Next Article in Journal
Analysis of the Magnetocaloric Effect in Heusler Alloys: Study of Ni50CoMn36Sn13 by Calorimetric Techniques
Next Article in Special Issue
Applied Cryptography Using Chaos Function for Fast Digital Logic-Based Systems in Ubiquitous Computing
Previous Article in Journal
Information Geometry on the \(\kappa\)-Thermostatistics
Previous Article in Special Issue
Comparing Security Notions of Secret Sharing Schemes
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Information Hiding Method Using Best DCT and Wavelet Coefficients and Its Watermark Competition

Department of Electrical Engineering, Tokyo University of Science, 6-3-1 Niijuku, Katsushika-ku, 125-8585 Tokyo, Japan
*
Author to whom correspondence should be addressed.
Entropy 2015, 17(3), 1218-1235; https://doi.org/10.3390/e17031218
Submission received: 15 January 2015 / Revised: 2 March 2015 / Accepted: 10 March 2015 / Published: 12 March 2015

Abstract

:
In recent years, information hiding and its evaluation criteria have been developed by the IHC (Information Hiding and its Criteria) Committee of Japan. This committee was established in 2011 with the aim of establishing standard evaluation criteria for robust watermarks. In this study, we developed an information hiding method that satisfies the IHC evaluation criteria. The proposed method uses the difference of the frequency coefficients derived from a discrete cosine transform or a discrete wavelet transform. The algorithm employs a statistical analysis to find the best positions in the frequency domains for watermark insertion. In particular, we use the BCH (Bose-Chaudhuri-Hocquenghem) (511,31,109) code to error correct the watermark bits and the BCH (63,16,11) code as the sync signal to withstand JPEG (Joint Photographic Experts Group) compression and cropping attacks. Our experimental results showed that there were no errors in 10 HDTV-size areas after the second decompression. It should be noted that after the second compression, the file size should be less than 1 25 of the original size to satisfy the IHC evaluation criteria.

1. Introduction

Digital watermarking is a method that is used widely to protect the copyright of digital contents, and it is one of the underlying techniques required to realize the vision of ubiquitous computing [13]. Steganography based on various forms of information hiding is the focus when detecting the presence of a hidden message, whereas watermarking and fingerprinting are different problems. These issues have been studied in various fields [48].
Structural changes in protected contents occur often in real-world applications. Therefore, experimental benchmark evaluations of digital watermarking are needed to assess the techniques that are available at present. However, very few researchers have tested their algorithms extensively. Kutter and Petitcolas considered the methods used to evaluate and compare the performance of robust invisible watermarking systems [9]. They applied a duality approach to the watermarking evaluation problem where the evaluation criteria were divided into two groups: functionality and assurance [10].
In addition, several research groups have developed benchmarking tools, such as Stirmark, which can be used to select an attack from a comprehensive list [11]. Other benchmarking tools have been developed as part of the European Certimark program, which began in 1999 [12], the WET (Watermark Evaluation Testbed) project at Purdue University [13], the OpenWatermark framework [14], a theoretical framework for practical evaluations [15], a benchmarking tool based on genetic algorithms [16], a systematic method for determining the number of test images [17] and a stochastic approach [18] that also considers the evaluation method.
The First International Workshop on Information Hiding and Its Criteria for Evaluation (IWIHC2014) ( http://www.ieice.org/iss/emm/ihc/en/iwihc2014/), which included a watermarking competition, was held in Japan in conjunction with a major security conference, called ASIACCS2014 (ACM Symposium on Information, Computer and Communications Security). This workshop aimed at ascertaining the current state-of-the-art in digital watermarking algorithms. Only a few methods have been reported that satisfy the watermark criteria for images [1922]. In this workshop, we presented results in two competition categories: highest tolerance and highest image quality. In particular, we used the difference of the frequency coefficients derived from a discrete cosine transform and an error-correcting code (ECC) to satisfy the requirements of the Information Hiding and its Criteria [23], which both require coding tolerance and cropping tolerance.
In this study, we focused on the problem of obtaining the solution with the highest image quality according to the IHC evaluation criteria. Our proposed algorithm employs a statistical analysis to find the best positions in the frequency domains (a discrete cosine transform (DCT) or a discrete wavelet transform (DWT)) for watermark insertion. It should be noted that one of the most important goals is to satisfy the IHC evaluation criteria, but an additional objective is the introduction of our own IHC evaluation criteria.
The remainder of this paper is organized as follows. In Section 2, we present brief summaries of the IHC criteria. Section 3 describes the proposed algorithm, including watermark construction with an ECC, embedding, extraction and hiding capacity. The experimental results and conclusions are presented in Sections 4 and 5, respectively.

2. Summaries of the IHC Criteria

There have been many studies of digital watermarking, but the state-of-the-art has not yet reached the level required. The IHC Committee is working to improve this situation by promoting the development of digital watermarking techniques. In particular, it aims to help develop standard evaluation criteria and to sponsor watermark competitions based on these criteria [23].
In this section, we summarize the requirements of the IHC evaluation criteria.

2.1. Image Quality Assessment

The six images (color images that each contain more than 10 M pixels) provided by the IHC should be watermarked and then compressed. The file size should be less than 1 15 of the original size after the first compression, and the file size should be less than 1 25 of the original size after the second compression. The peak signal-to-noise ratio (PSNR) for each pair should be higher than 30 dB.

2.2. Tolerance Assessment

The files should be decompressed after the second compression. Ten HDTV-sized (1920 × 1080) images should be cropped from each decompressed image of 4608 × 3456 pixels. The vertices of these cropped images are listed in the document describing the IHC criteria. The watermark should be sufficiently tolerant, such that it can be detected in no less than 200 bits in each cropped image.

2.3. Watermark Information

The amount of watermark information that needs to be embedded comprises 200 bits. The information should be generated using eight ordered maximal length sequences. The initial values are listed in the document describing the IHC criteria.

3. Proposed Method

3.1. Overall Approach of Our System

Color images, such as RGB images, are comprised of three independent channels for the red, green and blue primary color components. Figure 1 shows the splitting of the color channels for a full RGB color image. In our system, the embedding process is applied to each channel repeatedly.
In this study, the cropping positions are based on the IHC evaluation criteria. Therefore, it is assumed that the cropped image size is known. According to the IHC evaluation criteria, 10 HDTV-sized (1920 × 1080) images should be cropped from each decompressed IHC standard image (4608 × 3456).
If a cropped image is selected as an area of M × N pixels in the watermarked image, we can select a size of M 2 × N 2 as an embedding block. At this point, the watermark and sync bits are embedded in each embedding block. For the entire original image (H × V, where H is the horizontal size and V is the vertical size) with each color channel, the number of embedding blocks is computed as 2 × H M × 2 × V N = 2 × 4 , 608 1 , 920 × 2 × 3 , 456 1 , 080 = 24 (rounding toward zero).
In this study, we prepared 10 types of watermark for embedding, which could be represented in binary form and generated using eight ordered maximal length sequences with 10 types of initial values based on the IHC evaluation criteria. The binary watermark (200 bits) was first coded using the well-known BCH codes to produce the actual embedded bits, as shown in Figure 2.

3.2. Encoding the Watermark

The BCH code is named after Bose, Ray-Chaudhuri and Hocquenghem, who described methods in 1959 and 1960 for designing codes over GF(2)with a specified design distance. Subsequently, the decoding algorithms were developed by Peterson et al. [24].
As shown in Figure 2, the BCH encoder generates a BCH code with message length k and codeword length n. For a given codeword length n, only specific message lengths k are valid for a BCH code. The error-correction capability (t) of the valid [n, k] pair used in this study can be described as follows: [n, k, t]. Tables 1 and 2 show all of the possible combinations for a BCH code of codeword lengths n = 63 and n = 511. In this study, we used [511, 31, 109] for the watermark bits and [63, 16, 11] for the sync bits based on a heuristic method. All of the test results obtained in the present study were generated using MATLAB. The BCH code implementation is readily available in the Communications System Toolbox in MATLAB.

3.3. Approach to One-Bit Embedding

In the first approach, a DCT was applied to an 8 × 8 pixel block-unit in one embedding block (960 × 540) to produce an M 2 × N 2 sized area. As a second approach for testing the best positions in the frequency domains, we selected 12 areas of the wavelet coefficients based on a statistical analysis.
As shown in Figure 3, this method can embed 4020 bits into one embedding block, because two pairwise DCT or DWT blocks are needed for one-bit embedding. The shaded elements in Figure 3 indicate the best positions for comparing the pairwise DCT or DWT coefficients in this study. Figure 4 presents an example of the application of statistical data in this study, which shows the statistical data for the IHC standard image (flower garden). To consider the quality and tolerance of image compression, we selected some frequency areas with relatively low entropy.

3.4. Embedding and Extraction

3.4.1. Embedding Process

As shown in Figure 3, let Da be an 8 × 8 DCT or DWT block, where a ∈ {1, …, 8,040} and Da(i), Da+1(i) is the comparison target for one-bit embedding, where i = 1, …, 4 or i = 1, …, 12. The insertion method is as follows (see Figure 5).
  • The original image is separated into color channels and subdivided into 8 × 8 pixel blocks. Before insertion, each 8 × 8 pixel block is processed using the DCT or DWT.
  • Let bw ∈ {0, 1} be the embedded value. Modify the DCT or DWT coefficient values in block Da according to the following rules.
To embed bw = 1:
if | D a ( i ) | | D a + 1 ( i ) | if ( | D a ( i ) | | D a + 1 ( i ) ) 10 | D a ( i ) = D a ( i ) α × s t ( if D a ( i ) < 0 ) D a ( i ) = D a ( i ) + α × s t ( if D a ( i ) 0 )
else
while ( | D a ( i ) | < | D a + 1 ( i ) | ) { D a ( i ) = D a ( i ) α ( if D a ( i ) < 0 ) D a ( i ) = D a ( i ) + α ( if D a ( i ) 0 ) }
To embed bw = 0:
if | D a ( i ) | < | D a + 1 ( i ) | if ( | D a ( i ) | | D a + 1 ( i ) ) 10 | D a ( i ) = D a ( i ) α × s t ( if D a ( i ) < 0 ) D a ( i ) = D a ( i ) + α × s t ( if D a ( i ) 0 )
else
while ( | D a ( i ) | | D a + 1 ( i ) | ) { D a ( i ) = D a ( i ) α ( if D a ( i ) < 0 ) D a ( i ) = D a ( i ) + α ( if D a ( i ) 0 ) } ,
where D is the current DCT or DWT block, D′ is the watermarked DCT or DWT block, α is the embedding strength and st is 1 2 for the sync bits and 1 4 for the watermark.

3.4.2. Extraction Process

The one-bit extraction method is as follows (see Figure 6).
  • Select two pairwise DCT or DWT coefficients in the watermarked block (Da and Da+1). Count the state according to:
    C n t C n t + 1 ( i f | D a ( i ) | | D a + 1 ( i ) | ) ,
    where Cnt is a count state variable with an initial value of zero.
  • The total comparison number is 3 × 3 = 9 (comparison of three DCT coefficients × three color channels). In the case of DWT, 12 × 3 = 42 are compared from the selected detail wavelet coefficients (comparison of 12 DWT coefficients × three color channels).
  • The total counter is assigned a majority decision rule to extract one bit.

3.5. Decoding the Extracted Bits

As mentioned in Section 3.2, the watermark is encoded using a BCH encoder, and the decoding process is shown in Figure 7.
The BCH decoder can correct up to a certain number of errors. Thus, the [511,31,109] BCH code can correct errors of up to 109 bits, which is referred to as a 109-ECC. We also used the [63,16,11] BCH code to correct the sync errors at the front of the selected embedding block.
The overall watermark extractor is as follows.
  • Extract 63 bits from a selected embedding block and obtain 16 bits using the BCH decoder.
  • Compare the Hamming distance (HD) between the extracted bits and the original sync bits using a threshold (Th). This threshold can be set based on a consideration of the system’s performance (where zero is the default value).
  • Extract 3577 bits from the remaining area of a selected embedding block, and obtain 217 bits using the BCH decoder (in the case where the HD is less than the threshold).
  • Finally, we can obtain the extracted watermark (200 bits after excluding 17 bits) after applying an authentication process using a cryptographic hash function (e.g., SHA256).

3.6. Data Hiding Capacity

According to the IHC criteria, the watermark should be sufficiently tolerant, such that it can be detected in no less than 200 bits in each cropped image. In this study, the number of embedding blocks was 24, and one block measured 960 × 540. The actual number of embedded bits in one block was 3640 bits because of the error correcting code. Thus, the overall hiding capacity for each IHC standard image (4608 × 3456) was 87,360 bits (3640 × 24). However, it should be noted that the amount of watermark information that needs to be embedded was 200 bits.
As mentioned in the Introduction, the highest image quality test included tolerance, i.e., JPEG compression and cropping tests. We need a robust watermarking scheme that has a good tradeoff of robustness and imperceptibility. Thus, we described how the BCH code can be used to satisfy the IHC criteria based on a specific example. For the IHC standard image, we selected ECC parameters with good balance (quality and tolerance).

4. Experimental Results

In total, six IHC standard images that each comprised 4608 × 3456 pixels were used in the experiment. We used the [511,31] BCH code for the watermark and the [63,16] BCH code for the sync data, which obtained suitable error correction performance levels with 109 bits and 11 bits, respectively.
The 2D lifting-based discrete wavelet transform leads to a speed-up when compared to the standard implementation. Therefore, in this paper, we choose db2 (Daubechies wavelet of order 2) to use the Daubechies 4-tap filter.
According to the IHC evaluation criteria, there are two competition categories: highest tolerance and highest image quality. However, we focus on obtaining a solution to the highest image quality problem.
The image quality was evaluated in terms of the PSNR and the mean structural similarity (MSSIM) [25]. The PSNR is a parameter that is used widely for evaluating image quality. The MSSIM is based on the characteristics of the human visual system, and it measures the structural similarity between two images. The MSSIM is equal to one if two images are identical. In the present study, the MSSIM measure used the following parameter settings: K1 = 0.01, K2 = 0.03. Table 3 shows the results for the highest image quality obtained by the DCT and DWT approaches, including the average compression ratio, PSNR value and MSSIM value. As shown in Table 3, the DCT approach using the best position performed best, although all of the approaches satisfied the criteria.
Table 4 shows the average error rates for 10 HDTV-size areas after the second decompression. The watermarks should be sufficiently tolerant, such that they can be detected in no less than 200 bits in each cropped image. Table 5 shows the cropping positions used in this experiment.
According to the IHC evaluation criteria, the compression ratio should be less than 1 15 ( = 0 . 0667 ) after the first coding and 1 25 ( = 0 . 04 ) after the second coding. The PSNR should be higher than 30 dB for the luminance signal.
The results shown in Table 4 demonstrate that these criteria were satisfied. The highest average PSNR was 37.0869 for the highest image quality after the second compression. In particular, the MSSIM indicated that we obtained a high level of structural similarity.
In addition, Figures 813 show the watermarked image obtained from the highest image quality category using the first watermark’s initial value of “10101010”.

5. Conclusions

In this study, we developed a novel and simple digital image watermarking method that satisfies the requirements of the IHC evaluation criteria. This method is based on the difference of the frequency coefficients derived from a DCT or a DWT and on an ECC. This simple approach is suitable for robust watermarking optimization when the evaluation items are predetermined.
It should be noted that the second international watermarking competition based on the IHC evaluation criteria, IWDW2015 (International Workshop on Digital Watermarking 2015) ( http://iwdw2015.tokyo/), will be held in Tokyo, Japan.

Author Contributions

Hyunho Kang was responsible for the planning, design, experiments and writing of the manuscript. Keiichi Iwamura reviewed the manuscript. Both authors have read and approved the final manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Davis, B. Signal rich art: Enabling the vision of ubiquitous computing. Proceedings of SPIE 7880, Media Watermarking, Security, and Forensics III, San Francisco, CA, USA, 23 January 2011.
  2. Kumar, K.K.; Geethakumari, G. Detecting misinformation in online social networks using cognitive psychology. Hum. Cent. Comput. Inf. Sci. 2014, 4. [Google Scholar] [CrossRef]
  3. Lee, J.D.; Sin, C.H.; Park, J.H. PPS-RTBF: Privacy protection system for right to be forgotten. J. Converg. 2014, 5, 37–40. [Google Scholar]
  4. Van Tilborg, H.C.A.; Jajodia, S. Encyclopedia of Cryptography and Security; Springer: Berlin/Heidelberg, Germany, 2011. [Google Scholar]
  5. Juneja, M.; Sandhu, P.S. A new approach for information security using an improved steganography technique. J. Inf. Proc. Syst. 2013, 9, 405–424. [Google Scholar]
  6. M.Bagade, A.; N.Talbar, S. A high quality steganographic method using morphing. J. Inf. Proc. Syst. 2014, 10, 256–270. [Google Scholar]
  7. Johnson, N.; Duric, Z.; Jajodia, S. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures; Kluwer Academic Publishers: Dordrecht, The Netherlands, 2001. [Google Scholar]
  8. Cox, I.; Miller, M.; Bloom, J.; Fridrich, J.; Kalker, T. Digital Watermarking and Steganography; Morgan Kaufmann: Burlington, MA, USA, 2007. [Google Scholar]
  9. Kutter, M.; Petitcolas, F. Fair benchmark for image watermarking systems. Proceedings of SPIE 3657, Security and Watermarking of Multimedia Contents, San Jose, CA, USA, 23 January 1999; 3657, pp. 226–239.
  10. Petitcolas, F. Watermarking schemes evaluation. IEEE Signal Process. Mag. 2000, 17, 58–64. [Google Scholar]
  11. Petitcolas, F.; Steinebach, M.; Raynal, F.; Dittmann, J.; Fontaine, C.; Fates, N. Public automated web-based evaluation service for watermarking schemes: StirMark benchmark. Proceedings of SPIE, Security and Watermarking of Multimedia Contents III, San Jose, CA, USA, 20 January 2001; 4314, pp. 575–584.
  12. Voloshynovskiy, S.; Pereira, S.; Pun, T. Attacks on digital watermarks: Classification, estimation-based attacks, and benchmarks. IEEE Commun. Mag. 2001, 39, 2–10. [Google Scholar]
  13. Kim, H.; Ogunleye, H.; Guitart, O.; Delp, E. The watermark evaluation testbed (WET). Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, USA, 18 January 2004; 5306, pp. 236–247.
  14. Michiels, B.; Macq, B. Benchmarking image watermarking algorithms with openwatermark. Proceedings of the 14th European Signal Processing Conference (EUSIPCO 2006), Florence, Italy, 4–8 September 2006.
  15. Dittmann, J.; Megías, D.; Lang, A.; Herrera-Joancomartí, J. Theoretical framework for a practical evaluation and comparison of audio watermarking schemes in the triangle of robustness, transparency and capacity. Trans. Data Hiding Multimed. Secur. I 2006, 4300. [Google Scholar] [CrossRef]
  16. Boato, G.; Conotter, V.; Natale, F.D.; Fontanari, C. Watermarking robustness evaluation based on perceptual quality via genetic algorithms. IEEE Trans. Inf. Forensics Secur. 2009, 4, 207–216. [Google Scholar]
  17. Piper, A.; Safavi-Naini, R. How to compare image watermarking algorithms. Trans. Data Hiding Multimed. Secur. IV 2009, 5510. [Google Scholar] [CrossRef]
  18. Conotter, V.; Boato, G.; Fontanari, C.; Natale, F. Robustness and security assessment of image watermarking techniques by a stochastic approach. Proceedings of SPIE 7245, Image Processing: Algorithms and Systems VII, San Jose, CA, USA, 18 January 2009.
  19. Hakka, M.; Kuribayashi, M.; Morii, M. DCT-OFDM based watermarking scheme robust against clipping attack. Proceedings of the 1st International Workshop on Information Hiding and Its Criteria for Evaluation, Kyoto, Japan, 3 June 2014; pp. 18–24.
  20. Hirata, N.; Kawamura, M. Digital watermarking method using LDPC code for clipped image. Proceedings of the 1st International Workshop on Information Hiding and Its Criteria for Evaluation, Kyoto, Japan, 3 June 2014; pp. 25–30.
  21. Tozuka, H.; Yoshida, M.; Fujiwara, T. Salt-and-pepper image watermarking system for IHC evaluation Criteria. Proceedings of the 1st International Workshop on Information Hiding and Its Criteria for Evaluation, Kyoto, Japan, 3 June 2014; pp. 31–36.
  22. Kang, H.; Iwamura, K. Watermarking based on the difference of discrete cosine transform coefficients and an error-correcting code. Proceedings of the 1st International Workshop on Information Hiding and Its Criteria for Evaluation, Kyoto, Japan, 3 June 2014; pp. 9–17.
  23. IHC. Information Hiding and its Criteria for Evaluation. Available online: http://www.ieice.org/iss/emm/ihc/en/index.php accessed on 11 March 2015.
  24. Moon, T.K. Error Correction Coding: Mathematical Methods and Algorithms; Wiley: Hoboken, NJ, USA, 2005. [Google Scholar]
  25. Wang, Z.; Bovik, A.C.; Sheikh, H.R.; Simoncelli, E.P. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process. 2004, 13, 600–612. [Google Scholar]
Figure 1. Diagram of our overall watermarking system.
Figure 1. Diagram of our overall watermarking system.
Entropy 17 01218f1
Figure 2. The actual embedded bits are comprised of sync bits and the watermark codeword.
Figure 2. The actual embedded bits are comprised of sync bits and the watermark codeword.
Entropy 17 01218f2
Figure 3. Embedding approach based on the difference of pairwise DCT/DWT coefficients.
Figure 3. Embedding approach based on the difference of pairwise DCT/DWT coefficients.
Entropy 17 01218f3
Figure 4. Statistical analysis based on the difference of pairwise DCT/DWT coefficients.
Figure 4. Statistical analysis based on the difference of pairwise DCT/DWT coefficients.
Entropy 17 01218f4
Figure 5. Block diagram showing the embedding process.
Figure 5. Block diagram showing the embedding process.
Entropy 17 01218f5
Figure 6. Block diagram showing the extraction process.
Figure 6. Block diagram showing the extraction process.
Entropy 17 01218f6
Figure 7. Overall watermark extractor.
Figure 7. Overall watermark extractor.
Entropy 17 01218f7
Figure 8. Original and watermarked images of a flower garden.
Figure 8. Original and watermarked images of a flower garden.
Entropy 17 01218f8
Figure 9. Original and watermarked images of a street view.
Figure 9. Original and watermarked images of a street view.
Entropy 17 01218f9
Figure 10. Original and watermarked images of a library.
Figure 10. Original and watermarked images of a library.
Entropy 17 01218f10
Figure 11. Original and watermarked images of a port view.
Figure 11. Original and watermarked images of a port view.
Entropy 17 01218f11
Figure 12. Original and watermarked images of a bus.
Figure 12. Original and watermarked images of a bus.
Entropy 17 01218f12
Figure 13. Original and watermarked images of a flower pot.
Figure 13. Original and watermarked images of a flower pot.
Entropy 17 01218f13
Table 1. Number of correctable errors in the BCH code for n = 63.
Table 1. Number of correctable errors in the BCH code for n = 63.
nktnktnktnkt
635716339463247631013
635126336563181063715
6345363306631611
Table 2. Number of correctable errors in the BCH code for n = 511.
Table 2. Number of correctable errors in the BCH code for n = 511.
nktnktnktnkt
5115021511367175112383751110361
511493251135818511229385119462
511484351134919511220395118563
511475451134020511211415117685
511466551133121511202425116787
511457651132222511193435115891
511448751131323511184455114993
511439851130425511175465114095
5114309511295265111664751131109
51142110511286275111575151128111
51141211511277285111485351119119
51140312511268295111395451110127
511394135112593051113055
511385145112503151112158
511376155112413651111259
Table 3. Average compression ratio, peak signal-to-noise ratio (PSNR) and mean structural similarity (MSSIM) value for the highest image quality. The term “DCT(old)” refers to our previous method [22]. The terms “DCT(new)” and “DWT” refer to the methods using the best positions in the frequency domains.
Table 3. Average compression ratio, peak signal-to-noise ratio (PSNR) and mean structural similarity (MSSIM) value for the highest image quality. The term “DCT(old)” refers to our previous method [22]. The terms “DCT(new)” and “DWT” refer to the methods using the best positions in the frequency domains.
Compression ratio
PSNR
MSSIM
1st coding2nd coding1st coding2nd coding1st coding2nd coding
Image1DCT(old)0.06630.037934.045234.05050.99980.9996
DCT(new)0.06670.038237.442236.74240.99990.9998
DWT0.06520.034029.341132.35220.99940.9988

Image2DCT(old)0.06650.039934.036433.99660.99980.9995
DCT(new)0.06440.038937.628037.13330.99990.9998
DWT0.06650.039829.132431.16370.99890.9985

Image3DCT(old)0.06580.039834.106134.34820.99980.9995
DCT(new)0.06420.038537.832537.22840.99990.9997
DWT0.06650.034429.195032.15290.99910.9983

Image4DCT(old)0.06650.038634.583834.84460.99960.9992
DCT(new)0.06620.033538.939938.16490.99980.9994
DWT0.06630.036328.839831.76420.99810.9961

Image5DCT(old)0.06600.039734.436134.60950.99990.9997
DCT(new)0.06620.037638.379737.89530.99990.9998
DWT0.06530.039729.039930.66790.99920.9985

Image6DCT(old)0.06570.036733.586133.61930.99980.9996
DCT(new)0.06620.038836.054335.35680.99990.9998
DWT0.06640.034729.433931.90510.99900.9985

AverageDCT(old)0.06610.038834.132334.24480.99980.9995
DCT(new)0.06560.037637.712837.08690.99990.9997
DWT0.06600.036529.163731.66770.99890.9981
Table 4. Average error rates for 10 HDTV-sized areas after the second decompression (%) of the highest image quality.
Table 4. Average error rates for 10 HDTV-sized areas after the second decompression (%) of the highest image quality.
Position
12345678910
Image10%0%0%0%0%0%0%0%0%0%
Image20%0%0%0%0%0%0%0%0%0%
Image30%0%0%0%0%0%0%0%0%0%
Image40%0%0%0%0%0%0%0%0%0%
Image50%0%0%0%0%0%0%0%0%0%
Image60%0%0%0%0%0%0%0%0%0%
Table 5. Cropping positions used in the IHC evaluation criteria.
Table 5. Cropping positions used in the IHC evaluation criteria.
Position(x1,y1)(x2,y2)(x3,y3)(x4,y4)
1(16,16)(1935,16)(1935,1095)(16,1095)
2(1500,16)(3419,16)(3419,1095)(1500,1095)
3(2617,16)(4536,16)(4536,1095)(2617,1095)
4(16,770)(1935,770)(1935,1849)(16,1849)
5(1500,770)(3419,770)(3419,1849)(1500,1849)
6(2617,770)(4536,770)(4536,1849)(2617,1849)
7(1344,768)(3263,768)(3263,1847)(1344,1847)
8(161,520)(1935,1520)(1935,2599)(16,2599)
9(1500,1520)(3419,1520)(3419,2599)(1500,2599)
10(2617,1520)(4536,1520)(4536,2599)(2617,2599)

Share and Cite

MDPI and ACS Style

Kang, H.; Iwamura, K. Information Hiding Method Using Best DCT and Wavelet Coefficients and Its Watermark Competition. Entropy 2015, 17, 1218-1235. https://doi.org/10.3390/e17031218

AMA Style

Kang H, Iwamura K. Information Hiding Method Using Best DCT and Wavelet Coefficients and Its Watermark Competition. Entropy. 2015; 17(3):1218-1235. https://doi.org/10.3390/e17031218

Chicago/Turabian Style

Kang, Hyunho, and Keiichi Iwamura. 2015. "Information Hiding Method Using Best DCT and Wavelet Coefficients and Its Watermark Competition" Entropy 17, no. 3: 1218-1235. https://doi.org/10.3390/e17031218

Article Metrics

Back to TopTop