Summary
In this chapter, we propose a technique for information hiding using input and Fourier-plane phase encoding. The proposed method uses a weighed double-phase-encoded hidden image embedded within a host image as the transmitted image. We develop an analytical presentation for the system performance using the statistical properties of double-phase encoding. The peak signal-to-noise ratio (PSNR) metric is used as a measure for the degradation in the quality of the host image and the recovered hidden image. We test, analytically, the distortion of the hidden image due to the host image and the effect of occlusion of the pixels of the transmitted image (that is, the host image containing the hidden image). Moreover, we discuss the effect of using only the real part of the transmitted image to recover the hidden image. Computer simulations are presented to test the system performance against these types of distortions. Simulations illustrate the system’s ability to recover the hidden image under distortions and the robustness of the hidden image against removal trials.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
N.F. Johnson, Z. Duric, and S. Jajodia, Information Hiding: Steganography and Watermarking—Attacks and Countermeasures, (Advances in Information Security, Volume 1), (Kluwer Academic, Dordrecht, 2001).
W. Bender, D. Gruhl, N. Morimoto, and L. Lu, “Techniques for data hiding,” IBM Syst. J. 35(3,4), 313–336 (1996).
J. Rosen and B. Javidi, “Hidden images in halftone pictures,” Appl. Opt. 40, 3346–3353 (2001).
G.C. Langelaar, I. Setyawan, and R.L. Lagendijk, “Watermarking digital image and video data. A state-of-the-art overview,” IEEE Signal Process. Mag. 17(5), 20–46 (2000).
C. Hosinger and M. Rabbani, “Data embedding using phase dispersion,” International Conference on Information Technology: Coding and Computing (ITCC2000), Las Vegas, NV, March 2000.
P. Réfrégier and B. Javidi, “Optical image encryption using input plane and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).
J.R. Fienup, “Phase retrieval algorithms: A comparison,” Appl. Opt. 21, 2758–2769 (1982).
R.K. Wang, I.A. Watson, and C. Chatwin, “Random phase encoding for optical secutity,” Opt. Eng. 35, 2464–2460 (1996).
B. Javidi, A. Sergent, G. Zhang, and L. Guibert, “Fault tolerance properties of a double phase encoding encryption technique,” Opt. Eng. 36, 992–998 (1997).
F. Goudail, F. Bollaro, B. Javidi, and P. Réfrégier, “Influence of perturbation in a double phase-encoding system,” J. Opt. Soc. Am. A, 15, 2629–2638 (1998).
S. Kishk and b. Javidi, “Information hiding technique using double phase encoding,” Appl. Opt. 41, 5470–5482 (2002).
I.I. Gikhman and A.V. Skorokhod, Introduction to the Theory of Random Process (Dover, New York, 1969).
B.V. Gnedenko, The Theory of Probability, (Chelsea, New York, 1962).
B.V. Gnedenko, and A.N. Kolomogrov, Limit Distributions for Sums of Independent Random Variables, revised edition (Addison-Wesley, Reading, MA, 1968).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer Science+Business Media, Inc.
About this chapter
Cite this chapter
Kishk, S., Javidi, B. (2005). Distortion- and Noise-Robust Digital Watermarking Using Input and Fourier-Plane Phase Encoding. In: Javidi, B. (eds) Optical and Digital Techniques for Information Security. Advanced Sciences and Technologies for Security Applications, vol 1. Springer, New York, NY . https://doi.org/10.1007/0-387-25096-4_3
Download citation
DOI: https://doi.org/10.1007/0-387-25096-4_3
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-20616-5
Online ISBN: 978-0-387-25096-0
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)