Journal:Informatica
Volume 16, Issue 3 (2005), pp. 333–346
Abstract
In this paper, a reliable information hiding scheme based on support vector machine and error correcting codes is proposed. To extract the hidden information bits from a possibly tampered watermarked image with a lower error probability, information hiding is modeled as a digital communication problem, and both the good generalization ability of support vector machine and the error correction code BCH are applied. Due to the good learning ability of support vector machine, it can learn the relationship between the hidden information and corresponding watermarked image; when the watermarked image is attacked by some intentional or unintentional attacks, the trained support vector machine can recover the right hidden information bits. The reliability of the proposed scheme has been tested under different attacks. The experimental results show that the embedded information bits are perceptually transparent and can successfully resist common image processing, jitter attack, and geometrical distortions. When the host image is heavily distorted, the hidden information can also be extracted recognizably, while most of existing methods are defeated. We expect this approach provide an alternative way for reliable information hiding by applying machine learning technologies.
Journal:Informatica
Volume 15, Issue 2 (2004), pp. 147–160
Abstract
In this paper, a new digital watermarking method based on vector quantization (VQ) is proposed. In contrast with conventional VQ‐based watermarking schemes, the mean of sub‐blocks is used to train the VQ codebook. In addition, the Anti‐Gray Coding (AGC) technique is employed to enhance the robustness of the proposed watermarking scheme. In this scheme, the secret keys are used to hide the associated information between the original image and the watermark. Then the set of secret keys will be registered to a trusted third party for future verification. Thus, the original image remains unchanged after the watermark is melted into the set of secret keys. Experimental results show that the watermark can survive various possible attacks. Besides that, the size of the secret keys can be reduced.