New secure QIM-based information hiding algorithms
Mitekin V.A., Fedoseev V.A.

 

Samara National Research University, Samara, Russia,
Image Processing Systems Institute оf RAS – Branch of the FSRC “Crystallography and Photonics” RAS, Samara, Russia

 PDF

Abstract:
The paper proposes two information hiding algorithms for multimedia based on Quantization Index Modulation (QIM): IM-QIM and SIM-QIM. They are designed to prevent a statistical attack which is able to restore a secret key using the correlation between key bits and multimedia data samples. To obtain the required security, we use a correlation immune embedding function, which guarantees statistical independence between the watermarked data and the key. The proposed algorithms are described for the case of spatial embedding in images but the algorithms can also be used to hide information in any multimedia data source in spatio-temporal and spectral domains. The results of the experimental investigation have confirmed that the algorithms developed provide the required security against a statistical attack and also have shown that the algorithms do not introduce additional distortions compared with the conventional QIM method. However, the experiments have also shown that the new algorithms are less robust against additive noise and JPEG compression.

Keywords:
QIM, DM-QIM, IM-QIM, quantization index modulation, dither modulation, digital watermark.

Citation:
Mitekin VA, Fedoseev VA. New secure QIM-based information hiding algorithms. Computer Optics 2018; 42(1): 118-127. DOI: 10.18287/2412-6179-2018-42-1-118-127.

References:

  1. Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T. Digital watermarking and steganography. 2nd ed. San Francisco: Morgan Kaufmann Publishers Inc.; 2009. ISBN: 978-0-12-372585-1.
  2. Chen B, Wornell GW. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory 2001; 47(4): 1423-1443. DOI: 10.1109/18.923725.
  3. Noda H, Niimi M, Kawaguchi E. High-performance JPEG steganography using quantization index modulation in DCT domain. Pattern Recognition Letters 2006; 27(5): 455-461. DOI: 10.1016/j.patrec.2005.09.008.
  4. Jiang Y, Zhang Y, Pei W, Wang K. Adaptive spread transform QIM watermarking algorithm based on improved perceptual models. AEU – International Journal of Electronics and Communications 2013; 67(8): 690-696. DOI: 10.1016/j.aeue.2013.02.005.
  5. Phadikar A. Multibit quantization index modulation: A high-rate robust data-hiding method. Journal of King Saud University – Computer and Information Sciences 2013; 25(2): 163-171. DOI: 10.1016/j.jksuci.2012.11.005.
  6. Hakka M, Kuribayashi M, Morii M. DCT-OFDM Based Watermarking Scheme Robust Against Clipping Attack. Proceedings of the 1st international workshop on Information hiding and its criteria for evaluation (IWIHC '14) 2014: 18-24. DOI: 10.1145/2598908.2598914.
  7. Fang Y, Huang J, Wu S. CDMA-based watermarking resisting to cropping. 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512) 2004; 2: 25-28. DOI: 10.1109/ISCAS.2004.1329199.
  8. Huang Y-B, Zhang Q-Y, Liu Z, Di Y-J, Yuan Z. A dither modulation audio watermarking algorithm based on HAS. Research Journal of Applied Sciences, Engineering and Technology 2012; 4: 4206-4211.
  9. Khademi N, Akhaee MA, Ahadi SM, Moradi M, Kashi A. Audio Watermarking based on Quantization Index Modulation in the Frequency Domain. ICSPC 2007: 1127-1130. DOI: 10.1109/ICSPC.2007.4728522.
  10. Zolotavkin Y, Juhola M. A new two-dimensional quantization method for digital image watermarking. ICACT 2015: 155-160. doi:10.1109/ICACT.2015.7224776.
  11. Matam BR, Lowe D. Watermarking: How secure is the DM-QIM embedding technique? 2009 16th International Conference on Digital Signal Processing 2009: 1-8. DOI: 10.1109/ICDSP.2009.5201248.
  12. Matam BR, Lowe D. Watermark-only security attack on DM-QIM watermarking: Vulnerability to guided key guessing. In Book: Li BR, Ho ATS, eds. Crime prevention technologies and applications for advancing criminal investigation. IGI Global; 2012: 85-106. DOI: 10.4018/978-1-4666-1758-2.ch007.
  13. Wang Y, Moulin P. Steganalysis of block-structured stegotext. Proc SPIE 2004; 5306: 477-488. DOI: 10.1117/12.527745.
  14. Mitekin V. A new key recovery attack against DM-QIM image watermarking algorithm. Proc SPIE 2017; 10341: 103411A. DOI: 10.1117/12.2268550.
  15. Glumov NI, Mitekin VA. A new semi-fragile watermarking algorithm for image authentication and information hiding. Computer Optics 2011; 35(2): 262-267.
  16. Mitekin VA, Fedoseev VA. A new robust information hiding method for video. Computer Optics 2014; 38(3): 564–73.
  17. Mitekin V, Fedoseev VA. A new method for high-capacity information hiding in video robust against temporal desynchronization. Proc SPIE 2015; 9445: 94451A. DOI: 10.1117/12.2180550.
  18. Siegenthaler T. Correlation-immunity of nonlinear combining functions for cryptographic applications (Corresp.). IEEE Transactions on Information Theory 1984; 30(5): 776-780. DOI: 10.1109/TIT.1984.1056949.
  19. BOWS-2: Break our watermarking system. 2nd ed. Source: áhttp://bows2.ec-lille.fr/ñ.
  20. Barni M, Bartolini F. Watermarking systems engineering: enabling digital assets security and other applications. New York, Basel: Marcel Dekker, Inc.; 2004. ISBN: 0-8247-4806-9.

© 2009, IPSI RAS
151, Molodogvardeiskaya str., Samara, 443001, Russia; E-mail: journal@computeroptics.ru ; Tel: +7 (846) 242-41-24 (Executive secretary), +7 (846) 332-56-22 (Issuing editor), Fax: +7 (846) 332-56-20