JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2016, Vol. 51 ›› Issue (9): 68-75.doi: 10.6040/j.issn.1671-9352.3.2015.069

Previous Articles     Next Articles

Research on watermarking payload of the spatial images based on MPUI model

MAO Jia-fa1,2,3, HUANG Yan-hong1, NIU Xin-xin2, XIAO Gang1, 3, ZHU Li-nan1, SHENG Wei-guo1,3   

  1. 1. College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou 310023, Zhejiang, China;
    2. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China;
    3. Key Laboratory of Visual Media Intelligent Processing Technology of Zhejiang Province, Hangzhou 310023, Zhejiang, China
  • Received:2015-09-11 Online:2016-09-20 Published:2016-09-23

Abstract: Based on the MPUI model, we study the maximum watermarking payload of spatial domain image, which is not only related to embedding intensity but also to the factors such as the size of image, image complexity and visual sensitively, and so forth. We derived the relationship among maximum watermarking payload, size of image and embedding intensity, and adopt multivariate regression analysis method to research image complexity, visual sensitivity, and embedding rate model. Synthesize these internal and external factors, with the aid of subjective and objective evaluation system, we estimate the estimation method of watermark embedded payload and verify its effectiveness through experiments.

Key words: MPUI model, embedding intensity, complexity, watermarking payload, visual sensitivity

CLC Number: 

  • TP309
[1] 董秀则,张茹,钮心忻. MB隐写分析算法[J]. 北京邮电大学学报,2012,02:99-103. DONG Xiuze, ZHANG Ru, NIU Xinxin. A steganalysis algorithm on MB stegano-graphy[J].Journal of Beijing University of Posts and Telecommunications, 2012, 02:99-103.
[2] 高虎明,李凯捷,王英娟.基于SIFT 抗几何攻击的数字水印算法[J]. 计算机应用,2013,33(3):748-751. GAO Huming, LI Kaijie, WANG Yingjuan. A digital watermarking algorithm based on SIFT against geometric attacks [J]. Journal of Computer Applications, 2013, 33(3):748-751.
[3] 武嘉,张茹,钮心忻,等. 针对BPCS隐写的隐写分析法[J]. 北京邮电大学学报,2009,04:113-116. WU Jia, ZHANG Ru, NIU Xinxin, et al. Reliable detection of BPCS stega-nography [J]. Journal of Beijing University of Posts and Telecommunications, 2009, 04:113-116.
[4] 沈昌祥,张焕国,冯登国,等.信息安全综述[J].中国科学(E集:信息科学), 2007, 37(2):129-150. SHEN Changxiang, ZHANG Huanguo, FENG Dengguo, et al. Information security review [J]. Science in China(Series E: Information Sciences), 2007, 37(2):129-150.
[5] VORBRUGGEN J C, CAYRE F. The Certimark benchmark: architecture and future perspectives[C] //Proceeding of the IEEE International Conference on Multimedia and Expo(ICME2002).New York: IEEE, 2002:485-488.
[6] KIM H C, LIN E T, GUITART O, et al. Further progress in watermark evaluation testbed(WET)[C] //Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents(SPIE2005). USA: SPIE, 2005:236-247.
[7] SOLACHIDIS V, TEFAS A, NIKOLAIDIS N, et al. A benchmarking protocol for water-marking methods[C] //Proceedings of International Conference on Image Processing. New York: IEEE, 2001, 3:1023-1026.
[8] MOULIN P, OSULLIVAN J A. Information theoretic analysis of information hiding [J]. IEEE Transactions on Information Theory, 2003, 49(3):563-593.
[9] COHEN A, LAPIDOTH A. The Gaussian watermarking game[J]. IEEE Transactions on Information Theory, 2002, 48(6):1639-1667.
[10] SOMEKH-BARUCH A, MERHAV N. On the capacity game of public watermarking system[J]. IEEE Transactions on Infor-mation Theory, 2004, 50(3):511-524.
[11] SAJEDI H, JAMZAD M. Secure steganography based on embedding capacity[J]. International Journal of Information Security, 2009, 8(6):433-445.
[12] 高海英. 音频信息隐藏理论及应用[D]. 北京: 北京邮电大学,2006. GAO Haiying. The theory and application of audio information hiding [D]. Beijing: Beijing University of Posts and Telecommunicatons, 2006.
[13] COHEN A S, LAPIDOTH A. The capacity of the vector Gaussian watermarking game[C] //Proceeding of the IEEE International Symposium on Information Theory(ISIT2001). Piscataway: IEEE, 2001: 24-29.
[14] ZHANG X, WANG S. Steganography using multiple-base notational system and human vision sensitivity[J]. IEEE Signal Processing Letters, 2005, 12(1):67-70.
[15] MAO J F, NIU X X, YANG Y X, et al. JPEG2000 image maximum steganogra-phy payload based on MPUI model [J].Journal of Software, 2014, 25(7):1606-1620.
[16] FILLER T, JUDAS J, FRIDRICH J. Gibbs construction in steganography[J].IEEE Transactions on Information Forensics and Security, 2010, 5(4): 705-720.
[17] MOHAND S A. Wavelet modeling using finite mixtures of generalized Gaussian distribution: application to texture discrimination and retrieval[J]. IEEE Transactions on Image Processing, 2012, 21(4):1452-1464.
[18] PANYAVARAPORN J, HORKAEW P, WONGTRAIRAT W. QR code watermarking algorithm based on wavelet transform[C] // Proceedings of the 13th International Symposium on Communications and Information Technologies. Piscataway: IEEE, 2013:791-796.
[19] JAMZAD M, YAGHMAEE F. Achieving higher stability in watermarking according to image complexity[J]. Scientia Iranica, 2006, 13(4):404-412.
[20] HALLER R S. Complexity of real images evaluated by densitometric analysis and psychophysical scaling[D]. USA: University of Arizona, 1970.
[21] 王向阳,杨红颖,郑宏亮,等.基于视觉权值的分块颜色直方图图像检索算法[J].自动化学报,2010,36(10):1489-1492. WANG Xiangyang, YANG Hongying, ZHENG Hongliang, et al. A Color block-histogram image retrieval based on visual weight[J].Acta Automatica Sinica, 2010, 36(10):1489-1492.
[22] DELAIGLE J F, DEVLEESCHOUWER C, MACQ B, et al. Human visual system fea-tures enabling watermarking[C] //Proceedings of 2002 IEEE International Conference on Multimedia and Expo. New York: IEEE, 2002: 489-492.
[23] JAIN A K, 韩博, 徐枫. 数字图像处理基础[M]. 北京:清华大学出版社,2006. JAIN A K, HAN Bo, XU Feng. Foundation of digital image processing[M]. Beijing: Tsinghua University Press, 2006.
[24] WU Jianzhen, XIE Jianying, YANG Yupu. An adaptive blind watermarking scheme utilizing neural network for synch ronization[J]. Journal of Harbin Institute of Technology, 2007, 14(2):281-286.
[25] KER A D. A capacity result for batch steganography [J]. IEEE Signal Process Let, 2007, 14(8):525-528.
[1] LIU Long-fei, YANG Xiao-yuan. On the linear complexity of a new generalized cyclotomic sequence with length p3 over GF(l) [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 24-31.
[2] . Linear complexity of balanced quaternary generalized cyclotomic sequences with Period pq [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 145-150.
[3] LIU Wu-ying, YI Mian-zhu, ZHANG Xing. A space-time-efficient multi-category text categorization algorithm [J]. J4, 2013, 48(11): 99-104.
[4] MA Yun-yan, LUAN Yi-hui*. Detecting sparse signal segments by local LRS method [J]. J4, 2012, 47(12): 1-5.
[5] CHEN Yue-jiao, ZHANG Ming-wang*. A full-newton step infeasible interior-point algorithm for monotone linear  complementarity problems based on a kernel function [J]. J4, 2012, 47(10): 81-88.
[6] HU Qiang, ZHANG Ming-wang*, LI Wei-hua. A second-order Mehrotra-type predictor-corrector algorithm for solving convex quadratic programming [J]. J4, 2011, 46(2): 89-96.
[7] TANG Jing-yong1,2, HE Guo-ping3. Primal-dual infeasible interior-point algorithm for  second-order cone programming [J]. J4, 2011, 46(11): 96-100.
[8] GUO Wen-juan, YANG Gong-ping*, DONG Jin-li. A review of fingerprint image segmentation methods [J]. J4, 2010, 45(7): 94-101.
[9] . A wideneighborhood predictorcorrecting algorithm for
linear programming
[J]. J4, 2009, 44(7): 66-70.
[10] WANG Jin-Ling, LAN Juan-Li. A special generalized self-shrinking sequence on GF(q) [J]. J4, 2009, 44(10): 91-96.
[11] ZHOU Yi-yuan,ZHANG Ming-wang*,LU¨ Yan-li,ZHAO Yu-qin . A wide-neighborhood predictor-corrector algorithm for convex quadratic programming [J]. J4, 2008, 43(9): 73-80 .
[12] WANG Jin-ling,LIU Zong-cheng . The main-controlled generator [J]. J4, 2008, 43(1): 81-87 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!