Tao ZHANG

Work place: College of Automation, Northwestern Polytechnical University, Xi’an 710072, Shaanxi, China

E-mail: zt904@foxmail.com

Website:

Research Interests: Information Security, Network Architecture, Network Security

Biography

Tao Zhang received the Bachelor and Master of Engineering in Computer Science and Technology from the Northwestern Polytechnical University, Xi'an, P.R.China respectively in 2005 and 2009. She is a full-time PhD student in Control Theory and Engineering of the Northwestern Polytechnical University at present.
During her master study, she helped to achieve a project named "Information security risk assessment for a bank". Her research interests include information security assessment, information hiding and network security control.

Author Articles
Application of CL multi-wavelet transform and DCT in Information Hiding Algorithm

By Tao ZHANG Shuai REN

DOI: https://doi.org/10.5815/ijcnis.2011.01.02, Pub. Date: 8 Feb. 2011

Taking advantage of a feature that allows theenergy of an image would gather and spread on four components (LL2, LH2, HL2 and HH2) in the sub image after first-order CL multi-wavelet transform, and Using the advantage of Discrete Cosine Transform in application of information hiding, propose an Information Hiding scheme based on CL multi-wavelet transform and Discrete Cosine Transform (abbreviated as CL-DCT). LL2 is embedded module of robust parameters (optimized code of Chebyshev scrambling and Hash value of embedding information). Embed hiding Information in LH2 and HL2 with RAID1 and fragile sign in HH2. Select a different range of DCT coefficients in LH2, HL2 and HH2. The embedding sequence of each bit plane is traversal according to Knight-tour rout. Experimental results indicate that the proposed scheme can increase invisibility and robustness separately by 5.24% and 28.33% averagely. In particular, the scheme has better ability against cutting attacks. The scheme has certain ability against steganalysis such as Higher Order Statistics based on wavelet coefficients. Moreover, the scheme has excellent sensitivity of image processing.

[...] Read more.
Other Articles