Результаты исследований: Публикации в книгах, отчётах, сборниках, трудах конференций › статья в сборнике материалов конференции › научная › Рецензирование
Comparative analysis of halftoning algorithms for digital watermarking. / Makarov, Anton; Yakovleva, Elena.
Proceedings of the 18th Conference of Open Innovations Association FRUCT and Seminar on Information Security and Protection of Information Technolog, FRUCT-ISPIT 2016. ред. / Sergey Balandin; Alla Levina; Tatiana Tyutina. Institute of Electrical and Electronics Engineers Inc., 2016. стр. 193-199 7561527 (Conference of Open Innovation Association, FRUCT; Том 2016-September).Результаты исследований: Публикации в книгах, отчётах, сборниках, трудах конференций › статья в сборнике материалов конференции › научная › Рецензирование
}
TY - GEN
T1 - Comparative analysis of halftoning algorithms for digital watermarking
AU - Makarov, Anton
AU - Yakovleva, Elena
PY - 2016/9/6
Y1 - 2016/9/6
N2 - Steganography is the art of hiding information within other information in such a way that it is hard or even impossible to tell that it is there. The most popular carriers for steganography are the redundant data of multimedia, such as image, video, audio, and text digital image. Digital watermarking is the practice of hiding a message about a digital image within that image. Modern halftoning algorithms for obtaining a digital binarized image, applicable as a watermark, are discussed. The description of the steganographic system and results of halftoning of the grayscale images are presented. The algorithms of embedding of the halftoned image into grayscale image using the secret key, which provides theoretical and practical secrecy of the stegosystem, and detection, are described. The degradation of the embedded halftoned image by JPEG compression is estimated. From the results of calculations of the chosen distortion measures it has been found that digital watermarks created by using block-based halftoning algorithm has a smallest degradation by JPEG compression, than those obtained by other halftoning algorithms. Thus, the proposed steganographic system provides desired stability to compression and secrecy.
AB - Steganography is the art of hiding information within other information in such a way that it is hard or even impossible to tell that it is there. The most popular carriers for steganography are the redundant data of multimedia, such as image, video, audio, and text digital image. Digital watermarking is the practice of hiding a message about a digital image within that image. Modern halftoning algorithms for obtaining a digital binarized image, applicable as a watermark, are discussed. The description of the steganographic system and results of halftoning of the grayscale images are presented. The algorithms of embedding of the halftoned image into grayscale image using the secret key, which provides theoretical and practical secrecy of the stegosystem, and detection, are described. The degradation of the embedded halftoned image by JPEG compression is estimated. From the results of calculations of the chosen distortion measures it has been found that digital watermarks created by using block-based halftoning algorithm has a smallest degradation by JPEG compression, than those obtained by other halftoning algorithms. Thus, the proposed steganographic system provides desired stability to compression and secrecy.
UR - http://www.scopus.com/inward/record.url?scp=84989181240&partnerID=8YFLogxK
U2 - 10.1109/FRUCT-ISPIT.2016.7561527
DO - 10.1109/FRUCT-ISPIT.2016.7561527
M3 - Conference contribution
SN - 978-952-68397-3-8
T3 - Conference of Open Innovation Association, FRUCT
SP - 193
EP - 199
BT - Proceedings of the 18th Conference of Open Innovations Association FRUCT and Seminar on Information Security and Protection of Information Technolog, FRUCT-ISPIT 2016
A2 - Balandin, Sergey
A2 - Levina, Alla
A2 - Tyutina, Tatiana
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 18th Conference of Open Innovations Association FRUCT and Seminar on Information Security and Protection of Information Technolog, FRUCT-ISPIT 2016
Y2 - 18 April 2016 through 22 April 2016
ER -
ID: 7562582