Share Email Print
cover

Proceedings Paper

A blind watermarking algorithm based on HVS applied for covert communication
Author(s): Fang Wei; Jian Liu; Hanqiang Cao; Jun Yang
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

There are two ways for transmitting data in a secure manner: Cryptography and steganography. Digital watermarking is a specific branch of steganography, which can be used in various applications, including covert communication, owner identification, authentication and copy control. In this paper, we proposed a blind adaptive watermarking algorithm based on HVS is proper for covert communication. The secret information that can be seen as a watermarking is hidden into a host image, which can be publicly accessed, so the transportation of the secret information will not attract the attention of illegal receiver. With our approach, the secret information is embedded in the wavelet domain. By the background luminance and the texture mask characters of HVS, we divide the wavelet coefficients of carrier image into different classes. According to the classes of the wavelet coefficients the watermark image is embedded. The result of our experimental shows that this approach is imperceptible and robust some image processing such as JPEG lossy compression, cropping, median filtering, grads sharpening, Gaussian white noise attacks and so on.

Paper Details

Date Published: 10 November 2007
PDF: 6 pages
Proc. SPIE 6795, Second International Conference on Space Information Technology, 679551 (10 November 2007); doi: 10.1117/12.775014
Show Author Affiliations
Fang Wei, Huazhong Univ. of Science and Technology (China)
Wuhan Institute of Technology (China)
Jian Liu, Huazhong Univ. of Science and Technology (China)
Hanqiang Cao, Huazhong Univ. of Science and Technology (China)
Jun Yang, Huazhong Univ. of Science and Technology (China)
Wuhan Institute of Technology (China)


Published in SPIE Proceedings Vol. 6795:
Second International Conference on Space Information Technology

© SPIE. Terms of Use
Back to Top