December  2015, 8(6): 1291-1299. doi: 10.3934/dcdss.2015.8.1291

Characteristic analysis of carrier based on the filtering and a multi-wavelet method for the information hiding

1. 

School of Information Engineering, Chang'an University, Xi'an, Shaanxi 710064, China

2. 

School of Electronic and Control Engineering, Chang'an University, Xi'an, Shaanxi 710064, China

3. 

School of Information Engineering, Xizang Minzu University, Xianyang, Shaanxi 712082, China

Received  June 2015 Revised  September 2015 Published  December 2015

The characteristic consistency between the original and the stego carriers is an important indicator to evaluate an information hiding algorithm. Different from the traditional carrier pre-processing methods which are based on the operation domains, we propose a characteristics analysis-based preprocessing scheme. We use the Gaussian pyramid filtering and CARDBAL2 multi-wavelet transform to analyze the energy characteristics of the carrier, so the original carrier can be decomposed into several sub-regions with different energy level. And at the same time, the processed carrier shows us the redundancy space structurally through the combination bit plane method, which can provide some invisible hiding positions. Obviously, the energy and structure characteristics are at least related with the robustness and invisibility of the hiding result respectively. So we can improve these performances compared with the traditional methods. At the same time, some optimization theories like the Chebyshev map are used to improve other performances. At last, the experimental shows the achievements of this scheme in the form of data.
Citation: Shuai Ren, Tao Zhang, Fangxia Shi. Characteristic analysis of carrier based on the filtering and a multi-wavelet method for the information hiding. Discrete & Continuous Dynamical Systems - S, 2015, 8 (6) : 1291-1299. doi: 10.3934/dcdss.2015.8.1291
References:
[1]

A. Basu, A. Saha, J. Das, S. Roy, S. Mitra and I. Mal, On the implementation of a digital watermarking based on phase congruency,, Advances in Intelligent Systems & Computing, 328 (2014), 113.  doi: 10.1007/978-3-319-12012-6_13.  Google Scholar

[2]

L. Cui and W. Li, Adaptive multiwavelet-based watermarking through JPW masking,, IEEE Transactions on Image Processing, 20 (2011), 1047.  doi: 10.1109/TIP.2010.2079551.  Google Scholar

[3]

A. Durdek, S. R. Jensen and J. Juselius, et al., Adaptive order polynomial algorithm in a multiwavelet representation scheme,, Applied Numerical Mathematics, 92 (2015), 40.  doi: 10.1016/j.apnum.2014.12.006.  Google Scholar

[4]

K. Jafari-Khouzani, Multiwavelet grading of pathological images of prostate,, IEEE Trans. Biomed. Eng., 50 (2003), 697.  doi: 10.1109/TBME.2003.812194.  Google Scholar

[5]

J. Kim, M. Yi and M. S. Obaidat, Advanced computer mathematics based cryptography and security technologies,, International Journal of Computer Mathematics, 90 (2013), 2512.  doi: 10.1080/00207160.2013.868728.  Google Scholar

[6]

Y. Kutlu, Feature extraction for ECG heartbeats using higher order statistics of WPD coefficients,, Comput. Methods Programs Biomed., 105 (2012), 257.  doi: 10.1016/j.cmpb.2011.10.002.  Google Scholar

[7]

Y. Li, H. L. Wei and S. A. Billings, Identification of time-varying systems using multi-wavelet basis functions,, Control Systems Technology IEEE Transactions on, 19 (2011), 656.  doi: 10.1109/TCST.2010.2052257.  Google Scholar

[8]

X. B. Ren, An optimal image thresholding using genetic algorithm,, Proceedings of the 2009 International Forum on Computer Science-Technology and Applications, 1 (2009), 169.  doi: 10.1109/IFCSTA.2009.48.  Google Scholar

[9]

B. Stoyanov and K. Kordov, Novel image encryption scheme based on chebyshev polynomial and duffing map,, The Scientific World Journal, 2014 (2014).  doi: 10.1155/2014/283639.  Google Scholar

[10]

M. Saini and R. Chhikara, Performance evaluation of DCT and DWT features for blind image steganalysis using neural networks,, International Journal of Computer Applications, 114 (2015), 20.  doi: 10.5120/19974-1868.  Google Scholar

[11]

A. R. Tate, N. Beloff and A. R. Balques, et al., Exploiting the potential of large databases of electronic health records for research using rapid search algorithms and an intuitive query interface,, Applied Numerical Mathematics, 21 (2014), 292.  doi: 10.1136/amiajnl-2013-001847.  Google Scholar

[12]

L. Yang, J. Lv and Y. Xiang, Underdetermined blind source separation by parallel factor analysis in time-frequency domain,, Cognitive Computation, 5 (2013), 207.  doi: 10.1007/s12559-012-9177-9.  Google Scholar

[13]

T. Zhang, D. J. Mu and S. Ren, A confidential communication-oriented information hiding algorithm based on GHM multi-wavelet and DCT,, Applied Mathematics & Information Sciences, 7 (2013), 1803.  doi: 10.12785/amis/070518.  Google Scholar

show all references

References:
[1]

A. Basu, A. Saha, J. Das, S. Roy, S. Mitra and I. Mal, On the implementation of a digital watermarking based on phase congruency,, Advances in Intelligent Systems & Computing, 328 (2014), 113.  doi: 10.1007/978-3-319-12012-6_13.  Google Scholar

[2]

L. Cui and W. Li, Adaptive multiwavelet-based watermarking through JPW masking,, IEEE Transactions on Image Processing, 20 (2011), 1047.  doi: 10.1109/TIP.2010.2079551.  Google Scholar

[3]

A. Durdek, S. R. Jensen and J. Juselius, et al., Adaptive order polynomial algorithm in a multiwavelet representation scheme,, Applied Numerical Mathematics, 92 (2015), 40.  doi: 10.1016/j.apnum.2014.12.006.  Google Scholar

[4]

K. Jafari-Khouzani, Multiwavelet grading of pathological images of prostate,, IEEE Trans. Biomed. Eng., 50 (2003), 697.  doi: 10.1109/TBME.2003.812194.  Google Scholar

[5]

J. Kim, M. Yi and M. S. Obaidat, Advanced computer mathematics based cryptography and security technologies,, International Journal of Computer Mathematics, 90 (2013), 2512.  doi: 10.1080/00207160.2013.868728.  Google Scholar

[6]

Y. Kutlu, Feature extraction for ECG heartbeats using higher order statistics of WPD coefficients,, Comput. Methods Programs Biomed., 105 (2012), 257.  doi: 10.1016/j.cmpb.2011.10.002.  Google Scholar

[7]

Y. Li, H. L. Wei and S. A. Billings, Identification of time-varying systems using multi-wavelet basis functions,, Control Systems Technology IEEE Transactions on, 19 (2011), 656.  doi: 10.1109/TCST.2010.2052257.  Google Scholar

[8]

X. B. Ren, An optimal image thresholding using genetic algorithm,, Proceedings of the 2009 International Forum on Computer Science-Technology and Applications, 1 (2009), 169.  doi: 10.1109/IFCSTA.2009.48.  Google Scholar

[9]

B. Stoyanov and K. Kordov, Novel image encryption scheme based on chebyshev polynomial and duffing map,, The Scientific World Journal, 2014 (2014).  doi: 10.1155/2014/283639.  Google Scholar

[10]

M. Saini and R. Chhikara, Performance evaluation of DCT and DWT features for blind image steganalysis using neural networks,, International Journal of Computer Applications, 114 (2015), 20.  doi: 10.5120/19974-1868.  Google Scholar

[11]

A. R. Tate, N. Beloff and A. R. Balques, et al., Exploiting the potential of large databases of electronic health records for research using rapid search algorithms and an intuitive query interface,, Applied Numerical Mathematics, 21 (2014), 292.  doi: 10.1136/amiajnl-2013-001847.  Google Scholar

[12]

L. Yang, J. Lv and Y. Xiang, Underdetermined blind source separation by parallel factor analysis in time-frequency domain,, Cognitive Computation, 5 (2013), 207.  doi: 10.1007/s12559-012-9177-9.  Google Scholar

[13]

T. Zhang, D. J. Mu and S. Ren, A confidential communication-oriented information hiding algorithm based on GHM multi-wavelet and DCT,, Applied Mathematics & Information Sciences, 7 (2013), 1803.  doi: 10.12785/amis/070518.  Google Scholar

[1]

Huyuan Chen, Dong Ye, Feng Zhou. On gaussian curvature equation in $ \mathbb{R}^2 $ with prescribed nonpositive curvature. Discrete & Continuous Dynamical Systems - A, 2020, 40 (6) : 3201-3214. doi: 10.3934/dcds.2020125

[2]

Lan Luo, Zhe Zhang, Yong Yin. Simulated annealing and genetic algorithm based method for a bi-level seru loading problem with worker assignment in seru production systems. Journal of Industrial & Management Optimization, 2021, 17 (2) : 779-803. doi: 10.3934/jimo.2019134

[3]

Fengwei Li, Qin Yue, Xiaoming Sun. The values of two classes of Gaussian periods in index 2 case and weight distributions of linear codes. Advances in Mathematics of Communications, 2021, 15 (1) : 131-153. doi: 10.3934/amc.2020049

[4]

Editorial Office. Retraction: Xiaohong Zhu, Lihe Zhou, Zili Yang and Joyati Debnath, A new text information extraction algorithm of video image under multimedia environment. Discrete & Continuous Dynamical Systems - S, 2019, 12 (4&5) : 1265-1265. doi: 10.3934/dcdss.2019087

[5]

Xianbo Sun, Zhanbo Chen, Pei Yu. Parameter identification on Abelian integrals to achieve Chebyshev property. Discrete & Continuous Dynamical Systems - B, 2020  doi: 10.3934/dcdsb.2020375

[6]

Wai-Ki Ching, Jia-Wen Gu, Harry Zheng. On correlated defaults and incomplete information. Journal of Industrial & Management Optimization, 2021, 17 (2) : 889-908. doi: 10.3934/jimo.2020003

[7]

Nicolas Rougerie. On two properties of the Fisher information. Kinetic & Related Models, 2021, 14 (1) : 77-88. doi: 10.3934/krm.2020049

[8]

Pablo D. Carrasco, Túlio Vales. A symmetric Random Walk defined by the time-one map of a geodesic flow. Discrete & Continuous Dynamical Systems - A, 2020  doi: 10.3934/dcds.2020390

[9]

Shengxin Zhu, Tongxiang Gu, Xingping Liu. AIMS: Average information matrix splitting. Mathematical Foundations of Computing, 2020, 3 (4) : 301-308. doi: 10.3934/mfc.2020012

[10]

Wolfgang Riedl, Robert Baier, Matthias Gerdts. Optimization-based subdivision algorithm for reachable sets. Journal of Computational Dynamics, 2021, 8 (1) : 99-130. doi: 10.3934/jcd.2021005

[11]

Jie Zhang, Yuping Duan, Yue Lu, Michael K. Ng, Huibin Chang. Bilinear constraint based ADMM for mixed Poisson-Gaussian noise removal. Inverse Problems & Imaging, , () : -. doi: 10.3934/ipi.2020071

[12]

Honglin Yang, Jiawu Peng. Coordinating a supply chain with demand information updating. Journal of Industrial & Management Optimization, 2020  doi: 10.3934/jimo.2020181

[13]

Simone Fiori. Error-based control systems on Riemannian state manifolds: Properties of the principal pushforward map associated to parallel transport. Mathematical Control & Related Fields, 2021, 11 (1) : 143-167. doi: 10.3934/mcrf.2020031

[14]

Lin Jiang, Song Wang. Robust multi-period and multi-objective portfolio selection. Journal of Industrial & Management Optimization, 2021, 17 (2) : 695-709. doi: 10.3934/jimo.2019130

[15]

Bilel Elbetch, Tounsia Benzekri, Daniel Massart, Tewfik Sari. The multi-patch logistic equation. Discrete & Continuous Dynamical Systems - B, 2021  doi: 10.3934/dcdsb.2021025

[16]

Alain Bensoussan, Xinwei Feng, Jianhui Huang. Linear-quadratic-Gaussian mean-field-game with partial observation and common noise. Mathematical Control & Related Fields, 2021, 11 (1) : 23-46. doi: 10.3934/mcrf.2020025

[17]

Yueyang Zheng, Jingtao Shi. A stackelberg game of backward stochastic differential equations with partial information. Mathematical Control & Related Fields, 2020  doi: 10.3934/mcrf.2020047

[18]

Chuan Ding, Da-Hai Li. Angel capitalists exit decisions under information asymmetry: IPO or acquisitions. Journal of Industrial & Management Optimization, 2021, 17 (1) : 369-392. doi: 10.3934/jimo.2019116

[19]

Hui Gao, Jian Lv, Xiaoliang Wang, Liping Pang. An alternating linearization bundle method for a class of nonconvex optimization problem with inexact information. Journal of Industrial & Management Optimization, 2021, 17 (2) : 805-825. doi: 10.3934/jimo.2019135

[20]

Liang Huang, Jiao Chen. The boundedness of multi-linear and multi-parameter pseudo-differential operators. Communications on Pure & Applied Analysis, , () : -. doi: 10.3934/cpaa.2020291

2019 Impact Factor: 1.233

Metrics

  • PDF downloads (58)
  • HTML views (0)
  • Cited by (0)

Other articles
by authors

[Back to Top]