Application of CL multi-wavelet transform and DCT in Information Hiding Algorithm

Full Text (PDF, 604KB), PP.11-17

Views: 0 Downloads: 0

Author(s)

Tao ZHANG 1,* Shuai REN 2

1. College of Automation, Northwestern Polytechnical University, Xi’an 710072, Shaanxi, China

2. School of Information Engineering, Chang’an University, Xi’an 710064, Shaanxi, China

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2011.01.02

Received: 22 May 2010 / Revised: 3 Oct. 2010 / Accepted: 10 Dec. 2010 / Published: 8 Feb. 2011

Index Terms

Algorithms, wavelet transforms, information hiding, CL multi-wavelet transform, Discrete Cosine Transform, Chebyshev scrambling, genetic algorithm, Knight-tour rout

Abstract

Taking advantage of a feature that allows theenergy of an image would gather and spread on four components (LL2, LH2, HL2 and HH2) in the sub image after first-order CL multi-wavelet transform, and Using the advantage of Discrete Cosine Transform in application of information hiding, propose an Information Hiding scheme based on CL multi-wavelet transform and Discrete Cosine Transform (abbreviated as CL-DCT). LL2 is embedded module of robust parameters (optimized code of Chebyshev scrambling and Hash value of embedding information). Embed hiding Information in LH2 and HL2 with RAID1 and fragile sign in HH2. Select a different range of DCT coefficients in LH2, HL2 and HH2. The embedding sequence of each bit plane is traversal according to Knight-tour rout. Experimental results indicate that the proposed scheme can increase invisibility and robustness separately by 5.24% and 28.33% averagely. In particular, the scheme has better ability against cutting attacks. The scheme has certain ability against steganalysis such as Higher Order Statistics based on wavelet coefficients. Moreover, the scheme has excellent sensitivity of image processing.

Cite This Paper

Tao ZHANG, Shuai REN, "Application of CL multi-wavelet transform and DCT in Information Hiding Algorithm", International Journal of Computer Network and Information Security(IJCNIS), vol.3, no.1, pp.11-17, 2011. DOI:10.5815/ijcnis.2011.01.02

Reference

[1]Chang Chin-Chen, Tseng Hsien-Wen. Data hiding in images by hybrid LSB substitution, Proceedings of the 3rd International Conference on Multimedia and Ubiquitous Engineering (MUE 2009), 2009:360-363.
[2]Li Xiao-long, Zeng Tie-yong, Yang Bin. Improvement of the embedding efficiency of LSB matching by sum and difference covering set, Proceedings of the 2008 IEEE International Conference on Multimedia and Expo (ICME 2008), 2008:209-212.
[3]Daqi Zhang, Shiru Qu, and Baosheng Kang, “A More Secure Information Images Using Hiding Technology for Digital DWT and DCT”, Journal of Northwestern Polytechnical University, Northwestern Polytechnical University Press, Xi’an, P.R.China, 2007, 25(3), pp. 378- 382.
[4]Gengming Zhu, Nong Sang, Desheg Xiang, Shaobo Zhang, “Watermark Algorithm Research and Simulation Based on Different Frequency Coefficients”, in Proceedings of International Conference on Advanced Computer Theory and Engineering (ICACTE 2008), Phuket, THAILAND, IEEE COMPUTER SOC, USA, 2008, pp. 271-275.
[5]Sun, X.. Robust adaptive image watermarking using visual models in DWT and DCT domain, Information Technology Journal, 2010, 9(3):460-466.
[6]Lu Wei, Sun Wei, Lu Hong-tao. Robust watermarking based on DWT and nonnegative matrix factorization, Computers and Electrical Engineering, 2009, 35(1):183-188.
[7]Chui C. K., Lian J. A. A Study of orthonormal multiwavelets, Applied Numerical Mathematics, 1996, 20(3): 273-298.
[8]HUANG Zhuo jun, MA Zheng-ming. Statistical Analysis of Multiwavelet Image Transform, Journal ofImage andGraphics, 2001.12, (6A):1198-1203.(in Chinese)
[9]TaiYu-wing, Jia jia-ya, Tang Chi-keung. Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, (2005), 1:747.
[10]Paris, L., “Heuristic strategies for the knight tour problem”, in Proceedings of IC-AI 2004 & MLMTA 2004, CSREA PRESS, Athens, 2004, pp. 1121-1125.
[11]Boyd J. P.. Chebyshev and Fourier spectral methods. Canada: General Publishing Company, 2001.
[12]Goldberg, D.E., Genetic Algorithms in Search, Optimization, and Machine Learning, Addison Wesley Publishing Company, PISCATAWAY, USA, 2007, pp. 237-251.
[13]Prasadh K., Ramar K., Gnanajeyaraman, R. Public key cryptosystems based on chaotic-chebyshev polynomials, Proceedings of the 2009 International Conference on Intelligent Agent and Multi-Agent Systems (IAMA2009), 2009, Article number:5228035.
[14]SHI Jun. Chaotic and Its Performance Analysis Based on Chebyshev Mapping, Modern Electronics Technique, 2008, 31(23): 93-96. (in Chinese)
[15]Hany F., Siwei L. Higher-order Wavelet Statistics and their Application to Digital Forensics, IEEE Workshop on Statistical Analysis in Computer Vision, 2003, 8: 94.
[16]Prasadh K., Ramar K., Gnanajeyaraman, R. Public key cryptosystems based on chaotic-chebyshev polynomials, Proceedings of the 2009 International Conference on Intelligent Agent and Multi-Agent Systems (IAMA2009), 2009.
[17]Licheng Jiao, Biao Hou, Shuang Wang, and Fang Liu, Image Multiscale Geometric Analysis: Theory and Applications Beyond Wavelets, Xidian University Press, Xi’an, P.R.China, 2008.