In this paper the problem of estimating the importance of each of the characteristics of steganographic algorithms is solved. The resulting estimates are used in the analysis of the existing algorithms for information embedding and multiobjective choice of the best algorithm. The technique allows providing an equally weighted algorithms estimation, and also considers the importance of coefficients of characteristics.
1. Cox I., Miller M., Bloom J., Fridrich J., Kalker T. Digital Watermarking and Steganography. Second Edition. (Elsevier, 2008).
2. Watermarking (Vol.1) / Edited by Das Gupta, M. (InTech, Croatia, 2012).
3. Singh P., Chadha R. S. A Survey of Digital Watermarking Techniques // Applications and Attacks. International Journal of Engineering and Innovative Technology, Volume 2, Issue 9, (IJEIT, 2013).
4. Fridrich J. Applications of Data Hiding in Digital Images, 1999.
5. Domarev V. Safety of information technology // Methodology for creating protection systems, (DiaSoft, 2002).
6. Konakhovich G., Puzyrenko A. Computer steganography. Theory and Practice (MK-Press, 2006).
7. Surekha B., Swamy G. N. A Spatial Domain Public Image Watermarking // International Journal of Security and Its Applications Vol. 5 No. 1, (Jan 2011).
8. Jadav Y. Comparison of LSB and Subband // DCT Technique for Image Watermarking. Conference on Advances in Communication and Control Systems 2013, (CAC2S, 2013).
9. Kutter M., Petitcolas F. A fair benchmark for image watermarking systems // Proc. Of Security and Watermarking of Multimedia Contents. — P. 226–239 (Jan 1999).
10. Koch, E., Zhao, J. Toward robust and hidden image copyright labeling // IEE Workshop Nonlinear Signal and Image Processing. (1995).
11. Benham D., Memon N., Yeo B.L., Yeung M. Fast watermarking of DCT-based compressed images // Proc Int Conf Image Science, Systems, and Technology (CISST ’97), Las Vegas, NV. — P. 243–253, (June, 1997).
12. Sridevi T., Kumar V. A Robust Watermarking Algorithm Based on Image Normalization and DC Coefficients. IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 5, No 2, (Sept. 2011).
13. Li Z., Xilan Y., Hongsong L., Minrong C. A Dynamic Multiple Watermarking Algorithm Based on DWT and HVS // Int. J. Communications, Network and System Sciences, 5, 490-495. (2012), http://dx.doi.org/10.4236/ijcns.2012.58059.
14. Kashyap N., Sinha G.R. Image Watermarking Using 3-Level Discrete Wavelet Transform (DWT) // I. J. Modern Education and Computer Science, vol.3, 50–56 pp., published online in MECS, (April, 2012).
15. Fridrich J., Goljan M. Comparing robustness of watermarking techniques. Proc. SPIE Vol. 3657, (Security and Watermarking of Multimedia Content), San
Jose, (Jan, 1999).
16. Ó Ruanaidh J., Pun T. Rotation, scale and translation invariant digital image watermarking // Proc. of the ICIP’97, vol. 1, pp. 536–539, (California, 1997).
17. Piva A., Barni M., Bartolini F. Threshold Selection for Correlation-Based Watermark Detection // Proceedings of COST 254 Workshop on Intelligent Communications, L’Aquila, Italy, (June, 1998).