Title :
Combined Image Data Hiding Techniques in a Clone-Resistant SoC Environment
Author :
Marwa Saidi;Oussama Benrhouma;Wael Adi;Safya Belghith
Author_Institution :
Ecole Nat. d´Ing. de Tunis, Univ. de Tunis El Manar, Tunis, Tunisia
Abstract :
In this paper, a combined algorithm of a chaotic data hiding scheme based on DCT transform and a watermarking technique based on Singular Value Decomposition(SVD) transform is proposed. Our scheme offers the feature to check the integrity of the extracted secret image. Basically, we will embed the watermarked secret bits in the least significant coefficients of the DCT transform and check the integrity of the embedded message by comparing the extracted version with the calculated one using a tamper detection key introduced in the watermarking technique. A possible future scenario application of embedding and extracting the watermark in SoC environment is proposed.
Keywords :
"Watermarking","Discrete cosine transforms","Electronic mail","Feature extraction","Matrix decomposition"
Conference_Titel :
Emerging Security Technologies (EST), 2015 Sixth International Conference on
DOI :
10.1109/EST.2015.20