Abstract
With the widespread growth of digital information and improved internet technologies, the demand for improved information security techniques has significantly increased due to privacy leakage, identity theft, illegal copying, and data distribution. Because of this, data hiding approaches have received much attention in several application areas. However, those approaches are unable to solve many issues that are necessary to measure in future investigations. This survey provides a comprehensive survey on data hiding techniques and their new trends for solving new challenges in real-world applications. The notable applications are telemedicine, 3D objects, mobile devices, cloud/distributed computing and data mining environments, chip and hardware protection, cyber physical systems, internet traffic, fusion of watermarking and encryption, joint compression and watermarking, biometric watermarking, watermarking at the physical layer, and many other perspectives. Further, the potential issues that existing approaches of data hiding face are identified. I believe that this survey will provide a valuable source of information for finding research directions for fledgling researchers and developers.
- A. K. Singh, B. Kumar, G. Singh, and A. Mohan (Eds.). 2017. Medical Image Watermarking: Techniques and Applications. Multimedia Systems and Applications. Springer.Google Scholar
- A. K. Singh, B. Kumar, G. Singh, and A. Mohan. 2016. Multiple watermarking technique for securing online social network contents using back propagation neural network. Future Generation Computer Systems 86 (2016), 926--939.Google Scholar
Cross Ref
- C.-S. Lu, S.-K. Huang, C.-J. Sze, and H.-Y. M. Liao. 2000. Cocktail watermarking for digital image protection. IEEE Transactions on Multimedia 2, 4 (2000), 209--224.Google Scholar
Digital Library
- T. Bianchi and A. Piva. 2013. Secure watermarking for multimedia content protection: A review of its benefits and open issue. IEEE Signal Processing Magazine 30, 2 (2013), 87--96.Google Scholar
Cross Ref
- S. P. Mohanty, A. Sengupta, P. Guturu, and E. Kougianos. 2017. Everything you want to know about watermarking: From paper marks to hardware protection. IEEE Consumer Electronics Magazine 6, 3 (2017), 83--91.Google Scholar
Cross Ref
- S. Iftikhar, M. Kamran, E. U. Munir, and S. U. Khan. 2015. A reversible watermarking technique for social network data sets for enabling data trust in cyber, physical, and social computing. IEEE Systems Journal 11, 1 (2015), 197--206.Google Scholar
Cross Ref
- S. Thakur, A. K. Singh, S. P. Ghrera, and M. Dave. 2018. Watermarking techniques and its applications in tele-health: A technical survey. In Cryptographic and Information Security Approaches for Images and Videos, S. Ramakrishnan (Ed.). CRC Press, Boca Raton, FL, 467--511Google Scholar
- T. Nie, L. Zhou, and Y. Li. 2013. Hierarchical watermarking method for FPGA IP protection. IETE Technical Review 30, 5 (2013), 367--374.Google Scholar
Cross Ref
- A. Sengupta and S. Bhadauria. 2016. Exploring low cost optimal watermark for reusable IP cores during high level synthesis. IEEE Access 4 (2016), 2198--2215.Google Scholar
Cross Ref
- A. Giakoumaki, S. Pavlopoulos, and D. Koutsouris. 2006. Multiple image watermarking applied to health information management. IEEE Transactions on Information Technology in Biomedicine 10, 4 (2006), 722--732.Google Scholar
Digital Library
- A. Rocek, K. Slavicek, O. Dostal, and M. Javornik. 2016. A new approach to fully-reversible watermarking in medical imaging with breakthrough visibility. Biomedical Signal Processing and Control 29 (2016), 44--52.Google Scholar
Cross Ref
- H. Nyeem, W. Boles, and C. Boyd. 2015. Content-independent embedding scheme for multi-modal medical image watermarking. Biomedical Engineering Online, 14 (2015), 7.Google Scholar
Cross Ref
- A. Zear, A. K. Singh, and P. Kumar. 2018. A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimedia Tools and Applications 77, 4 (2018), 4863--4882.Google Scholar
Cross Ref
- A. K. Singh, M. Dave, and A. Mohan. 2016. Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimedia Tools and Applications 75, 14 (2016), 8381--8401.Google Scholar
Digital Library
- P. Tsai, Y. C. Hu, and H. L. Yeh. 2009. Reversible image hiding scheme using predictive coding and histogram shifting. Signal Processing 86, 6 (2009), 1129--1143.Google Scholar
Digital Library
- E. Ganic and A. M. Eskicioglu. 2004. Robust DWT-SVD domain image watermarking: Embedding data in all frequencies. In Proceedings of the Workshop on Multimedia and Security. 166--174.Google Scholar
- Xiao Wei Li and Seok Tae Kim. 2013. Optical 3D watermark based digital image watermarking for telemedicine. Optics and Lasers in Engineering 51, 12 (2013), 1310--1320.Google Scholar
Cross Ref
- K. S. Sankaran, H. Abhi Rayna, V. Mangu, V. R. Prakash, and N. Vasudevan. 2019. Image water marking using DWT to encapsulate data in medical image. In Proceedings of the International Conference on Communication and Signal Processing (ICCSP’19). 568--571.Google Scholar
- K. Ma, W. Zhang, X. Zhao, N. Yu, and F. Li. 2013. Reversible data hiding in encrypted images by reserving room before encryption. IEEE Transactions on Information Forensics and Security 8, 3 (2013), 553--562.Google Scholar
Digital Library
- X. Zhang. 2011. Reversible data hiding in encrypted images. IEEE Signal Processing Letters 18, 4 (2011), 255--258.Google Scholar
Cross Ref
- X. Zhang. 2012. Separable reversible data hiding in encrypted image. IEEE Transactions on Information Forensics and Security 7, 2 (2012), 826--832.Google Scholar
Digital Library
- W. Zhang, K. Ma, and N. Yu. 2014. Reversibility improved data hiding in encrypted images. Signal Processing 94 (2014), 118--127.Google Scholar
Digital Library
- S. Zheng, D. Li, D. Hu, D. Ye, L. Wang, and J. Wang. 2016. Lossless data hiding for encrypted images with high capacity. Multimedia Tools and Applications 75, 21 (2016), 13765--13778.Google Scholar
Digital Library
- W. Hong, T. Chen, and H. Wu. 2012. An improved reversible data hiding in encrypted images using side match. IEEE Signal Processing Letters 19, 4 (2012), 199--202.Google Scholar
Cross Ref
- S. Thakur, A. K. Singh, and S. P. Ghrera. 2018. NSCT domain based secure multiple watermarking technique through lightweight encryption for medical images. Concurrency and Computation: Practice and Experience. Epub Ahead of Print. December 26, 2018.Google Scholar
- N. K. Nishchal. 2009. Optical image watermarking using fractional Fourier transform. Journal of Optics 38, 1 (2009), 22--28.Google Scholar
Cross Ref
- X. Cao, L. Du, X. Wei, D. Meng, and X. Guo. 2016. High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Transactions on Cybernetics 46, 5 (2016), 1132--1143.Google Scholar
Cross Ref
- S. Thakur, A. K. Singh, S. P. Ghrera, and A. Mohan. 2018. Chaotic based secure watermarking approach for medical images. Multimedia Tools and Applications 79 (2018), 4263--4276.Google Scholar
Cross Ref
- A. K. Singh. 2019. Robust and distortion control dual watermarking in LWT domain using DCT and error correction code for color medical image. Multimedia Tools and Applications 78 (2019), 30523--30533.Google Scholar
Cross Ref
- S. Borra and R. Thanki. 2020. Crypto-watermarking scheme for tamper detection of medical images. Computer Methods in Biomechanics and Biomedical Engineering: Imaging & Visualization 8, 4 (2020), 345--355.Google Scholar
Cross Ref
- M.-W. Chao, C.-H. Lin, C.-W. Yu, and T.-Y. Lee. 2009. A high capacity 3D steganography algorithm. IEEE Transactions on Visualization and Computer Graphics 15, 2 (2009), 274--284.Google Scholar
Digital Library
- Q. S. Ai, Q. Liu, Z. D. Zhou, L. Yang, and S. Q. Xie. 2009. A new digital watermarking scheme for 3D triangular mesh models. Signal Processing 89, 11 (2009), 2159--2170.Google Scholar
Digital Library
- Y. Yang, R. Pintus, H. Rushmeier, and I. Ivrissimtzis. 2017. A 3D steganalytic algorithm and steganalysis-resistant watermarking. IEEE Transactions on Visualization and Computer Graphics 23, 2 (2017), 1002--1013.Google Scholar
Digital Library
- J.-W. Cho, R. Prost, and H.-Y. Jung. 2007. An oblivious watermarking for 3-D polygonal meshes using distribution of vertex norms. IEEE Transactions on Signal Processing 55, 1 (2007), 142--155.Google Scholar
Digital Library
- Y. Yang, R. Pintus, H. Rushmeier, and I. Ivrissimtzis. 2014. A steganalytic algorithm for 3D polygonal meshes. In Proceedings of the IEEE International Conference on Image Processing. 4782--4786.Google Scholar
- Y. Yang and I. Ivrissimtzis. 2014. Mesh discriminative features for 3D steganalysis. ACM Transactions on Multimedia Computing, Communications, and Applications 10, 3 (2014), Article 27, 13 pages.Google Scholar
Digital Library
- A. Al-Haj, Md. E. Farfoura, and A. Mohammad. 2017. Transform-based watermarking of 3D depth-image-based-rendering images. Measurement 95 (2017), 405--417.Google Scholar
Cross Ref
- M.-J. Lee, K.-S. Kim, and H.-K. Lee. 2010. Digital cinema watermarking for estimating the position of the pirate. IEEE Transactions on Multimedia 12, 7 (2010), 605--621.Google Scholar
Digital Library
- Md. Asikuzzaman, J. Alam, Md. A. J. Lambert, and M. R. Pickering. 2016. Robust DT CWT-based DIBR 3D video watermarking using chrominance embedding. IEEE Transactions on Multimedia 18, 9 (2016), 1733--1748.Google Scholar
Digital Library
- H. D. Kim, J. W. Lee, T. W. Oh, and H. K. Lee. 2012. Robust DT-CWT watermarking for DIBR 3D images. IEEE Transactions on Broadcasting 58, 4 (2012), 533--543.Google Scholar
Cross Ref
- A. Kejariwal, S. Gupta, A. Nicolau, N. D. Dutt, and R. Gupta. 2006. Energy efficient watermarking on mobile devices using proxy-based partitioning. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 14, 6 (2006), 625--636.Google Scholar
Digital Library
- M. Zhaofeng and J. Ming. 2018. Secure and efficient DRM watermark algorithm of forensics in mobile internet. EURASIP Journal on Image and Video Processing 2018 (2018), Article 69.Google Scholar
- S. G. Shini, T. Thomas, and K. Chithraranja. 2012. Cloud based medical image exchange-security challenges. Procedia Engineering 38 (2012), 3454--3461.Google Scholar
- K. Liu, W. Zhang, and X. Dong. 2017. A cloud-user protocol based on ciphertext watermarking technology. Security and Communication Networks 2017 (2017), Article 4376282, 14 pages.Google Scholar
- X. Cao, Z. Fu, and X. Sun. 2016. A privacy-preserving outsourcing data storage scheme with fragile digital watermarking-based data auditing. Journal of Electrical and Computer Engineering 2016 (2016), Article 3219042, 7 pages.Google Scholar
- H. L. Khor, S.-C. Liew, and J. Mohd. Zain. 2016. Parallel digital watermarking process on ultrasound medical images in multicores environment. International Journal of Biomedical Imaging 2016 (2016), Article 9583727, 14 pages.Google Scholar
- J. J. Shen and J. M. Ren. 2010. A robust associative watermarking technique based on vector quantization. Digital Signal Processing 20, 5 (2010), 1408--1423.Google Scholar
Digital Library
- U. Khadam, M. M. Iqbal, M. A. Azam, S. Khalid, S. Rho, and N. Chilamkurti. 2019. Digital watermarking technique for text document protection using data mining analysis. IEEE Access 7 (2019), 64955--64965.Google Scholar
Cross Ref
- H. Tufail, K. Zafar, and A. R. Baig. 2019. Relational database security using digital watermarking and evolutionary techniques. Computational Intelligence 35, 4 (2019), 693--716.Google Scholar
Cross Ref
- S. Iftikhar, M. Kamran, and Z. Anwar. 2015. RRW—A robust and reversible watermarking technique for relational data. IEEE Transactions on Knowledge and Data Engineering 27, 4 (2015), 1132--1145.Google Scholar
Digital Library
- M. Shehab, E. Bertino, and A. Ghafoor. 2008. Watermarking relational databases using optimization-based techniques. IEEE Transactions on Knowledge and Data Engineering 20, 1 (2008), 116--129.Google Scholar
Digital Library
- A. H. Gandomi, X.-S. Yang, A. H. Alavi, and S. Talatahari. 2013. Bat algorithm for constrained optimization tasks. Neural Computing and Applications 22, 6 (2013), 1239--1255.Google Scholar
Cross Ref
- M. E. Farfoura and S. J. Horng. 2010. A novel blind reversible method for watermarking relational databases. In Proceedings of the International Symposium on Parallel and Distributed Processing with Applications (ISPA’10).Google Scholar
- D. Ziener and J. Teich. 2008. Power signature watermarking of IP cores for FPGAs. Journal of Signal Processing Systems 51 (2008), 123--136.Google Scholar
Digital Library
- F. Koushanfar, I. Hong, and M. Potkonjak. 2005. Behavioral synthesis techniques for intellectual property protection. ACM Transactions on Design Automation of Electronic Systems 10, 3 (2005), 523--545.Google Scholar
Digital Library
- P. Sarkar, D. Roy, A. Sengupta, and M. K. Naskar. 2019. Signature-free watermark for protecting digital signal processing cores used in CE devices [hardware matters]. IEEE Consumer Electronics Magazine 8, 1 (2019), 92--94.Google Scholar
Cross Ref
- R. Srivastava, B. Kumar, A. K. Singh, and A. Mohan. 2018. Computationally efficient joint imperceptible image watermarking and JPEG compression: A green computing approach. Multimedia Tools and Applications 77, 13 (2018), 16447--16459.Google Scholar
Digital Library
- A. V. Subramanyam, S. Emmanuel, and M. S. Kankanhalli. 2012. Robust watermarking of compressed and encrypted JPEG2000 images. IEEE Transactions on Multimedia 14, 3 (2012), 703--716.Google Scholar
Digital Library
- S. J. J. Mary, C. S. Christopher, and S. A. Joe. 2016. Novel scheme for compressed image authentication using LSB watermarking and EMRC6 encryption. Circuits and Systems 7, 8 (2016), 1722--1733.Google Scholar
Cross Ref
- A. Mishra, R. Gupta, and S. Jain. 2019. Secure and robust color image watermarking scheme using partial homomorphic cryptosystem in ASWDR compressed domain. Multimedia Tools and Applications 78 (2019), 22127--221541.Google Scholar
Cross Ref
- M. Vatsa, R. Singh, and A. Noore. 2009. Feature based RDWT watermarking for multimodal biometric system. Image and Vision Computing 27, 3 (2009), 293--304.Google Scholar
Digital Library
- A. K. Jain and U. Uludag. 2003. Hiding biometric data. IEEE Transactions on Pattern Analysis and Machine Intelligence 25, 11 (2003), 1494--1498.Google Scholar
Digital Library
- P. Singh, B. Raman, and P. P. Roy. 2017. A multimodal biometric watermarking system for digital images in redundant discrete wavelet transform. Multimedia Tools and Applications 76, 3 (2017), 3871--3897.Google Scholar
Digital Library
- P. Aparna and P. V. V. Kishore. 2019. Biometric-based efficient medical image watermarking in e-healthcare application. IET Image Processing 13, 3 (2019), 421--428.Google Scholar
Cross Ref
- J. Feng and M. Potkonjak. 2003. Real-time watermarking techniques for sensor networks. In Proceedings of SPIE—The International Society for Optical Engineering.Google Scholar
- B. Harjito, V. Potdar, and J. Singh. 2012. Watermarking technique for wireless sensor networks: A state of the art. In Proceedings of the 8th International Conference on Semantics, Knowledge, and Grids.Google Scholar
- B. Satchidanandan and P. R. Kumar. 2017. Dynamic watermarking: Active defense of networked cyber-physical systems. Proceedings of the IEEE 105, 2 (2017), 219--240.Google Scholar
Cross Ref
- P. L. Yu, J. S. Baras, and B. M. Sadler. 2008. Physical-layer authentication. IEEE Transactions on Information Forensics and Security 3, 1 (2008), 38--51.Google Scholar
Digital Library
- J. E. Kleider, S. Gifford, S. Chuprun, and B. Fette. 2004. Radio frequency watermarking for OFDM wireless networks. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing.Google Scholar
- X. Li, C. Yu, M. Hizlan, W.-T. Kimand, and S. Park. 2013. Physical layer watermarking of direct sequence spread spectrum signals. In Proceedings of the IEEE Military Communications Conference.Google Scholar
- T. Lu, R. Guo, L. Zhao, and Y. Li. 2016. A systematic review of network flow watermarking in anonymity systems. International Journal of Security and Its Applications 10, 3 (2016), 129--138.Google Scholar
Cross Ref
- A. Iacovazzi and Y. Elovici. 2017. Network flow watermarking: A survey. IEEE Communications Surveys & Tutorials 19, 1 (2017), 512--530.Google Scholar
Cross Ref
- D. Bhowmik and C. Abhayaratne. 2016. Quality scalability aware watermarking for visual content. IEEE Transactions on Image Processing 25, 11 (2016), 5158--5172.Google Scholar
Digital Library
- J.-M. Guo, G.-H. Lai, K. Wong, and L. C. Chang. 2015. Progressive halftone, watermarking using multilayer table lookup strategy. IEEE Transactions on Image Processing 24, 7 (2015), 2009--2024.Google Scholar
Cross Ref
- S. Heidari and M. Naseri. 2016. A novel LSB based quantum watermarking. International Journal of Theoretical Physics 55, 10 (2016), 4205--4218.Google Scholar
Cross Ref
- B. Lei, I. Song, and S. A. Rahman. 2013. Robust and secure watermarking scheme for breath sound. Journal of Systems and Software 86, 6 (2013), 1638--1649.Google Scholar
Digital Library
- X. Y. Wang and H. Zhao. 2006. A novel synchronization invariant audio watermarking scheme based on DWT and DCT. IEEE Transactions on Signal Processing 54, 12 (2006), 4835--4840.Google Scholar
Digital Library
- Z. Tao, H.-M. Zhao, J. Wu, J. H. Gu, Y. S. Xu, and D. Wu. 2010. A lifting wavelet domain audio watermarking algorithm based on the statistical characteristics of sub-band coefficients. Archives of Acoustics 35, 4 (2010), 481--491.Google Scholar
Cross Ref
- K. V. Bhat, I. Sengupta, and A. Das. 2010. An adaptive audio watermarking based on the singular value decomposition in the wavelet domain. Digital Signal Processing: A Review Journal 20, 6 (2010), 1547--1558.Google Scholar
Digital Library
- D. Hu, D. Zhao, and S. Zheng. 2019. A new robust approach for reversible database watermarking with distortion control. IEEE Transactions on Knowledge and Data Engineering 31, 6 (2019), 1024--1037.Google Scholar
Cross Ref
- K. Jawad and A. Khan. 2013. Genetic algorithm and difference expansion based reversible watermarking for relational databases. Journal of Systems & Software 86, 11 (2013), 2742--2753.Google Scholar
Digital Library
- M. B. Imamoglu, M. Ulutas, and G. Ulutas. 2017. A new reversible database watermarking approach with firefly optimization algorithm. Mathematical Problems in Engineering 2017 (2017), Article 1387375, 14 pages.Google Scholar
- M. E. Farfoura and S. J. Horng. 2010. A novel blind reversible method for watermarking relational databases. In Proceedings of the International Symposium on Parallel and Distributed Processing with Applications. 563--569.Google Scholar
- S. Iftikhar, M. Kamran, and Z. Anwar. 2015. RRW—A robust and reversible watermarking technique for relational data. IEEE Transactions on Knowledge & Data Engineering 27, 4 (2015), 1132--1145.Google Scholar
Cross Ref
- Jamal N. Bani Salameh. 2019. A new approach for securing medical images and patient's information by using a hybrid system. International Journal of Network Security 19, 4 (2019), 28--39.Google Scholar
- S. Arunkumar, V. Subramaniyaswamy, V. Vijayakumar, N. Chilamkurti, and R. Logesh. 2019. SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images. Measurement 139 (2019), 426--437.Google Scholar
Cross Ref
- C. C. Chang, Y. P. Hsieh, and C. H. Lin. 2008. Sharing secrets in stego images with authentication. Pattern Recognition 41, 10 (2008), 3130--3137.Google Scholar
Digital Library
- C. C. Wu, S. J. Kao, and M. S. Hwang. 2011. A high quality image sharing with steganography and adaptive authentication scheme. Journal of Systems and Software 84, 12 (2011), 2196--2207.Google Scholar
Digital Library
- H. R. Kanan and B. Nazeri. 2014. A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Systems with Applications 41, 14 (2014), 6123--6130.Google Scholar
Cross Ref
- Mohamed Elhoseny, Gustavo Ramirez-Gonzalez, Osama M. Abu-Elnasr, Shihab A. Shawkat, N. Arunkumar, and Ahmed Farouk. 2018. Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 6 (2018), 20596--20608.Google Scholar
Cross Ref
- A. S. Anwar, K. K. A. Ghany, and H. E. Mahdy. 2015. Improving the security of images transmission. International Journal of Bio-Medical Informatics and e-Health 3, 4 (2015), 7--13.Google Scholar
- X. Wang, E. Miao, and H. Yang. 2012. A new SVM-based image watermarking using Gaussian--Hermite moments. Applied Soft Computing 12, 2 (2012), 887--903.Google Scholar
Digital Library
- H. Tsai and D. Sun. 2007. Color image watermark extraction based on support vector machines. Information Sciences 177, 2 (2007), 550--569.Google Scholar
Cross Ref
- H. Peng, J. Wang, and W. Wang. 2010. Image watermarking method in multi-wavelet domain based on support vector machines. Journal of Systems and Software 83, 8 (2010), 1470--1477.Google Scholar
Digital Library
- Y. Fu and R. Shen. 2008. Color image watermarking scheme based on linear discriminant analysis. Computer Standards & Interfaces 30, 3 (2008), 115--120.Google Scholar
Digital Library
- D. Li, L. Deng, B. B. Gupta, H. Wang, and C. Choi. 2019. A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Information Sciences 479 (2019), 432--447.Google Scholar
Cross Ref
- G. Badshah, S. Liew, J. Zain, and M. Ali. 2015. Watermark compression in medical image watermarking using Lempel-Ziv-Welch (LZW) lossless compression technique. Journal of Digital Imaging 29, 2 (2015), 216--225.Google Scholar
Cross Ref
- E. Etemad. 2017. Robust image watermarking scheme using bit-plane of Hadamard coefficients. Multimedia Tools and Applications 77, 2 (2017), 2033--2055.Google Scholar
Digital Library
- Q. Su and B. Chen. 2017. Robust color image watermarking technique in the spatial domain. Soft Computing 22, 1 (2017), 91--106.Google Scholar
Digital Library
- Z. Meng, T. Morizumi, S. Miyata, and H. Kinoshita. 2018. Design scheme of copyright management system based on digital watermarking and blockchain. In Proceedings of the IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC’18). 359--364.Google Scholar
- A. Anand and A. K. Singh. 2020. An improved DWT-SVD domain watermarking for medical information security. Computer Communications 512 (2020), 72--80.Google Scholar
Cross Ref
- Y. Sun, R. Xu, L. Chen, and X. Hu. 2015. Image compression and encryption scheme using fractal dictionary and Julia set. IET Image Processing 9, 3 (2015), 173--183.Google Scholar
Cross Ref
- X.-J. Tong, P. Chen, and M. Zhang. 2017. A joint image lossless compression and encryption method based on chaotic map. Multimedia Tools and Applications 76, 12 (2017), 13995--14020.Google Scholar
Digital Library
Index Terms
Data Hiding: Current Trends, Innovation and Potential Challenges
Recommendations
Data Hiding Using Flexible Multi-bit MER
ISBAST '13: Proceedings of the 2013 International Symposium on Biometrics and Security TechnologiesMulti-bit minimum error replacement (MER) is a method that can embed multi-bit logo/secret data into k least-significant bits (LSBs) of cover data only introduces minimum embedding error (MEE). However, k-LSBs MER suffers from weak robustness. Moreover, ...
A lossless robust data hiding scheme
This paper presents a lossless robust data hiding scheme. The original cover image can be recovered without any distortion after the hidden data have been extracted if the stego-image remains intact, and on the other hand, the hidden data can still be ...
A novel reversible data hiding scheme based on AMBTC compression technique
Data hiding encompasses a wide range of applications for embedding messages in content. However, hiding data inevitably destroys the host image, even though the distortion is imperceptible. To enhance the hiding capacity and maintain the quality of the ...






Comments