TAILIEUCHUNG - A geometrical robust image data hiding scheme based on contourlet transform

In this paper, we present a new approach for data hiding in digital images by using multiple embedded stages. The new scheme involves feature point detector that orient for a novel Contourlet transform-hiding algorithm. By this way, our model can withstand geometric, desynchronization attacks and other common attacks with a high capacity. | Journal of Science and Technology Volume 48, Issue 4, 2010 pp. 91-98 A GEOMETRICAL ROBUST IMAGE DATA HIDING SCHEME BASED ON CONTOURLET TRANSFORM DUC M. DUONG, DUC A. DUONG ABSTRACT In this paper, we present a new approach for data hiding in digital images by using multiple embedded stages. The new scheme involves feature point detector that orient for a novel Contourlet transform-hiding algorithm. By this way, our model can withstand geometric, desynchronization attacks and other common attacks with a high capacity. The resulting watermarking scheme is suitable for public watermarking applications, where the original image is not available for watermark extraction. Experimental results demonstrate that our proposed technique is robust to a wide range of attacks. Keywords. data hiding, geometrical attacks, watermarking Contourlet transform, 1. INTRODUCTION One of the chief difficulties in watermarking or data hiding scheme is to make the safe level of robustness resistant desynchronization and other geometric attacks. Until now, the effective ways to resist to geometric attacks is still a challenging problem and a one of the research focuses in the field of watermarking. The main issue is the slight geometric manipulation to the watermarked image such as scaling or rotation, which could significantly reduce the possibility of successful watermark retrieval, providing that the watermarking extractor have no knowledge of the distortion parameters. In another word, geometric distortion can easily introduce synchronization errors into the watermark extracting process. In [10], we got significant results in payload, signal processing and some geometric attacks such as cropping and removing. However, our scheme still failed in most of geometric and affine transformations. In this proposal, we use content of the image to achieve synchronization and a Contourlet embedding scheme to embed the message. Firstly, we use Harris detector to obtain feature points with .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.