Information Hiding Method Based on Block DWT Sub-Band Feature Encoding
Qiudong SUN, Wenxin MA, Wenying YAN, Hong DAI
DOI: 10.4236/jsea.2009.25051   PDF    HTML     5,231 Downloads   8,945 Views  


For realizing of long text information hiding and covert communication, a binary watermark sequence was obtained firstly from a text file and encoded by a redundant encoding method. Then, two neighboring blocks were selected at each time from the Hilbert scanning sequence of carrier image blocks, and transformed by 1-level discrete wavelet transformation (DWT). And then the double block based JNDs (just noticeable difference) were calculated with a visual model. According to the different codes of each two watermark bits, the average values of two corresponding detail sub-bands were modified by using one of JNDs to hide information into carrier image. The experimental results show that the hidden information is invisible to human eyes, and the algorithm is robust to some common image processing operations. The conclusion is that the algorithm is effective and practical.

Share and Cite:

Q. SUN, W. MA, W. YAN and H. DAI, "Information Hiding Method Based on Block DWT Sub-Band Feature Encoding," Journal of Software Engineering and Applications, Vol. 2 No. 5, 2009, pp. 383-387. doi: 10.4236/jsea.2009.25051.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] M. Barni, F. Bartolini, and A. Piva, “Improved wavelet- based watermarking through pixel-wise masking,” IEEE Transactions on Image Processing, Vol. 10, No. 5, pp. 783–791, 2001.
[2] H. F. Yang and X. W. Chen, “A robust image-adaptive public watermarking technique in wavelet domain,” Journal of Software, Vol. 14, No. 9, pp. 1652–1660, 2003.
[3] J. G. Cao, J. E. Fowler, and N. H. Younan, “An image- adaptive watermark based on a redundant wavelet trans-form,” In: Pitas I, ed. Proceedings of the IEEE Interna-tional Conference on Image Processing, Thessaloniki, pp. 277–280, 2001.
[4] Z. M. Wang, Y. J. Zhang, and J. H. Wu, “A wavelet do-main watermarking technique based on human visual system,” Journal of Nanchang University (Natural Sci-ence), Vol. 29, No. 4, pp. 400–403, 2005.
[5] Q. D. Sun, W. X. Ma, W. Y. Yan, and H. Dai, “Text en-cryption technique based on robust image watermarking,” Journal of Image and Graphics, Vol. 13, No. 10, pp. 1942–1946, 2008.
[6] L. Y. Wu and F. Yang, “An improved digital watermark-ing algorithm based on DWT,” Control and Automation, Vol. 23, No. 6(3), pp. 46–47, 59, 2007.

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.