Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2015, Article ID 197215, 10 pages
http://dx.doi.org/10.1155/2015/197215
Research Article

An Improved Information Hiding Method Based on Sparse Representation

1School of Computer Science and Information Technology, Northeast Normal University, Changchun 130017, China
2School of Mathematics and Statistics, Northeast Normal University, Changchun 130017, China
3College of Information Science and Technology, Bohai University, Jinzhou 121013, China

Received 5 November 2014; Revised 9 December 2014; Accepted 9 December 2014

Academic Editor: Hui Zhang

Copyright © 2015 Minghai Yao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. P. Bedi, R. Bansal, and P. Sehgal, “Mulitimodal biometric authentication using PSO based watermarking,” Procedia Technology, vol. 4, pp. 612–618, 2012. View at Google Scholar
  2. M. Vatsa, R. Singh, and A. Noore, “Feature based RDWT watermarking for multimodal biometric system,” Image and Vision Computing, vol. 27, no. 3, pp. 293–304, 2009. View at Publisher · View at Google Scholar · View at Scopus
  3. A. K. Shaw, S. Majumder, S. Sarkar, and S. K. Sarkar, “A novel EMD based watermarking of fingerprint biometric using GEP,” Procedia Technology, vol. 10, pp. 172–183, 2013. View at Google Scholar
  4. C. Li, Y. Wang, B. Ma, and Z. Zhang, “Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme,” Computer Standards and Interfaces, vol. 34, no. 4, pp. 367–379, 2012. View at Publisher · View at Google Scholar · View at Scopus
  5. X. Che, J. Kong, J. Dai, Z. Gao, and M. Qi, “Content-based image hiding method for secure network biometric verification,” International Journal of Computational Intelligence Systems, vol. 4, no. 4, pp. 596–605, 2011. View at Publisher · View at Google Scholar · View at Scopus
  6. M. Qi, Y. Lu, N. Du, Y. Zhang, C. Wang, and J. Kong, “A novel image hiding approach based on correlation analysis for secure multimodal biometrics,” Journal of Network and Computer Applications, vol. 33, no. 3, pp. 247–257, 2010. View at Publisher · View at Google Scholar · View at Scopus
  7. Y. Shi, M. Qi, Y. Yi, M. Zhang, and J. Kong, “Object based dual watermarking for video authentication,” Optik, vol. 124, no. 19, pp. 3827–3834, 2013. View at Publisher · View at Google Scholar · View at Scopus
  8. P. Jost, P. Vandergheynst, and P. Frossard, “Redundant image representations in security applications,” in Proceedings of the International Conference on Image Processing (ICIP '04), pp. 2151–2154, October 2004. View at Publisher · View at Google Scholar · View at Scopus
  9. G. Cancelli, M. Barni, and G. Menegaz, “MPSteg: hiding a message in the matching pursuit domain,” in Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072 of Proceedings of SPIE, pp. 1–9, 2006. View at Publisher · View at Google Scholar · View at Scopus
  10. G. Cancelli and M. Barni, “MPSteg-color: a new steganographic technique for color images,” in Information Hiding: 9th International Workshop (IH '07), Saint Malo, France, June 11–13, 2007, vol. 4567 of Lecture Notes in Computer Science, pp. 1–15, Springer, Berlin, Germany, 2007. View at Publisher · View at Google Scholar
  11. G. Cancelli and M. Barni, “MPSteg-color: data hiding through redundant basis decomposition,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 3, pp. 346–358, 2009. View at Publisher · View at Google Scholar · View at Scopus
  12. Y. C. Pati, R. Rezaiifar, and P. S. Krishnaprasad, “Orthogonal matching pursuit: recursive function approximation with applications to wavelet decomposition,” in Proceedings of the 27th Annul Asilomar Conference on Signals, Systems and Computers, pp. 40–44, Pacific Grove, Calif, USA, 1993.
  13. S. G. Mallat and Z. Zhang, “Matching pursuits with time-frequency dictionaries,” IEEE Transactions on Signal Processing, vol. 41, no. 12, pp. 3397–3415, 1993. View at Publisher · View at Google Scholar · View at Scopus
  14. M. W. Guo, Y. Z. Zhao, C. B. Zhang, and Z. H. Chen, “Fast object detection based on selective visual attention,” Neurocomputing, vol. 144, no. 20, pp. 184–197, 2014. View at Publisher · View at Google Scholar
  15. H. P. Yu, Y. X. Chang, P. Lu, Z. Y. Xu, C. Y. Fu, and Y. F. Wang, “Efficient object detection based on selective attention,” Computers and Electrical Engineering, vol. 40, no. 3, pp. 907–919, 2014. View at Publisher · View at Google Scholar · View at Scopus
  16. Q. Liu, Q. Z. Zhang, W. B. Chen, and Z. C. Huang, “Pedestrian detection based on modeling computation of visual attention,” Journal of Beijing Information Science & Technology University, vol. 29, no. 2, pp. 59–65, 2014. View at Google Scholar
  17. C. Guo and L. Zhang, “A novel multiresolution spatiotemporal saliency detection model and its applications in image and video compression,” IEEE Transactions on Image Processing, vol. 19, no. 1, pp. 185–198, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  18. C. Yang, L. H. Zhang, H. C. Lu, X. Ruan, and M.-H. Yang, “Saliency detection via graph-based manifold ranking,” in Proceedings of the 26th IEEE Conference on Computer Vision and Pattern Recognition (CVPR '13), pp. 3166–3173, Portland, Ore, USA, June 2013. View at Publisher · View at Google Scholar · View at Scopus
  19. B. Yang and S. T. Li, “Visual attention guided image fusion with sparse representation,” Optik, vol. 125, no. 17, pp. 4881–4888, 2014. View at Publisher · View at Google Scholar
  20. H.-Y. Yang, Y.-W. Li, W.-Y. Li, X.-Y. Wang, and F.-Y. Yang, “Content-based image retrieval using local visual attention feature,” Journal of Visual Communication and Image Representation, vol. 25, no. 6, pp. 1308–1323, 2014. View at Publisher · View at Google Scholar
  21. X. H. Shen, Y. Wu, and Evanston, “A unified approach to salient object detection via low rank matrix recovery,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR '12), pp. 853–860, Providence, RI, USA, June 2012. View at Publisher · View at Google Scholar
  22. K.-S. Kim, M.-J. Lee, H.-Y. Lee, and H.-K. Lee, “Reversible data hiding exploiting spatial correlation between sub-sampled images,” Pattern Recognition, vol. 42, no. 11, pp. 3083–3096, 2009. View at Publisher · View at Google Scholar · View at Scopus
  23. J. H. Hwang, J. W. Kim, and J. U. Choi, “A reversible watermarking based on histogram shifting,” in Digital Watermarking: 5th International Workshop (IWDW '06), Jeju Island, Republic of Korea, November 8–10, 2006, vol. 4283 of Lecture Notes in Computer Science, pp. 348–361, Springer, Berlin, Germany, 2006. View at Publisher · View at Google Scholar
  24. PolyU multispectral palmprint Database, http://www.comp.polyu.edu.hk/~biometrics/MultispectralPalmprint/MSP.htm.
  25. CASIA-IrisV1[DB/OL], 2004, http://www.cbsr.ia.ac.cn/IrisDatabase.htm.
  26. M. Qi, J. Y. Dai, J. Z. Wang, X. X. Yu, and M. Zhang, “Content-based reversible steganographic method for multimodal biometrics,” Computer Science, vol. 39, no. 11, pp. 70–74, 2012. View at Google Scholar
  27. M. Vatsa, R. Singh, P. Mitra et al., “Comparing robustness of watermarking algorithms on biometrics data,” in Proceedings of the Workshop on Biometric Challenges from Theory to Practice (ICPR Workshop '04), pp. 5–8, August 2004.
  28. M. Vatsa, R. Singh, A. Noore, M. M. Houck, and K. Morris, “Robust biometric image watermarking for fingerprint and face template protection,” IEICE Electronics Express, vol. 3, no. 2, pp. 23–28, 2006. View at Publisher · View at Google Scholar · View at Scopus
  29. F. Y. Shih and S. Y. T. Wu, “Combinational image watermaking in the spatial and frequency domains,” Pattern Recognition, vol. 36, no. 4, pp. 969–975, 2002. View at Publisher · View at Google Scholar · View at Scopus