UPSI Digital Repository (UDRep)
Start | FAQ | About

QR Code Link :

Type :article
Subject :Q Science (General)
ISSN :0219-6220
Main Author :Zaidan, B. B.
Additional Authors :Zaidan, A. A.
Abdul Karim, H.
Ahmad, N. N.
Title :A new approach based on multi-dimensional evaluation and benchmarking for data hiding techniques (IR)
Place of Production :World Scientific
Year of Publication :2017
PDF Full Text :The author has requested the full text of this item to be restricted.

Abstract :
This paper presents a new approach based on multi-dimensional evaluation and benchmarking for data hiding techniques, i.e., watermarking and steganography. The novelty claim is the use of evaluation matrix (EM) for performance evaluation of data hiding techniques; however, one major problem with performance evaluation of data hiding techniques is to ¯nd reasonable thresholds for performance metrics and the trade-o® among them in di®erent data hiding applications. Two experiments are conducted. The ¯rst experiment included LSB techniques (eight approaches) based on di®erent payload results and the noise gate approach; a total of nine approaches were used. Five audio samples with di®erent audio styles are tested using each of the nine approaches and considering three evaluation criteria, namely, complexity, payload, and quality, to generate watermarked samples. The second experiment involves the use of various decision-making techniques simple additive weighting (SAW), multiplicative exponential weighting (MEW), hierarchical adaptive weighting (HAW), technique for order of preference by similarity to ideal solution (TOPSIS), weighted sum model (WSM) and weighted product method (WPM) to benchmark the results of the ¯rst experiment. Mean, standard deviation (STD), and paired sample t-test are then performed to compare the correlations among di®erent techniques on the basis of ranking results. The ¯ndings are as follows: (1) A statistically signi¯cant di®erence is observed among the ranking results of each multi-criteria decision-making (MCDM) technique, (2) TOPSIS-Euclidean is the best technique to solve the benchmarking problem among digital watermarking techniques. (3) Among the decisionmaking techniques, WSM has the lowest rank in terms of solving the benchmarking problem. (4) Under di®erent circumstances, the noise gate watermarking approach performs better than LSB algorithms

References

1. H. Wang, A.-T. Ho and S. Li, OR-benchmark: An open and recon¯gurable digital watermarking benchmarking framework, arXiv:1506.00243. 2. F. A. P. Petitcolas, Watermarking schemes evaluation, IEEE Signal Processing 17 (2000) 58–64. 3. A. K. Hmood, B. B. Zaidan and A. A. Zaidan, An overview on hiding information technique in images, Applied Science 10(18) (2010) 2094–2100. 4. A. K. Hmood, H. A. Jalab, Z. M. Kasirun, A. A. Zaidan and B. B. Zaidan, On the capacity and security of steganography approaches: An overview, Journal of Applied Sciences 10(16) (2010) 1825–1833. 5. B. B. Zaidan, A. A. Zaidan and A. K. Al-Frajat, On the di®erences between hiding information and cryptography techniques: An overview, Applied Science 10 (2010) 1650– 1655. 6. A. K. Al-Frajat, H. A. Jalab, Z. M. Kasirun, A. A. Zaidan and B. B. Zaidan, Hiding data in video ¯le: An overview, Journal of Applied Sciences 10(15) (2010) 1644–1649. 7. A. W. Naji, A. A. Zaidan, B. B. Zaidan, S. A. Hameed and O. O. Khalifa, Novel approach for secure cover ¯le of hidden data in the unused area within EXE ¯le using computation between cryptography and steganography, International Journal of Computer Science and Network Security 9 (2009) 294–300. 8. K. A. Zaidoon, A. A. Zaidan, B. B. Zaidan and H. O. Alanazi, Overview: Main fundamentals for steganography, Journal of Computing 2 (2010) 185–163. 9. A. Z Aos, A. W. Naji, S. A. Hameed, F. Othman and B. B. Zaidan, Approved undetectable-antivirus steganography for multimedia information in PE-¯le, Int. Association of Computer Science and Information Technology-Spring Conference (IEEE, 2009), pp. 437–441. 10. A. W. Naji, T. S. Gunawan, A. A. Zaidan, H. A. Shihab and B. B. Zaidan, Stego-analysis chain, session one investigations on steganography weakness Vs stego-analysis system for multimedia ¯le, in Int. Conf. IACSIT Spring Conference (IEEE, 2009), pp. 405–409. 11. B. B. Zaidan, A. A. Zaidan, A. Taqa, G. M. Alam, M. L. Kiah and A. H. Jalab, StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem, International Journal of Physical Sciences 11 (2010) 1796–1806. 12. A. A. Zaidan, B. B. Zaidan, M.-M. Abdulrazzaq, R.-Z. Raji and S.-M. Mohammed, Implementation stage for high securing cover-¯le of hidden data using computation between cryptography and steganography, Int. Conf. Computer Engineering and Applications, Telecom Technology and Applications 19 (2009) 482–489. 13. A. A. Zaidan, F. Othman, B. B. Zaidan, R. Z. Raji, A. K. Hasan and A. W. Naji, Securing cover-¯le without limitation of hidden data size using computation between cryptography and steganography, Proceedings of the World Congress on Engineering I (2009) 1–7. 14. M. E. Eltahir, L. M. Kiah, B. B. Zaidan and A. A. Zaidan, High rate video streaming steganography, in Int. Conf. on Future Computer and Communication (2009), pp. 672–675. 15. O.-O. Khalifa, A. W. Naji, A. A. Zaidan, B. B. Zaidan and S. A. Hameed, Novel approach of hidden data in the (unused area 2 within EXE ¯le) using computation between cryptography and steganography, International Journal of Computer Science and Network Security (IJCSNS) 9(5) (2010) 294–300. 16. M. Anas, M. M. Kiah, H. T. Madhloom, B. B. Zaidan and A. A. Zaidan, Novel approach for high secure and high rate data hidden in the image using image texture analysis, International Journal of Engineering Technology 1 (2009) 63–69. 17. G. M. Alam, M. L. Kiah, B. B. Zaidan, A. A. Zaidan and H. O. Alanazi, Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study, Scienti¯c Research and Essays 5 (2010) 3254–3260. 18. A. W. Naji, A. A. Zaidan, B. B. Zaidan and I. A. Muhamadi, New approach of hidden data in the portable executable ¯le without change the size of carrier ¯le using distortion techniques, World Academy of Science Engineering and Technology 56 (2009) 493–497. 19. A. A. Zaidan and B. B. Zaidan, Novel approach for high secure data hidden in MPEG video using public key infrastructure, International Journal of Computer and Network Security 1 (2009) 1–6. 20. R. Islam, A. W. Naji, A. A. Zaidan and B. B. Zaidan, New system for secure cover ¯le of hidden data in the image page within executable ¯le using statistical steganography techniques, International Journal of Computer Science and Information Security 7 (2010) 273–279. 21. H. A. Jalab, A. A. Zaidan and B. B. Zaidan, New design for information hiding with in steganography using distortion techniques, International Journal of Engineering and Technology 2 (2010) 72–77. 22. H. Jalab, A. A. Zaidan and B. B. Zaidan, Frame selected approach for hiding data within MPEG video using bit plane complexity segmentation, Journal of Computing 1 (2009) 108–113. 23. A. W. Naji, A. A. Zaidan and B. B. Zaidan, Challenges of hidden data in the unused area two within executable ¯les, Journal of Computer Science 5 (2009) 890–897. 24. A. A. Zaidan, A. W. Naji, S. A. Hameed, F. Othman and B. B. Zaidan, Approved undetectable-antivirus steganography for multimedia information in PE-¯le, in Int. Conf. IACSIT Spring Conference (IEEE, 2009), pp. 425–429. 25. B. B. Zaidan, A. A. Zaidan, A. Taqa and F. Othman, Stego-image vs stego-analysis system, International Journal of Computer and Electrical Engineering 1 (2009) 572–578. 26. B. B. Zaidan, A. A. Zaidan, F. Othman, R. Z. Raji, S. Mohammed and M. Abdulrazzaq, Quality of Image vs. Quantity of Data Hidden in the Image, in IPCV, Vol. 3, No. 7 (2009), pp. 343–350. 27. A. A. Zaidan, B. B. Zaidan, Y. A. Taqa, M. K. Sami, G. M. Alam and A. H. Jalab, Novel multicover steganography using remote sensing image and general recursion neural cryptosystem, International Journal of the Physical Sciences 5 (2010) 1776–1786. 28. N. Cvejic and T. Seppänen, Fusing digital audio watermarking and authentication in diverse signal domains, in Proc. European Signal Processing Conference (University of Oulu, Finland, 2005), pp. 84–87. 29. N. Cvejic and T. Seppiinen, Channel capacity of high bit rate audio data hiding algorithms in diverse transform domains, in Int. Symp. on Communications and Informatian Technologies (2004), pp. 84–88. 30. A. A. Zaidan, B. B. Zaidan and A. Majeed, High securing cover-¯le of hidden data using statistical technique and AES encryption algorithm, World Academy of Science Engineering and Technology 54 (2009) 468–479. 31. A. A. Zaidan, B. B. Zaidan and F. Othman, New technique of hidden data in PE-¯le with in unused area one, International Journal of Computer and Electrical Engineering 5 (2009) 642–650. 32. A. Taqa, A. A. Zaidan and B. B. Zaidan, New framework for high secure data hidden in the MPEG using AES encryption algorithm, International Journal of Computer and Electrical Engineering 5 (2009) 566–571. 33. A. W. Naji, S. A. Hameed, B. B. Zaidan, W. F. Al-Khateeb, O. O. Khalifa, A. A. Zaidan and T. S. Gunawan, Novel framework for hidden data in the image page within executable ¯le using computation between advanced encryption standard and distortion techniques, International Journal of Computer Science and Information Security 3 (2010) 73–78. 34. R.-J. Augustine and V. Devassia, A robust audio watermarking in frequency domain, in AIKED'06 Proc. of the 5th WSEAS International Conf. Arti¯cial Intelligence, Knowledge Engineering and Data Bases (2006), pp. 74–79. 35. S.-K. Bandyopadhyay and B.-G. Banik, LSB modi¯cation and phase encoding technique of audio steganography revisited, International Journal of Advanced Research in Computer and Communication Engineering 1 (2012) 1–4. 36. A. A. Zaidan, B. B. Zaidan, O. H. Alanazi, A. Gani, O. Zakaria and G. M. Alam, Novel approach for high (secure and rate) data hidden within triplex space for executable ¯le, Scienti¯c Research and Essays 5 (2010) 1965–1977. 37. A. A. Zaidan, B. B. Zaidan and H. A. Jalab, A new system for hiding data within (unusedarea two+ image page) of portable executable ¯le using statistical technique and advance encryption standard, International Journal of Computer Theory and Engineering 2 (2010) 218–225. 38. C.-H. Huang and J.-L. Wu, Fidelity-guaranteed robustness enhancement of blind-detection watermarking schemes, Information Sciences 179 (2009) 791–808. 39. S.-A. Kather and K. Vimal, Real steganography in non voice part of the speech, International Journal of Computer Applications 46 (2012) 1–5. 40. M. L. Kiah, B. B. Zaidan, A. A. Zaidan, A. M. Ahmed and S. H. Al-bakri, A review of audio based steganography and digital watermarking, International Journal of Physicial Sciences 6 (2011) 3837–3850. 41. A.-H. Lashkari, A.-A. Manaf and M. Masrom, Magic hexagon image steganography evaluator, International Journal of New Computer Architectures and Their Applications 1 (2012) 198–215. 42. M.-M. Patil and J. Chitode, Audio watermarking: A way to copyright protection, International Journal of Engineering 1 (2012) 1–6. 43. S.-S. Shahreza and M.-T. Shalmani, High capacity error free wavelet Domain Speech Steganography, in Int. Conf. Acoustics, Speech and Signal Processing (IEEE, 2008), pp.1729–1732. 44. K. Singla and S. Kaur, A comprehensive review on secure image steganography, Research Cell: An International Journal of Engineering Sciences 6 (2012) 25–33. 45. T. Takahashi and W. Lee, An assessment of VoIP covert channel threats, in Third Int. Conf. Security and Privacy in Communications Networks and the Workshops (IEEE, 2007), pp. 371–380. 46. N. Zaker and A. Hamzeh, A novel steganalysis for TPVD steganographic method based on di®erences of pixel di®erence histogram, Multimedia Tools and Applications 58 (2012) 147–166. 47. H.-J. Zhang and H.-J. Tang, A novel image steganography algorithm against statistical analysis, in Proc. Sixth Int. Conf. on Machine Learning and Cybernetics (Hong Kong, 2007), pp. 3884–3888. 48. A. W. Naji, A. A. Zaidan, B. B. Zaidan and I. S. Muhamadi, Novel approach for cover ¯le of hidden data in the unused area two within EXE ¯le using distortion techniques and advance encryption standard, World Academy of Science Engineering and Technology 56 (2010) 498–502. 49. M. Abomhara, O. O. Khalifa, O. Zakaria, A. A. Zaidan, B. B. Zaidan and A. Rame, Video compression techniques: An overview, Journal of Applied Sciences 10(16) (2010) 1834–1840. 50. T.-H. Ngan-Le, K.-H. Nguyen and H.-B. Le, Literature survey on image watermarking tools, watermark attacks and benchmarking tools, in Second Int. Conf. on Advances in Multimedia (IEEE) (Athens, Greece, 2010), pp. 67–73. 51. C. Feiet, D. Kundur and R. Kwong, Analysis and design of authentication watermarking, Security, Steganography, and Watermarking of Multimedia Contents 5306 (2004) 760–771. 52. J.-D. Gordy, Performance evaluation of digital watermarking algorithms. Master of science, The University of Calgary (2000). 53. N. Nikolaidis, V. Solachidis, A. Tefas, V. Arguriou and I. Pitas, Benchmarking of still image watermarking methods: Principles and state of the art, in Proc. of Electronic Imaging and the Visual Arts (2002), pp. 1–5. 54. G. Boato, V. Conotter, F.-G. D. Natale and C. Fontanari, Watermarking robustness evaluation based on perceptual quality via genetic algorithms, IEEE Transactions on Information Forensics and Security 4 (2009) 207–216. 55. V. Conotter, G. Boato, C. Fontanari and F.-G. De Natale, Comparison of watermarking algorithms via a GA-based benchmarking tool, in 16th IEEE Int. Conf. Image Processing (ICIP) (IEEE, 2009), pp. 4229–4232. 56. M.-S. Emami, G.-B. Sulong and S.-B. Seliman, A new fuzzy performance modeling for evaluating the trade-o® among robustness, quality and capacity in watermarking algorithms, International Journal of Innovative Computing Information and Control 8 (2012) 5067–5081.


This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials.
You may use the digitized material for private study, scholarship, or research.

Back to previous page

Installed and configured by Bahagian Automasi, Perpustakaan Tuanku Bainun, Universiti Pendidikan Sultan Idris
If you have enquiries with this repository, kindly contact us at pustakasys@upsi.edu.my or Whatsapp +60163630263 (Office hours only)