JSEA  Vol.2 No.5 , December 2009
Information Hiding Method Based on Block DWT Sub-Band Feature Encoding
ABSTRACT
For realizing of long text information hiding and covert communication, a binary watermark sequence was obtained firstly from a text file and encoded by a redundant encoding method. Then, two neighboring blocks were selected at each time from the Hilbert scanning sequence of carrier image blocks, and transformed by 1-level discrete wavelet transformation (DWT). And then the double block based JNDs (just noticeable difference) were calculated with a visual model. According to the different codes of each two watermark bits, the average values of two corresponding detail sub-bands were modified by using one of JNDs to hide information into carrier image. The experimental results show that the hidden information is invisible to human eyes, and the algorithm is robust to some common image processing operations. The conclusion is that the algorithm is effective and practical.

Cite this paper
nullQ. SUN, W. MA, W. YAN and H. DAI, "Information Hiding Method Based on Block DWT Sub-Band Feature Encoding," Journal of Software Engineering and Applications, Vol. 2 No. 5, 2009, pp. 383-387. doi: 10.4236/jsea.2009.25051.
References
[1]   M. Barni, F. Bartolini, and A. Piva, “Improved wavelet- based watermarking through pixel-wise masking,” IEEE Transactions on Image Processing, Vol. 10, No. 5, pp. 783–791, 2001.

[2]   H. F. Yang and X. W. Chen, “A robust image-adaptive public watermarking technique in wavelet domain,” Journal of Software, Vol. 14, No. 9, pp. 1652–1660, 2003.

[3]   J. G. Cao, J. E. Fowler, and N. H. Younan, “An image- adaptive watermark based on a redundant wavelet trans-form,” In: Pitas I, ed. Proceedings of the IEEE Interna-tional Conference on Image Processing, Thessaloniki, pp. 277–280, 2001.

[4]   Z. M. Wang, Y. J. Zhang, and J. H. Wu, “A wavelet do-main watermarking technique based on human visual system,” Journal of Nanchang University (Natural Sci-ence), Vol. 29, No. 4, pp. 400–403, 2005.

[5]   Q. D. Sun, W. X. Ma, W. Y. Yan, and H. Dai, “Text en-cryption technique based on robust image watermarking,” Journal of Image and Graphics, Vol. 13, No. 10, pp. 1942–1946, 2008.

[6]   L. Y. Wu and F. Yang, “An improved digital watermark-ing algorithm based on DWT,” Control and Automation, Vol. 23, No. 6(3), pp. 46–47, 59, 2007.

 
 
Top