Tariq TB, Baik SW (2012) Adaptive key frame extraction for video summarization using an aggregation mechanism. J Vis Commun Image Represent 23(7):1031–1040

    Article  Google Scholar 

  10. Findik O, Babaoglu I, Ulker E (2009) Watermarking scheme using an artificial immune system in spatial domain. Proceedings of the 2nd International conference on International sciences: Information Technology, Culture and Human, pp 945–950

  11. Gen M, Cheng R (1997) Genetic algorithms and engineering design, John Wiley & Sons, Inc, New York

  12. Ishtiaq M, Sikandar B, Jaffar MA (2010) Adaptive watermark strength selection using particle swarm optimization, ICIC Express Letters, An International journal of research and surveys

  13. Khan UA (2010) BCH coding and intelligent watermark embedding: Employing both frequency and strength selection. Appl Soft Comput 10(1):332–343

    Article  Google Scholar 

  14. Khan A, Mirza AM (2007) Genetic Perceptual shaping: utilizing cover image and conceivable attack information during watermark embedding. Inform Fusion 8(4):354–365

    Article  Google Scholar 

  15. Lee YK, Chen LH (1999) An adaptive image steganographic model based on Minimum-Error LSB Replacement, Ninth National Conference on Information Security, Taichung, Taiwan, pp 8–15

  16. Lee Y, Chen L (2000) High capacity image steganographic model. IEE Proc Vis Image Signal Proc 147(3):288–294

    Google Scholar 

  17. Li S, Leung K, Cheng LM, Chan C (2006) A novel image-hiding scheme based on block difference. Pattern Recognit 39(6):1168–1176

    Google Scholar 

  18. Michalewicz Z (1994) Genetic algorithms + data structure = evolution programs. Springer, Berlin

    Google Scholar 

  19. Piva A, Barni M, Bartolini F, Cappellini V (1997) DCT-based watermark recovering without resorting to the uncorrupted original image. Proc Int Conf Image Process 1:520–523

    Article  Google Scholar 

  20. Radack GM, Badler NI (1982) Jigsaw puzzle matching using a boundary-centered polar encoding. Computer Graphics and Image Processing 19(1):1–17

    Google Scholar 

  21. Sikander B, Ishtiaq M, Jaffar MA, Tariq M, Mirza AM (2010) Adaptive digital watermarking of images using Genetic Algorithm, International Conference on Information Science and Applications (ICISA), pp 512–519, Seoul, Korea

  22. Suganthan PN (1999) Solving jigsaw puzzles using Hopfield neural networks. Proceeding of International Joint Conference on Neural Networks, Washington D.C., pp 10–16

  23. Tirkel A, Schyndel RV, Osborne C (1994) A Digital watermark. Proc ICIP 11:86–90

    Google Scholar 

  24. Wang RZ, Lin CF, Lin JC (2000) Hiding data in images by optimal moderately-significant-bit replacement. IEE Electron Lett 36(25):2069–2070

    Google Scholar 

  25. Wang RZ, Lin CF, Lin JC (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognit 34(3):671–683

    Google Scholar 

  26. Yao FH, Shao GF (2003) A shape and image merging technique to solve jigsaw puzzles. Pattern Recogn Lett 24(12):1819–1835

    Google Scholar 

  27. Zne-Jung L, Shih-Wei L, Shun-Feng S, Chun-Yen L (2008) A hybrid watermarking technique applied to digital images. Appl Soft Comput 8(1):798–808

    Article  Google Scholar 

Download references

Acknowledgment

This work was supported by the Industrial Strategic Technology Development Program (10041772, the Development of an Adaptive Mixed-Reality Space based on Interactive Architecture) funded by the Ministry of Knowledge Economy (MKE, Korea).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sung Wook Baik.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ejaz, N., Anwar, J., Ishtiaq, M. et al. Adaptive image data hiding using transformation and error replacement. Multimed Tools Appl 73, 825–840 (2014). https://doi.org/10.1007/s11042-013-1377-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-013-1377-0

Keywords

Navigation