skip to main content
research-article

Data embedding in image-media using weight-function on modulo operations

Authors Info & Claims
Published:22 February 2013Publication History
Skip Abstract Section

Abstract

Multimedia hiding system is to embed message behind the specified media, but it is still kept normal in media representations via human sensitive organizations without causing imperceptibility. In this article, we propose a data hiding system by means of flexible exploiting modification directions to achieve safer message concealments in image-media. In our scheme, n cover-pixels are flexibly chosen on modulo operations to embed a secret s, where n = ⌈ log3(s) ⌉. The varied pixel values associated with the chosen n pixels are only changed among [-1, 1]. Because the numbers of adjustable pixels are much greater than the pixels in the past scheme, our scheme is able to obtain a higher embedded ratio in response to the capacity requirements of information hiding systems. In addition, we also applied the statistics-steganalyzers to demonstrate that our scheme has accomplishment not only higher capacity but also kept the robustness against the blind steganalyzers.

References

  1. Artz, D. 2001. Digital steganographic: Hiding data within data. IEEE Internet Comput. 5, 75--80. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Chan, C. K. and Chen, L. M. 2004. Hiding data in images by simple LSB substitution. Pattern Recognition 37, 3, 469--474.Google ScholarGoogle ScholarCross RefCross Ref
  3. Fridrich, J., Golijan, M., and Du, R. 2001. Reliable detection of LSB steganography in grayscale and color images. In Proceedings of ACM Workshop on Multimedia and Security. 27--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Jung, K. H. and Yoo, K. Y. 2009. Improved exploiting modification direction method by modulus operation. Int. J. Sig. Proc. Image Proc. Patt. 2, 1, 79--87.Google ScholarGoogle Scholar
  5. Kim, H. J., Kim, C., Choi, Y., Wang, S., and Zhang, X. 2010. Improved modification direction methods. Comput. Math. Appl. 60, 2, 319--325. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Mielikanine, J. 2006. LSB matching revisited. IEEE Signal Processing Letters 13, 5, 285--277.Google ScholarGoogle ScholarCross RefCross Ref
  7. Steganography: A Few Tools To Discover Hidden Data. http://www.guillermito2.net/stegano/tools/index.html, accessible by Aug. 1st, 2010.Google ScholarGoogle Scholar
  8. Wang, J. J., Sun, Y. T., Xu, H. A., Chen, K. K., Kim, H. J., and Joo, S. H. 2010. An improved section-wise exploiting modification direction Method. Signal Proc. 90, 11, 2954--2964. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Zhang, W. and Zhang, X. 2009. Generalization of the ZZW Embedding construction for steganography. IEEE Trans. Inf. Foren. Security 4, 3, 564--569. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Zhang, W., Zhang, X., and Wang, S. 2008. Maximizing steganographic embedding efficient by combining hamming codes and wet paper codes. In Information Hiding. Lecture Notes in Computer Science, vol. 5284. Springer, 60--71. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Zhang, X. and Wang, S. 2006. Efficient steganography embedding by exploiting modification direcions. IEEE Commun. Lett. 10, 11, 781--783.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Data embedding in image-media using weight-function on modulo operations

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!