Font Size: a A A

Research On Information Hiding Algorithm Based On Visual Attention

Posted on:2011-06-03Degree:MasterType:Thesis
Country:ChinaCandidate:C X WangFull Text:PDF
GTID:2178360305489400Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The fast development of Internet makes it convenient to access the multimedia data, butat the same time the Internet has brought a new challenge to the digital information protection.As an effective means for the protection of digital information, the technique of digitalinformation hiding is an important region and attracts wide attention. Digital informationhiding is a technique that embeds information, such as figures, words, images and so on,imperceptibly into multimedia data. It can be used for tracing the distribution and usage ofmultimedia data. The special application of digital information hiding technique requires thatthe embedded secret information should be not only transparent to human observers, but alsorobust enough.The basic concept and theory of digital information hiding is first described in thispaper. According to the different ways of information hiding, the existing algorithms ofdigital image watermarking are compared. We propose a novel information hiding algorithmusing the technique of visual attention model and singular value decomposition. In theembedding scheme, the host image is first divided with visual attention model and obtains thelocal host image. Then local host image is detected with the Harris corner detector in spatialdomain and performed singular value decomposition on each character area. Making use ofthe characteristics of singular value and variance, we preprocess the host image and get theactivity factor of each character area. By selecting the suitable character area according totheir value of activity factors to embed secret information, we can ensure the controllabilityof secret information embedding strength and the imperceptibility of the hiding scheme. Theuse of visual attention model and singular value decomposition make our scheme more robust.We simulate the algorithm in the computer and test the performance of secret informationembedding, secret information extraction and the detection, extraction and recovery of theembedded secret information after different kinds of attacks. Experimental results show thatthe novel algorithm is robust.The research result of the proposed algorithm in this paper not only takes a further step tothe technique of visual attention and singular value decomposition, but also remarkablyenhances the ability of resisting against attacks of the secret information hiding.
Keywords/Search Tags:Information Hiding, Visual Attention, Singular Value Decomposition
PDF Full Text Request
Related items