Abstract
Multimedia hiding system is to embed message behind the specified media, but it is still kept normal in media representations via human sensitive organizations without causing imperceptibility. In this article, we propose a data hiding system by means of flexible exploiting modification directions to achieve safer message concealments in image-media. In our scheme, n cover-pixels are flexibly chosen on modulo operations to embed a secret s, where n = ⌈ log3(s) ⌉. The varied pixel values associated with the chosen n pixels are only changed among [-1, 1]. Because the numbers of adjustable pixels are much greater than the pixels in the past scheme, our scheme is able to obtain a higher embedded ratio in response to the capacity requirements of information hiding systems. In addition, we also applied the statistics-steganalyzers to demonstrate that our scheme has accomplishment not only higher capacity but also kept the robustness against the blind steganalyzers.
- Artz, D. 2001. Digital steganographic: Hiding data within data. IEEE Internet Comput. 5, 75--80. Google Scholar
Digital Library
- Chan, C. K. and Chen, L. M. 2004. Hiding data in images by simple LSB substitution. Pattern Recognition 37, 3, 469--474.Google Scholar
Cross Ref
- Fridrich, J., Golijan, M., and Du, R. 2001. Reliable detection of LSB steganography in grayscale and color images. In Proceedings of ACM Workshop on Multimedia and Security. 27--30. Google Scholar
Digital Library
- Jung, K. H. and Yoo, K. Y. 2009. Improved exploiting modification direction method by modulus operation. Int. J. Sig. Proc. Image Proc. Patt. 2, 1, 79--87.Google Scholar
- Kim, H. J., Kim, C., Choi, Y., Wang, S., and Zhang, X. 2010. Improved modification direction methods. Comput. Math. Appl. 60, 2, 319--325. Google Scholar
Digital Library
- Mielikanine, J. 2006. LSB matching revisited. IEEE Signal Processing Letters 13, 5, 285--277.Google Scholar
Cross Ref
- Steganography: A Few Tools To Discover Hidden Data. http://www.guillermito2.net/stegano/tools/index.html, accessible by Aug. 1st, 2010.Google Scholar
- Wang, J. J., Sun, Y. T., Xu, H. A., Chen, K. K., Kim, H. J., and Joo, S. H. 2010. An improved section-wise exploiting modification direction Method. Signal Proc. 90, 11, 2954--2964. Google Scholar
Digital Library
- Zhang, W. and Zhang, X. 2009. Generalization of the ZZW Embedding construction for steganography. IEEE Trans. Inf. Foren. Security 4, 3, 564--569. Google Scholar
Digital Library
- Zhang, W., Zhang, X., and Wang, S. 2008. Maximizing steganographic embedding efficient by combining hamming codes and wet paper codes. In Information Hiding. Lecture Notes in Computer Science, vol. 5284. Springer, 60--71. Google Scholar
Digital Library
- Zhang, X. and Wang, S. 2006. Efficient steganography embedding by exploiting modification direcions. IEEE Commun. Lett. 10, 11, 781--783.Google Scholar
Cross Ref
Index Terms
Data embedding in image-media using weight-function on modulo operations
Recommendations
Data Hiding Using Flexible Multi-bit MER
ISBAST '13: Proceedings of the 2013 International Symposium on Biometrics and Security TechnologiesMulti-bit minimum error replacement (MER) is a method that can embed multi-bit logo/secret data into k least-significant bits (LSBs) of cover data only introduces minimum embedding error (MEE). However, k-LSBs MER suffers from weak robustness. Moreover, ...
Reversible image watermarking using interpolation technique
Watermarking embeds information into a digital signal like audio, image, or video. Reversible image watermarking can restore the original image without any distortion after the hidden data is extracted. In this paper, we present a novel reversible ...
A reversible data hiding scheme using even-odd embedding method
ICIC'10: Proceedings of the Advanced intelligent computing theories and applications, and 6th international conference on Intelligent computingReversible data hiding is very useful for some extremely image such like medical images and military images. In the reversible data hiding schemes, some schemes are good performance at hiding capacity but have a bad stego image quality, some schemes are ...






Comments