Marwa Saidi, Oussama Benrhouma, W. Adi, S. Belghith
{"title":"抗克隆SoC环境下的综合图像数据隐藏技术","authors":"Marwa Saidi, Oussama Benrhouma, W. Adi, S. Belghith","doi":"10.1109/EST.2015.20","DOIUrl":null,"url":null,"abstract":"In this paper, a combined algorithm of a chaotic data hiding scheme based on DCT transform and a watermarking technique based on Singular Value Decomposition(SVD) transform is proposed. Our scheme offers the feature to check the integrity of the extracted secret image. Basically, we will embed the watermarked secret bits in the least significant coefficients of the DCT transform and check the integrity of the embedded message by comparing the extracted version with the calculated one using a tamper detection key introduced in the watermarking technique. A possible future scenario application of embedding and extracting the watermark in SoC environment is proposed.","PeriodicalId":402244,"journal":{"name":"2015 Sixth International Conference on Emerging Security Technologies (EST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Combined Image Data Hiding Techniques in a Clone-Resistant SoC Environment\",\"authors\":\"Marwa Saidi, Oussama Benrhouma, W. Adi, S. Belghith\",\"doi\":\"10.1109/EST.2015.20\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, a combined algorithm of a chaotic data hiding scheme based on DCT transform and a watermarking technique based on Singular Value Decomposition(SVD) transform is proposed. Our scheme offers the feature to check the integrity of the extracted secret image. Basically, we will embed the watermarked secret bits in the least significant coefficients of the DCT transform and check the integrity of the embedded message by comparing the extracted version with the calculated one using a tamper detection key introduced in the watermarking technique. A possible future scenario application of embedding and extracting the watermark in SoC environment is proposed.\",\"PeriodicalId\":402244,\"journal\":{\"name\":\"2015 Sixth International Conference on Emerging Security Technologies (EST)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-09-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 Sixth International Conference on Emerging Security Technologies (EST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EST.2015.20\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Sixth International Conference on Emerging Security Technologies (EST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EST.2015.20","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Combined Image Data Hiding Techniques in a Clone-Resistant SoC Environment
In this paper, a combined algorithm of a chaotic data hiding scheme based on DCT transform and a watermarking technique based on Singular Value Decomposition(SVD) transform is proposed. Our scheme offers the feature to check the integrity of the extracted secret image. Basically, we will embed the watermarked secret bits in the least significant coefficients of the DCT transform and check the integrity of the embedded message by comparing the extracted version with the calculated one using a tamper detection key introduced in the watermarking technique. A possible future scenario application of embedding and extracting the watermark in SoC environment is proposed.