Skip to main content

Secure Data-Hiding in Multimedia Using NMF

  • Conference paper
Multimedia Content Representation, Classification and Security (MRCS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4105))

  • 1452 Accesses

Abstract

This paper presents a novel data-hiding scheme for multimedia data using non-negative matrix factorization (NMF). Nonnegative feature space (basis matrix) is estimated using the NMF-framework from the sample set of multimedia objects. Subsequently, using a secret key a subspace (basis vector) of the estimated basis matrix is used to decompose the host data for information embedding and detection. Binary dither modulation is used to embed/detect the information into the host signal coefficients. To ensure the fidelity of the embedded information for a given robustness, host media coefficients are selected for information embedding according to the estimated masking threshold. Masking threshold is estimated using the human visual/auditory system (HVS/HAS) and host media. Simulation results show that the proposed NMF-based scheme provides flexible control over robustness and capacity for imperceptible embedding.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Chen, B., Wornell, G.W.: Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding. IEEE Trans. Information Theory 47(4), 1423–1443 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  2. Paatero, P., Tapper, U.: Positive Matrix Factorization: A Non-Negative Factor Model with Optimal Utilization of Error Estimates of Data Values. Environmetrics 381, 607–609 (1994)

    Google Scholar 

  3. Lee, D.D., Seung, H.S.: Learning the Parts of Objects by Non-Negative Matrix Factorization. Nature 401(6755), 788–1718 (1999)

    Article  Google Scholar 

  4. Hoyer, P.O.: Non-Negative Sparse Coding. J. Machine Learning Research 5, 1457–1469 (2004)

    MathSciNet  Google Scholar 

  5. http://www.cis.hut.fi/phoyer/code/

  6. Bounkong, S., Toch, B., Saad, D., Lowe, D.: ICA for Watermarking Digital Images. J. Machine Learning Research 1, 1–25 (2002)

    Google Scholar 

  7. Watson, A.B.: Visual Optimization of DCT Quantization Matrices for Individual Images. In: Proc. AIAA Computing in Aerospace, vol. 9, pp. 286–291 (1993)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Malik, H., Baqai, F., Khokhar, A., Ansari, R. (2006). Secure Data-Hiding in Multimedia Using NMF. In: Gunsel, B., Jain, A.K., Tekalp, A.M., Sankur, B. (eds) Multimedia Content Representation, Classification and Security. MRCS 2006. Lecture Notes in Computer Science, vol 4105. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11848035_36

Download citation

  • DOI: https://doi.org/10.1007/11848035_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-39392-4

  • Online ISBN: 978-3-540-39393-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics