Signal and Information Processing

Self-Embedding Based on Saliency Distribution

Expand
  • School of Communication and Information Engineering, Shanghai University, Shanghai 200072, China

Received date: 2013-04-03

  Revised date: 2013-04-24

  Online published: 2013-04-24

Abstract

 The purpose of image self-embedding is to achieve content authentication and self-recovery by imperceptibly embedding relevant information into the host image. This paper proposes a novel self-embedding method based on significance classification. After classifying the image into three kinds of regions dynamically, the code length and embedding capacity of each block are determined. Using fountain coding, the reference information is embedded into the entire image. The proposed method is superior to the traditional methods in two aspects. First, the method assigns different code length to different regions so that the recovery quality for the whole image is good and significant regions can be protected effectively. Second, the method embeds different amounts of data into different regions thus avoiding false contour and ensuring good quality of the stego-image.

Cite this article

ZHAO Li-li, QIAN Zhen-xing, HAN Xi-yu . Self-Embedding Based on Saliency Distribution[J]. Journal of Applied Sciences, 2014 , 32(2) : 178 -184 . DOI: 10.3969/j.issn.0255-8297.2014.02.010

References

[1] FRIDRICH J, GOLJAN M. Protection of digital images using self embedding [C]// Proceedings of Symposium on Content Security and Data Hiding in Digital Media, NJ, USA, May.14, 1999.

[2]张鸿宾,杨成. 图像的自嵌入及窜改的检测和恢复的算法[J]. 电子学报,2004, 32(2):196-199.

   ZHANG Hongbin, YANG Cheng, Tamper detection and self-recovery of images using self-embedding [J]. Acta Electronica

   Sinica, 2004, 32(2):196-199.(in Chinese)

[3] ZHANG Xinpeng, WANG Shuozhong. Fragile watermarking with error-free restoration capability [J]. IEEE Transaction on Multimedia, 2008, 10(8):1490-1499.

[4] LEE T Y, LIN S D. Dual watermark for image tamper detection and recovery [J], Pattern Recognition, 2008, 41(11): 3497-3506.

[5] YANG C W, SHEN J J. Recover the tampered image based on VQ indexing [J]. Signal Processing, 2010, 90(1):331-343.

[6] QIAN Z X, FENG G R. Inpainting assisted self recovery with decreased embedding data [J]. IEEE Signal Processing Letters, 2010, 17(11): 929-932.

[7] QIAN Zhenxing, FENG G R, ZHANG Xinpeng, WANG Shuozhong. Image self-embedding with high-quality restoration capability [J]. Digital Signal Processing, 2011, 21(2):278-286.

[8] KORUS P, DZIECH A. A novel approach to adaptive image authentication [C]//Proceedings of 2011 18th IEEE International Conference on Image Processing, Sept.11-14, 2011:2765–2768.

[9] ZHANG Xinpeng, WANG Shuozhong. Self-embedding watermark with flexible restoration quality [J]. Multimedia Tools and Application, 2011, 54(2):385-395.

[10] Zhang X P, Wang S Z. Reference sharing mechanism for watermark self-embedding [J]. IEEE Transaction on Image Processing, 2011, 20(2):485-495.

 [11] KORUS P, DZIECH A. Efficient method for content reconstruction with self-embedding [J]. IEEE Transaction on Image Processing, 2012, 22(3):1134-1147.

[12] MacKay D J. Fountain codes [J]. IEE Proceedings Communication, 2005, 152(6):1062-1068.

[13] RIVEST R L. The MD5 messages digest algorithm [OL]. http://tools.ietf.org/rfc/rfc1321.txt, 1992.

[14] HOU X D, HAREL J, KOCH C. Image signature: highlighting sparse salient regions [J]. IEEE Transaction on Pattern Analysis and Machine Intelligence, 2012, 4(1):194-201.

[15] The dataset from the 2nd bows contest [OL], http://bows2.ec-lille.fr/, 2007.
Outlines

/