DOI QR코드

DOI QR Code

An Adaptive Steganography of Optical Image using Bit-Planes and Multi-channel Characteristics

  • Received : 2008.06.18
  • Accepted : 2008.09.12
  • Published : 2008.09.25

Abstract

We proposed an adaptive steganography of an optical image using bit-planes and multichannel characteristics. The experiment's purpose was to compare the most popular methods used in optical steganography and to examine their advantages and disadvantages. In this paper we describe two digital methods: the first uses less significant bits(LSB) to encode hidden data, and in the other all blocks of $n{\times}n$ pixels are coded by using DCT(Digital Cosine Transformation), and two optical methods: double phase encoding and digital hologram watermarking with double binary phase encoding by using IFTA(Iterative Fourier Transform Algorithm) with phase quantization. Therefore, we investigated the complexity on bit plane and data, similarity insert information into bit planes. As a result, the proposed method increased the insertion capacity and improved the optical image quality as compared to fixing threshold and variable length method.

Keywords

References

  1. B. Javidi and J. L. Horner, "Optical pattern recognition for validation and security verification," Optical Engineering, vol. 33, pp. 1752-1756, 1994 https://doi.org/10.1117/12.170736
  2. B. Javidi, G. S. Zhang, and J. Li, "Experimental demonstration of the random phase encoding technique for image encryption and security verification," Optical Engineering, vol. 35, pp. 2506-2512, 1996 https://doi.org/10.1117/1.600854
  3. B. Javidi and E. Ahouzi, "Optical security system with Fourier plane encoding," Optical Engineering, vol. 37, pp. 6247-6255, 1998 https://doi.org/10.1117/1.601645
  4. R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Optical Engineering, vol. 35, pp. 2464-2469, 1996 https://doi.org/10.1117/1.600849
  5. N. F. Johnson, Z. Duric, and S. Jajodia, "Information Hiding- Steganography and Watermarking Attacks and Countermeasures," Kluwer Academic Publishers, pp. 18-44, 2001
  6. M. Niimi, H. Noda, and E. Kawaguchi, "Steganography Based on Region Segmentation with a Complexity Measure," Systems and Computers in Japan, vol. 30, issue. 3, pp. 1132-1140, 1999
  7. H. Wang and S. Wang, "Cyber warfare: Steganography vs steganalysis," Communications of the ACM, vol. 47, no. 10, 2004 https://doi.org/10.1145/1022594.1022597
  8. G. K. Wallace, "The jpeg still picture compression standard," Communications of the ACM, vol. 34, issue. 4, pp. 30-44, 1991 https://doi.org/10.1145/103085.103089
  9. K. Sherif and J. Bahram, "Information hiding technique with double phase encoding," Appl. Opt., vol. 41, no. 26, pp. 5462-5470, 2002 https://doi.org/10.1364/AO.41.005462
  10. R. Philippe and J. Bahram, "Optical image encryption using input plane and Fourier plane random encoding," Proceeding of SPIE, Vol. 2565, pp. 767-769, 1995
  11. T. Nomura and B. Javidi, "Information security using digital holography," Opt. Lett., vol. 25, no. 1, pp. 28-30, 2000 https://doi.org/10.1364/OL.25.000028
  12. X. Zhou, L. Chen, and J. Shao, "Investigation of digital hologram watermarking with double binary phase encoding," Optical Engineering, vol. 44, 2005
  13. R. W. Gerchberg and W. O. Saxton, "A practical algorithm for the determination of phase from image and diffraction plane pictures," Optik, vol. 35, pp. 237-246, 1972
  14. E. Kawaguchi and R.. Taniguchi, "Complexity of binary pictures and image thresholding – An application of DF-Expression to the thresholding problem", Proceedings of 8th International Conference on Pattern Recognition, vol. 2, pp. 1221-1225, 1986
  15. E. Kawaguchi and R.. Taniguchi, "The DF-Expression as an image thresholding strategy", IEEE Transactions on Systems, Man and Cybernetics, vol. 19, no. 5, pp. 1321-1328, 1989 https://doi.org/10.1109/21.44055
  16. E. Kawaguchi and R.. Taniguchi, "Depth-First Coding for multi-valued figures using bit-plane decomposition", IEEE Transactions on Communications, vol. 43, no. 5, pp. 1961-1995 https://doi.org/10.1109/26.387407
  17. J. Fridrich, "A New Steganographic Method for Palette Based Images," Proceeding of the IS&T PICS conference, pp. 285-289, 1988
  18. L. M. Marvel, C. G. Boncelet, Jr., and C. T. Retter, "Spread Spectrum Image Steganography,"IEEE Transactions on Image Processing, vol. 8, no. 8, pp. 1075-1083, 1999 https://doi.org/10.1109/83.777088
  19. M. Niimi, H. Noda, and E. Kawaguchi, "An Image Embedding in Image Complexity based Region Segmentation Method," Proceeding of International Conference on Image Processing, vol. 3, pp. 77-77, 1977
  20. N. F. Johnson, Z. Duric, and S. Jajodia, "Information Hiding Steganography and Watermarking Attacks and Countermeasures," Kluwer Academic Publishers, pp.18-44, 2001
  21. A. Westfeld and A. Pfitzmann, "Attacks on Steganographic systems," Lecture Notes in Computer Science, vol. 1768, Springer-Verlag, pp. 61-75, 2000 https://doi.org/10.1007/10719724_5
  22. Sin-Joo Lee, Jae-Min Bae, and Sung-Hwan Jung, "High Capacity Image Steganography using Complexity Measure," Proceeding of East-Asia Language Processing and Internet Information Technology, pp. 349-352, 2002
  23. http://funet.fi/pub/crypt/steganography/jpeg-jsteg-v4.diff.gz