Abstract
In this paper, we present the intelligent multimedia data hiding techniques and their possible applications. An introduction on intelligent multimedia data hiding is described which covers backgrounds, recent advances, methodologies, and implementations. The recently developed research branch called reversible data hiding is also depicted. Two major classes for the implementation of reversible data hiding, namely, the difference expansion method, and the histogram-based scheme, are discussed. With its ease of implementation, the histogram-based reversible data hiding technique is then illustrated with simulation results and actual implementations. Possible extension for our work is also depicted in the concluding remarks.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Steinmetz, R., & Nahrstedt, K. (2004). Multimedia systems. Berlin/Heidelberg: Springer.
Poynton, C. A. (2003). Digital video and HDTV: algorithms and interfaces. San Francisco: Morgan Kaufmann.
Symes, P. (2003). Digital video compression. Columbus: Glencoe/McGraw-Hill.
Mandal, M. K. (2002). Multimedia signals and systems. Dordrecht: Kluwer Academic.
Fridrich, J., & Lisonek, P. (2007). Grid colorings in steganography. IEEE Transactions on Information Theory, 53(4), 1547–1549.
Altun, O., Sharma, G., Celik, M. U., & Bocko, M. (2006). A set theoretic framework for watermarking and its application to semifragile tamper detection. IEEE Transactions on Information Forensics and Security, 1(4), 479–492.
Altun, O., Sharma, G., & Bocko, M. (2006). Optimum watermark design by vector space projections. In Proc. IEEE intl. conf. image proc. (pp. 1413–1416).
Pan, J. S., Huang, H.-C., Jain, L. C., & Fang, W. C. (Eds.) (2007). Intelligent multimedia data hiding: new directions. Berlin-Heidelberg: Springer.
Barni, M., Bartolini, F., De Rosa, A., & Piva, A. (2000). Capacity of full frame DCT image watermarks. IEEE Transactions on Image Processing, 9, 1450–1455.
Kirovski, D., & Malvar, H. S. (2003). Spread spectrum watermarking of audio signals. IEEE Transactions on Signal Processing, 51, 1020–1033.
Lin, C. Y., & Chang, S. F. (2001). Watermarking capacity of digital images based on domain-specific masking effects. In Int’l conf. information technology: coding and computing (pp. 90–94).
Chu, S. C., Huang, H. C., Shi, Y., Wu, S. Y., & Shieh, C. S. (2008). Genetic watermarking for zerotree-based applications. Circuits, Systems, and Signal Processing, 27(2), 171–182.
Wu, W. T., & Shih, F. Y. (2006). Genetic algorithm based methodology for breaking the steganalytic systems. IEEE Transactions on Systems, Man and Cybernetics, Part B, 36(1), 24–31.
Mabry, F. J., James, J. R., & Ferguson, A. J. (2007). Unicode steganographic exploits: maintaining enterprise border security. IEEE Security & Privacy Magazine, 5(5), 32–39.
Liu, T. Y., & Tsai, W. H. (2007). A new steganographic method for data hiding in Microsoft Word documents by a change tracking technique. IEEE Transactions on Information Forensics and Security, 2(1), 24–30.
Chen, S., Leung, H., & Ding, H. (2007). Telephony speech enhancement by data hiding. IEEE Transactions on Instrumentation and Measurement, 56(1), 63–74.
Chen, O. T. C., & Wu, W. C. (2008). Highly robust, secure, and perceptual-quality echo hiding scheme. IEEE Transactions on Audio, Speech, and Language Processing, 16(3), 629–638.
Chang, F. C., Huang, H. C., & Hang, H. M. (2007). Layered access control schemes on watermarked scalable media. Journal of VLSI Signal Processing Systems for Signal, Image, and Video Technology, 49(3), 443–455.
Huang, H. C., & Chen, Y. H. (2009). Genetic fingerprinting for copyright protection of multicast media. Soft Computing, 13(4), 383–391.
Weng, S., Zhao, Y., Pan, J. S., & Ni, R. (2008). Reversible watermarking based on invariability and adjustment on pixel pairs. IEEE Signal Processing Letters, 15, 721–724.
Kim, H. J., Sachnev, V., Shi, Y. Q., Nam, J., & Choo, H. G. (2008). A novel difference expansion transform for reversible data embedding. IEEE Transactions on Information Forensics and Security, 3(3), 456–465.
Ni, Z., Shi, Y. Q., Ansari, N., Su, W., Sun, Q., & Lin, X. (2008). Robust lossless image data hiding designed for semi-fragile image authentication. IEEE Transactions on Circuits and Systems for Video Technology, 18(4), 497–509.
Lin, C. C., Tai, W. L., & Chang, C. C. (2008). Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recognition, 41(12), 3582–3591.
Ni, Z., Shi, Y. Q., Ansari, N., & Su, W. (2006). Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology, 16(3), 354–362.
Berners-Lee, T., Fielding, R. T., & Masinter, L. (2005). Uniform Resource Identifier (URI): Generic Syntax. Internet Society. RFC 3986; STD 66, Jan.
Favicon, (2008). http://en.wikipedia.org/wiki/Favicon.
Hu, Y., & Kwong, S. (2001). Wavelet domain adaptive visible watermarking. Electronics Letters, 37(20), 1219–1220.
Hu, Y., Kwong, S., & Huang, J. (2006). An algorithm for removable visible watermarking. IEEE Transactions on Circuits and Systems for Video Technology, 16(1), 129–133.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Huang, HC., Fang, WC. Techniques and applications of intelligent multimedia data hiding. Telecommun Syst 44, 241–251 (2010). https://doi.org/10.1007/s11235-009-9262-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-009-9262-x