scholarly journals Information Driven Evaluation of Data Hiding Algorithms

Author(s):  
Elisa Bertino ◽  
Igor Nai Fovino
Author(s):  
B. B. Zaidan ◽  
A. A. Zaidan ◽  
H. Abdul Karim ◽  
N. N. Ahmad

This paper presents a new approach based on multi-dimensional evaluation and benchmarking for data hiding techniques, i.e., watermarking and steganography. The novelty claim is the use of evaluation matrix (EM) for performance evaluation of data hiding techniques; however, one major problem with performance evaluation of data hiding techniques is to find reasonable thresholds for performance metrics and the trade-off among them in different data hiding applications. Two experiments are conducted. The first experiment included LSB techniques (eight approaches) based on different payload results and the noise gate approach; a total of nine approaches were used. Five audio samples with different audio styles are tested using each of the nine approaches and considering three evaluation criteria, namely, complexity, payload, and quality, to generate watermarked samples. The second experiment involves the use of various decision-making techniques simple additive weighting (SAW), multiplicative exponential weighting (MEW), hierarchical adaptive weighting (HAW), technique for order of preference by similarity to ideal solution (TOPSIS), weighted sum model (WSM) and weighted product method (WPM) to benchmark the results of the first experiment. Mean, standard deviation (STD), and paired sample [Formula: see text]-test are then performed to compare the correlations among different techniques on the basis of ranking results. The findings are as follows: (1) A statistically significant difference is observed among the ranking results of each multi-criteria decision-making (MCDM) technique, (2) TOPSIS-Euclidean is the best technique to solve the benchmarking problem among digital watermarking techniques. (3) Among the decision-making techniques, WSM has the lowest rank in terms of solving the benchmarking problem. (4) Under different circumstances, the noise gate watermarking approach performs better than LSB algorithms.


1986 ◽  
Vol 47 (C5) ◽  
pp. C5-129-C5-136 ◽  
Author(s):  
N. NIIMURA
Keyword(s):  

2013 ◽  
Vol E96.B (6) ◽  
pp. 1435-1443 ◽  
Author(s):  
Shuang QIN ◽  
Gang FENG ◽  
Wenyi QIN ◽  
Yu GE ◽  
Jaya Shankar PATHMASUNTHARAM

2016 ◽  
Vol 2016 (1) ◽  
pp. 213-218
Author(s):  
Kazushige Banzawa ◽  
Kazuma Shinoda ◽  
Madoka Hasegawa

Author(s):  
Manoj Kumar ◽  
Rohit Tanwar

In the computerized age as a result of the broad utilization of web, information covering up in advanced symbolism assumes a fundamental part to guarantee copyright assurance and power from pernicious assaults. Today the exponential development in web clients request secure information correspondence, for that it is required to send the information as encoded or shrouded shape. Numerous data framework security procedures are accessible.Information transmission needs security. Information covering up can be accomplished through numerous techniques. Distinctive information concealing procedures are talked about in this paper which incorporates watermarking, steganography, fingerprinting, cryptography and advanced mark.


2002 ◽  
Vol 22 (1Supplement) ◽  
pp. 229-232 ◽  
Author(s):  
Kohei Arai ◽  
Kaname Seto
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document