Skip to main content
Log in

Techniques and applications of intelligent multimedia data hiding

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

In this paper, we present the intelligent multimedia data hiding techniques and their possible applications. An introduction on intelligent multimedia data hiding is described which covers backgrounds, recent advances, methodologies, and implementations. The recently developed research branch called reversible data hiding is also depicted. Two major classes for the implementation of reversible data hiding, namely, the difference expansion method, and the histogram-based scheme, are discussed. With its ease of implementation, the histogram-based reversible data hiding technique is then illustrated with simulation results and actual implementations. Possible extension for our work is also depicted in the concluding remarks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Steinmetz, R., & Nahrstedt, K. (2004). Multimedia systems. Berlin/Heidelberg: Springer.

    Google Scholar 

  2. Poynton, C. A. (2003). Digital video and HDTV: algorithms and interfaces. San Francisco: Morgan Kaufmann.

    Google Scholar 

  3. Symes, P. (2003). Digital video compression. Columbus: Glencoe/McGraw-Hill.

    Google Scholar 

  4. Mandal, M. K. (2002). Multimedia signals and systems. Dordrecht: Kluwer Academic.

    Google Scholar 

  5. Fridrich, J., & Lisonek, P. (2007). Grid colorings in steganography. IEEE Transactions on Information Theory, 53(4), 1547–1549.

    Article  Google Scholar 

  6. Altun, O., Sharma, G., Celik, M. U., & Bocko, M. (2006). A set theoretic framework for watermarking and its application to semifragile tamper detection. IEEE Transactions on Information Forensics and Security, 1(4), 479–492.

    Article  Google Scholar 

  7. Altun, O., Sharma, G., & Bocko, M. (2006). Optimum watermark design by vector space projections. In Proc. IEEE intl. conf. image proc. (pp. 1413–1416).

  8. Pan, J. S., Huang, H.-C., Jain, L. C., & Fang, W. C. (Eds.) (2007). Intelligent multimedia data hiding: new directions. Berlin-Heidelberg: Springer.

    Google Scholar 

  9. Barni, M., Bartolini, F., De Rosa, A., & Piva, A. (2000). Capacity of full frame DCT image watermarks. IEEE Transactions on Image Processing, 9, 1450–1455.

    Article  Google Scholar 

  10. Kirovski, D., & Malvar, H. S. (2003). Spread spectrum watermarking of audio signals. IEEE Transactions on Signal Processing, 51, 1020–1033.

    Article  Google Scholar 

  11. Lin, C. Y., & Chang, S. F. (2001). Watermarking capacity of digital images based on domain-specific masking effects. In Int’l conf. information technology: coding and computing (pp. 90–94).

  12. Chu, S. C., Huang, H. C., Shi, Y., Wu, S. Y., & Shieh, C. S. (2008). Genetic watermarking for zerotree-based applications. Circuits, Systems, and Signal Processing, 27(2), 171–182.

    Article  Google Scholar 

  13. Wu, W. T., & Shih, F. Y. (2006). Genetic algorithm based methodology for breaking the steganalytic systems. IEEE Transactions on Systems, Man and Cybernetics, Part B, 36(1), 24–31.

    Article  Google Scholar 

  14. Mabry, F. J., James, J. R., & Ferguson, A. J. (2007). Unicode steganographic exploits: maintaining enterprise border security. IEEE Security & Privacy Magazine, 5(5), 32–39.

    Article  Google Scholar 

  15. Liu, T. Y., & Tsai, W. H. (2007). A new steganographic method for data hiding in Microsoft Word documents by a change tracking technique. IEEE Transactions on Information Forensics and Security, 2(1), 24–30.

    Article  Google Scholar 

  16. Chen, S., Leung, H., & Ding, H. (2007). Telephony speech enhancement by data hiding. IEEE Transactions on Instrumentation and Measurement, 56(1), 63–74.

    Article  Google Scholar 

  17. Chen, O. T. C., & Wu, W. C. (2008). Highly robust, secure, and perceptual-quality echo hiding scheme. IEEE Transactions on Audio, Speech, and Language Processing, 16(3), 629–638.

    Article  Google Scholar 

  18. Chang, F. C., Huang, H. C., & Hang, H. M. (2007). Layered access control schemes on watermarked scalable media. Journal of VLSI Signal Processing Systems for Signal, Image, and Video Technology, 49(3), 443–455.

    Article  Google Scholar 

  19. Huang, H. C., & Chen, Y. H. (2009). Genetic fingerprinting for copyright protection of multicast media. Soft Computing, 13(4), 383–391.

    Article  Google Scholar 

  20. Weng, S., Zhao, Y., Pan, J. S., & Ni, R. (2008). Reversible watermarking based on invariability and adjustment on pixel pairs. IEEE Signal Processing Letters, 15, 721–724.

    Article  Google Scholar 

  21. Kim, H. J., Sachnev, V., Shi, Y. Q., Nam, J., & Choo, H. G. (2008). A novel difference expansion transform for reversible data embedding. IEEE Transactions on Information Forensics and Security, 3(3), 456–465.

    Article  Google Scholar 

  22. Ni, Z., Shi, Y. Q., Ansari, N., Su, W., Sun, Q., & Lin, X. (2008). Robust lossless image data hiding designed for semi-fragile image authentication. IEEE Transactions on Circuits and Systems for Video Technology, 18(4), 497–509.

    Article  Google Scholar 

  23. Lin, C. C., Tai, W. L., & Chang, C. C. (2008). Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recognition, 41(12), 3582–3591.

    Article  Google Scholar 

  24. Ni, Z., Shi, Y. Q., Ansari, N., & Su, W. (2006). Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology, 16(3), 354–362.

    Article  Google Scholar 

  25. Berners-Lee, T., Fielding, R. T., & Masinter, L. (2005). Uniform Resource Identifier (URI): Generic Syntax. Internet Society. RFC 3986; STD 66, Jan.

  26. Favicon, (2008). http://en.wikipedia.org/wiki/Favicon.

  27. Hu, Y., & Kwong, S. (2001). Wavelet domain adaptive visible watermarking. Electronics Letters, 37(20), 1219–1220.

    Article  Google Scholar 

  28. Hu, Y., Kwong, S., & Huang, J. (2006). An algorithm for removable visible watermarking. IEEE Transactions on Circuits and Systems for Video Technology, 16(1), 129–133.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hsiang-Cheh Huang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Huang, HC., Fang, WC. Techniques and applications of intelligent multimedia data hiding. Telecommun Syst 44, 241–251 (2010). https://doi.org/10.1007/s11235-009-9262-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-009-9262-x

Keywords

Navigation