UPSI Digital Repository (UDRep)
|
![]() |
|
|
Abstract : Universiti Pendidikan Sultan Idris |
This paper presents a new approach based on multi-dimensional evaluation and benchmarking for data hiding techniques, i.e., watermarking and steganography. The novelty claim is the use of evaluation matrix (EM) for performance evaluation of data hiding techniques; however, one major problem with performance evaluation of data hiding techniques is to nd reasonable thresholds for performance metrics and the trade-o® among them in di®erent data hiding applications. Two experiments are conducted. The rst experiment included LSB techniques (eight approaches) based on di®erent payload results and the noise gate approach; a total of nine approaches were used. Five audio samples with di®erent audio styles are tested using each of the nine approaches and considering three evaluation criteria, namely, complexity, payload, and quality, to generate watermarked samples. The second experiment involves the use of various decision-making techniques simple additive weighting (SAW), multiplicative exponential weighting (MEW), hierarchical adaptive weighting (HAW), technique for order of preference by similarity to ideal solution (TOPSIS), weighted sum model (WSM) and weighted product method (WPM) to benchmark the results of the rst experiment. Mean, standard deviation (STD), and paired sample t-test are then performed to compare the correlations among di®erent techniques on the basis of ranking results. The ndings are as follows: (1) A statistically signi cant di®erence is observed among the ranking results of each multi-criteria decision-making (MCDM) technique, (2) TOPSIS-Euclidean is the best technique to solve the benchmarking problem among digital watermarking techniques. (3) Among the decisionmaking techniques, WSM has the lowest rank in terms of solving the benchmarking problem. (4) Under di®erent circumstances, the noise gate watermarking approach performs better than LSB algorithms. © 2024 World Scientific. All rights reserved. |
References |
H. Wang, A.-T. Ho and S. Li, OR-benchmark: An open and recon¯gurable digital watermarking benchmarking framework, arXiv:1506.00243. F. A. P. Petitcolas, Watermarking schemes evaluation, IEEE Signal Processing 17 (2000) 58–64. A. K. Hmood, B. B. Zaidan and A. A. Zaidan, An overview on hiding information technique in images, Applied Science 10(18) (2010) 2094–2100. A. K. Hmood, H. A. Jalab, Z. M. Kasirun, A. A. Zaidan and B. B. Zaidan, On the capacity and security of steganography approaches: An overview, Journal of Applied Sciences 10(16) (2010) 1825–1833. B. B. Zaidan, A. A. Zaidan and A. K. Al-Frajat, On the di®erences between hiding information and cryptography techniques: An overview, Applied Science 10 (2010) 1650–1655. A. K. Al-Frajat, H. A. Jalab, Z. M. Kasirun, A. A. Zaidan and B. B. Zaidan, Hiding data in video ¯le: An overview, Journal of Applied Sciences 10(15) (2010) 1644–1649. A. W. Naji, A. A. Zaidan, B. B. Zaidan, S. A. Hameed and O. O. Khalifa, Novel approach for secure cover ¯le of hidden data in the unused area within EXE ¯le using computation between cryptography and steganography, International Journal of Computer Science and Network Security 9 (2009) 294–300. K. A. Zaidoon, A. A. Zaidan, B. B. Zaidan and H. O. Alanazi, Overview: Main fundamentals for steganography, Journal of Computing 2 (2010) 185–163. A. Z Aos, A. W. Naji, S. A. Hameed, F. Othman and B. B. Zaidan, Approved undetectable-antivirus steganography for multimedia information in PE-¯le, Int. Association of Computer Science and Information Technology-Spring Conference (IEEE, 2009), pp. 437–441. A. W. Naji, T. S. Gunawan, A. A. Zaidan, H. A. Shihab and B. B. Zaidan, Stego-analysis chain, session one investigations on steganography weakness Vs stego-analysis system for multimedia ¯le, in Int. Conf. IACSIT Spring Conference (IEEE, 2009), pp. 405–409. B. B. Zaidan, A. A. Zaidan, A. Taqa, G. M. Alam, M. L. Kiah and A. H. Jalab, StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem, International Journal of Physical Sciences 11 (2010) 1796–1806. A. A. Zaidan, B. B. Zaidan, M.-M. Abdulrazzaq, R.-Z. Raji and S.-M. Mohammed, Implementation stage for high securing cover-¯le of hidden data using computation between cryptography and steganography, Int. Conf. Computer Engineering and Applications, Telecom Technology and Applications 19 (2009) 482–489. A. A. Zaidan, F. Othman, B. B. Zaidan, R. Z. Raji, A. K. Hasan and A. W. Naji, Securing cover-¯le without limitation of hidden data size using computation between cryptography and steganography, Proceedings of the World Congress on Engineering I (2009) 1–7. M. E. Eltahir, L. M. Kiah, B. B. Zaidan and A. A. Zaidan, High rate video streaming steganography, in Int. Conf. on Future Computer and Communication (2009), pp.672–675. O.-O. Khalifa, A. W. Naji, A. A. Zaidan, B. B. Zaidan and S. A. Hameed, Novel approach of hidden data in the (unused area 2 within EXE ¯le) using computation between cryptography and steganography, International Journal of Computer Science and Network Security (IJCSNS) 9(5) (2010) 294–300. M. Anas, M. M. Kiah, H. T. Madhloom, B. B. Zaidan and A. A. Zaidan, Novel approach for high secure and high rate data hidden in the image using image texture analysis, International Journal of Engineering Technology 1 (2009) 63–69. G. M. Alam, M. L. Kiah, B. B. Zaidan, A. A. Zaidan and H. O. Alanazi, Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study, Scienti¯c Research and Essays 5 (2010) 3254–3260. A. W. Naji, A. A. Zaidan, B. B. Zaidan and I. A. Muhamadi, New approach of hidden data in the portable executable ¯le without change the size of carrier ¯le using distortion techniques, World Academy of Science Engineering and Technology 56 (2009) 493–497. A. A. Zaidan and B. B. Zaidan, Novel approach for high secure data hidden in MPEG video using public key infrastructure, International Journal of Computer and Network Security 1 (2009) 1–6. R. Islam, A. W. Naji, A. A. Zaidan and B. B. Zaidan, New system for secure cover ¯le of hidden data in the image page within executable ¯le using statistical steganography techniques, International Journal of Computer Science and Information Security 7 (2010) 273–279. H. A. Jalab, A. A. Zaidan and B. B. Zaidan, New design for information hiding with in steganography using distortion techniques, International Journal of Engineering and Technology 2 (2010) 72–77. H. Jalab, A. A. Zaidan and B. B. Zaidan, Frame selected approach for hiding data within MPEG video using bit plane complexity segmentation, Journal of Computing 1 (2009) 108–113. A. W. Naji, A. A. Zaidan and B. B. Zaidan, Challenges of hidden data in the unused area two within executable ¯les, Journal of Computer Science 5 (2009) 890–897. |
This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials. You may use the digitized material for private study, scholarship, or research. |