Steganographic Method Based on Three Directional Embedding

세 방향 자료 은닉이 가능한 이미지 스테가노그래픽기법 연구

  • Received : 2010.01.11
  • Accepted : 2010.03.04
  • Published : 2010.04.05

Abstract

A steganographic method using three directional data embedding for gray images is presented in this paper. Cover image is divided into non-overlapping $2\times2$ sub-blocks and the basis pixel is selected to calculate the three different values of each sub-block. Difference values are replaced by embedding the number of secret bits that is referenced by the range table. For the three pixel pairs in the sub-block, the optimal pixel adjustment is preceded to reduce the distortion of visual quality. The experimental results show that the proposed method achieves a good visual quality and high capacity.

Keywords

References

  1. Ker, A., Steganalysis of LSB Matching in Grayscale Images, IEEE Signal Processing Letters 12, pp. 441-444, 2005. https://doi.org/10.1109/LSP.2005.847889
  2. Mielikainen, J., LSB Matching Revisited, IEEE Signal Processing Letters 13, pp. 285-287, 2006. https://doi.org/10.1109/LSP.2006.870357
  3. Wu, D. C., Tsai, W. H., A Steganographic Method for Images by Pixel-value Differencing, Pattern Reccognition Letters 24, pp. 1613-1626, 2003. https://doi.org/10.1016/S0167-8655(02)00402-6
  4. Yang, C. H., Weng, C. Y., A Steganographic Method for Digital Images by Multi-pixel Differencing, International Computer Symposium, IEEE, pp. 831-836, 2006.
  5. Chang, K. C., Huang, P. S., Tu, T. M., Chang, C. P., Adaptive Image Steganographic Scheme Based on Tri-way Pixel-value Dierencing, Systems, Man and Cybernetics, IEEE, pp. 1165-1170, 2007.
  6. Johnson, N. F., Exploring Steganography - Seeing the Unseen, Computer Practices, pp. 26-34, 1998.
  7. Swanson, M. Kobayashi, M. Tewk. A., Multimedia Data Embedding and Water-marking Technologies, Proceeding of IEEE 86, pp. 1064-1087, 1998. https://doi.org/10.1109/5.687830
  8. Fridrich, J., Goljan, M., Du, R., Invertible Authentication, Proceedings of SPIE, Security and Watemarking of Multimedia Contents, pp. 197-208, 2001.
  9. Macq, B., Deweyand F., Trusted Headers for Medical Images, DFG VIII-D II Watermarking Workshop, Erlangen, Germany, 1999.
  10. Chan, C. K., Cheng, L. M., Hiding Data in Images by Simple LSB Substitution, Pattern Recognition 37, pp. 469-474, 2004. https://doi.org/10.1016/j.patcog.2003.08.007
  11. Chang, C. C., Lin, M. H., Hu, Y. C., A Fast and Secure Image Hiding Scheme Based on LSB Substitution, International Journal of Pattern Recognition 16, pp. 399-416, 2002. https://doi.org/10.1142/S0218001402001770
  12. Wang, R. Z., Lin, C. F., Lin, J. C., Image Hiding by Optimal LSB Substitution and Genetic Algorithm, Pattern Recognition 34, pp. 671-683, 2001. https://doi.org/10.1016/S0031-3203(00)00015-7
  13. Thien, C. C., Lin, J. C., A Simple and High-hiding Capacity Method for Hiding Digit-by-digit Data in Images Based on Modulus Function, Pattern Recognition 36, pp. 2876-2881, 2003.
  14. Jung, K. H., Yoo, K. Y., Data Hiding Method using Image Interpolation, Computer Standards and Interfaces 31, pp. 465-470, 2009. https://doi.org/10.1016/j.csi.2008.06.001
  15. Lin, I. C., Lin Y. B., Wang, C. M., Hiding Data in Spatial Domain Images with Distortion Tolerance, Computer Standards and Interfaces 31, pp. 458-464, 2009. https://doi.org/10.1016/j.csi.2008.05.010
  16. Lin, C. C., Chen, S. C., Hsueh, N. L., Adaptive Embedding Techniques for VQ-compressed Images, Information Sciences 179, pp. 140-149, 2009. https://doi.org/10.1016/j.ins.2008.09.001
  17. Lee, C. F., Chang, C. C., Wang, K. H., An Improvement of EMD Embedding Method for Large Payloads by Pixel Segmentation Strategy, Image and Vision Computing 26, pp. 1670-1676, 2008. https://doi.org/10.1016/j.imavis.2008.05.005
  18. Goljan, M., Fridrich, J., Holotyak. T., New Blind Steganalysis and Its Implications, Proceedings of SPIE Electronic Imaging, pp. 1-13, 2006.
  19. Cheddad, A., Condell, J., Curran, K., Kevitt. P. M., Digital Image Steganography : Survey and Analysis of Current Methods, Signal Processing 90, pp. 727-752, 2010. https://doi.org/10.1016/j.sigpro.2009.08.010
  20. Wu, H. C., Wang, H. C. Tsai, C. S., Wang, C. M., Reversible Image Steganographic Scheme Via Predictive Coding, Displays 31, pp. 35-43, 2010. https://doi.org/10.1016/j.displa.2009.10.002
  21. Sabeti, V., Samvi, S., Mahdavi, M., Shirani, S., Steganalysis and Payload Estimation of Embedding in Pixel Differences using Neural Networks, Pattern Recognition 43, pp. 405-415, 2010. https://doi.org/10.1016/j.patcog.2009.06.006