Steganography of digital watermark by Arnold scrambling transform with blind source separation morphological component analysis
In this paper, a novel steganography of digital watermark scheme which contains digital watermark embedding and extraction processes is proposed. The proposed scheme is based on an iterative process of Arnold scrambling transform which is controlled by secret key shared by copyright owner and authorized users, and the extension of morphological component analysis theory which utilizes morphological diversity as the kernel role in blind source separation. Since both the original cover image and watermark are not needed for recovering received watermark, the proposed scheme can be categorized into blind watermarking technique. It is the most applicable watermarking technique due to the availability of the original cover image and watermark cannot be warranted in real-world applications. The proposed scheme overcomes the problem of too narrow hidden data bandwidth in traditional Least-Significant-Bit (LSB) replacement or LSB matching schemes. Instead of only hiding limited bits is allowed, we can embed a meaningful picture into the cover image by applying proposed scheme. Compared with classic Joint Photographic Experts Group (JPEG) steganography schemes, the proposed steganography scheme has much higher embedding capacity and broader applicability scope. Images acquired in steganography experiments and the analysis of experimental results both prove the effectiveness of proposed scheme. Both subjective visual effect and objective quantitative results of the Peak Signal to Noise Ratio (PSNR) index, Structural Similarity (SSIM) index and Normalized Correlation (NC) index confirm its brilliant steganography capability as well as its fine robustness to different noise attacks through communication channel.
KeywordsArnold scrambling transform Blind source separation Digital watermark Morphological component analysis Secret key Steganography
- 6.Fridrich J, Goljan M, Du R (2001) Steganalysis based on JPEG compatibility, SPIE multimedia systems and applications IV. SPIE Press, BellinghamGoogle Scholar
- 7.Hetzl S, Mutzel P (2005) A graph theoretic approach to steganography. In Proceedings of 9th IFIP TC-6 TC-11 International Conference of Communications and Multimedia Security, vol. 3677, pp. 119–128Google Scholar
- 11.Sallee P (2003) Model based steganography. In Proceedings of International Workshop on Digital Watermarking, pp. 174–188Google Scholar
- 13.Westfeld A (2001) F5 — A steganographic algorithm high capacity despite better steganalysis. In Proceedings of 4th International Workshop on Information Hiding, vol. 1768, pp. 289–302Google Scholar