Đề xuất một số lược đồ nhúng tin và thủy vân dễ vỡ khóa công khai trên ảnh JPEG
This paper proposes some new schemes for data hiding and watermarking in JPEG images by using quantized discrete Cosine transform (DCT) blocks. The DCT coefficients are segmented into groups of continuous elements. For each group, r bits can be embedded by changing at most one element of the group. In comparison to some widely used data hiding schemes for JPEG images, our data hiding schemes achieve higher capability and better stego-image quality. The proposed public key watermarking method based on an embedded algorithm is capable to authenticate digital images.
A. ALMOHAMMAD, G. GHINEA AND R.M.HIERONS “JPEG steganography: a performance evaluation of quantization tables”, Advanced Information Networking and Applications conference, IEEE, pp471–478, 2009.
C.C.CHANG, C.C. LIN, C.S.TSENG AND W.L.TAI, “Reversible hiding in DCT-based compressed images”, Information Sciences, Vol.177, pp.2768-2786, 2007.
C.C.CHANG, C.S.TSENG AND C.C.LIN. “Hiding Data in Binary Images”, ISPEC 2005, LNCS 3439, pp.338-349, 2005.
Y.CHEN, H.PAN, AND C.S. TSENG, “A secure Data Hiding Scheme for Two color images”, IEEE Symposium on Computer and Communication, 2000.
C.FEI, R.KWONG AND D.KUNDAR, “Secure Semi-Fragile Watermarking for Image Authentication”, IEEE, 2009.
J_Steg_http://www.ussrback.com/crypto/steganography/DOS/jsteg.txt , 2008.
M.IWATA, K.MIYAKE AND A.SHIOZAKI, “Digital Steganography Utilizing features of JPEG images”, IEICE, 2004.
H.Y.KIM AND R.L.DE. QUEIROZ, “A New Public Key Authentication Watermarking for Binary Document Images”, IEEE, 2004.
H.Y. KIM, R.L.DE. QUEIROZ, “Alteration – Locating Authentication Watermarking for Binary and Halftone Images”, IEEE Transactions on Signal Processing, 2004.
H.Y. KIM, “A New Public Key Authentication Watermarking for Binary Document Images resistant to parity attacks”, IEEE, 2005.
C.C. LIN AND F.F. SHIU, “DCT-Base Reversible Data Hiding Scheme”, Journal of software, 2010.
C.L. LIU, C.R.LIAO “High-performance JPEG ste-ganography using complementary embedding strategy”, Pattern recogn 41, pp.2945–2955, 2009.
B.C.MOHAN AND S.KUMAR, “A Robust Digital Image Watermarking Scheme Using Singular Value Decomposition”, Journal of Multimedia 3(1), pp.7-15, 2008.
R.MUNIR, B.RIYANTO, S.SUTIKNO AND W.P.AGUNG, “A public key watermarking method for still image based on random permutation”,in Proc Iternational Joint Conference in Engineering, 2008.
N.PROVOS, “Defening against statical steganalysis”. In 10th USENIX Security Symposium, 2001 (323336).
S. SACHDEVA AND A. SHARMA AND GILL “Colour Image Steganography Using Modified JPEG Quantization Technique”, Int J Latest Res Sci tech(1), pp.1-5, 2012.
K.WANG, Y.J.HE AND Z.M. LU, “A high capacity lossless data hiding scheme for jpeg images”, Journal of Systems and Software (86), 2013.
C.C. WANG AND Y.C.HSU, “New watermarking algorithm with data authentication and reduction for JPEG image”, journal of electronic image, 2008.
M.Y.WU AND J.H.LEE, “A Novel Data Embedding Method for Two-color Facsimile Images”, in Proc. Int. Symp, on Multimedia Information Processing, Chung-Li, Taiwan,R.O.C, 1998.
ĐỖ VĂN TUẤN, TRẨN ĐĂNG HIÊN, CAO THỊ LUYÊN VÀ PHẠM VĂN ẤT, “Một thuật toán thủy vân bền vững khóa công khai cho ảnh màu dựa trên sự hoán vị ngẫu nhiên trong các tập con”, Tạp chí CNTT&TT, Tập V-1, Số 9 (29), tháng 6 -2013.