Open Access Open Access  Restricted Access Subscription or Fee Access

An Efficient Digital Watermarking Algorithm Based on DCT and BCH Error Correcting Code

Saeideh Nabipour, Javad Javidan, Majid Khorrami, Jila Azimzadeh

Abstract


Watermarking is a technique for hiding of data in a medium coverage so that its presence is not detectable by a human eye and is recoverable only by the authorized recipient. Two of the most important features of watermarked image are transparency and robustness which are largely related to the security of watermarking algorithms. In this paper, an image watermarking scheme based on BCH error correction code in Discrete Cosine Transformation (DCT) domain is considered. Before embedding process, the watermark is encoded through BCH coding. Then it is embedded into the Discrete Cosine Transformation (DCT) coefficients of cover image.  In order to decrease embedding complexity and speed up the process of finding the best position to insert a watermark signal, lookup table method is utilized. The key features of proposed method include the reduction of time required in the process embedding of information, security and ability to correct the error caused by variety of attacks and destructions as well. Watermarked image robustness has been investigated against different kinds attacks and the simulation results indicate that the proposed algorithm outperforms the existing methods in terms of imperceptibility, robustness and security.

Keywords


BCH Code, Digital Watermark, DCT, Error Correcting Code (ECC), Embedding Efficiency.

Full Text:

PDF

References


M. Kaur, S. Jindal and S. Behal, “A Study of Digital Image Watermarking,” vol 2, February 2012.

S. A. Vanstone, An Introduction to Error Correcting Codes with Applications,Springer Science Business Media, New York, 1989.

C. Munuera, “Steganography and error-correcting codes,” Signal Process, vol. 87, pp. 1528-1533, 2007.

A. Westfeld, “F5: A steganographic algorithm, “High capacity despite better steganalysis”,” in Information Hiding, ser. Lecture Notes Comput. Sci... Berlin, Germany: Springer, 2001, vol. 2137, pp. 289–302.

R. Zhang, V. Sachnev, and H. J. Kim, “Fast BCH syndrome coding for steganography,” in Information Hiding, ser. Lecture Notes Comput. Sci.. Berlin, Germany: Springer, vol. 5806, pp. 48–58, 2009.

D. Schonfeld, A. Winkler, “Embedding with syndrome coding based on BCH codes,” Proceedings of the workshop on Multimedia and Secrity, pp. 214-223, 2006.

V. Sachnev, H. Joong Kim and R. Zhang, “Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding,” Proceedings of the 11th ACM workshop on Multimedia and Secrity, pp. 131-140, 2009.

P. Cika, M. Zukal, “Efficiency of BCH codes in digita image watermarking, ”Telecommunications and Signal Processing (TSP), 2012 35th International Conference on, , pp. 745-748, 2012.

C. Fontaine, F. Galand, “How Reed–Solomon codes can improve steganographic schemes,” EURASIP J. Inf. Security, vol. 2009, pp.274845-1–274845-10, 2009.

Y. Wu, “New list decoding algorithms for Reed–Solomon and BCH codes,” in Proc. Int. Symp. Inf. Theory, 2007, pp. 2806–2810.

S. Maity, C. Delpha and R. Boyer, “Watermarking on compressed data integrating convolution coding in integer wavelets,” International Journal of Wavelets Multiresolution and Information Processing, 2012.

W. Zhang, C. Li, X. Zhang, L. Xi, X. Tang and W. He, “A good performance watermarking LDPC code used in high-speed optical fiber communication system” Journal Optics Communications Elsevier, pp. 99–105, 2015.

C. Nafornita, A. Isar and M. Kovaci, “Increasing watermarking robustness using turbo codes,” Intelligent Signal Processing, WISP IEEE International Symposium on, pp. 113-118, 2009.

L. Marvel, Image Steganography for Hidden Communication. PhD thesis, Univ. of Delaware, 1999.

A. M. Alattar, O. M, Alattar, “Watermarking electronic text documents containing justified paragraphs and irregular line spacing,” Proc. Of SPIE Security, Stegano-graphy, and watermarking of Multimedia Context VI, San Jose, CA, pp. 685-695, 2004.

O. Findik, I. Babaoglu and E. Ulker, “Implementation of BCH coding on artificial neural network-based color image watermarking,” International Journal of Innovative Computing, Information and Control, vol. 7, no. 8, pp. 4805-4814, 2011.

R. Crandall, Some notes on steganography 1998 [Online]. Available: http://os.inf.tudresden.de/westfeld/crandall.pdf.

J. Fridrich, M. Goljan, and D. Soukal, “Wet paper codes with improved embedding efficiency,” IEEE Trans. Inf. Forensics Security, vol. 1, no.1, pp. 102–110, Mar. 2006.

J. Fridrich and D. Soukal, “Matrix embedding for large payloads,” IEEE Trans. Inf. Forensics Security, vol. 1, no. 3, pp. 390–395, Sep. 2006.

A. Westfeld, “F5: A steganographic algorithm, “High capacity despite better steganalysis”,” in Information Hiding, ser. Lecture Notes Comput. Sci... Berlin, Germany: Springer, 2001, vol. 2137, pp. 289–302.

D. Schönfeld, A. Winkler, “Reducing the complexity of syndrome coding for embedding,” in Information Hiding, ser. Lecture Notes Comput. Sci... Berlin, Germany: Springer, vol. 4567, pp. 145–158, 2007.

S. Lin, D. J. Costello, Error Control Coding. Norwood: Prentice Hall, 2004.

Y. Jiang, A Practical Guide to Error-Control Coding Using Matlab. Boston, London, 2010.

R. Zhang, V. Sachnev, M. B. Botnan, H. J. Kim and J. Jeo, “An efficient embedder for BCH coding for steganography,” IEEE Transactions on information theory, vol. 58, no. 12, pp. 7272-7279, December 2012.

Z. Zhao, F. Wu, S. Yu, and J. Zhou, “A lookup table based fast algorithm for finding roots of quadric or cubic polynomials in the ,” J. Huazhong Univ. Sci. Technol. (Nature Science Edition), vol. 33, no. 2, pp. 70–72, 2005.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.