DOI QR코드

DOI QR Code

High capacity multi-bit data hiding based on modified histogram shifting technique

  • Received : 2018.02.15
  • Accepted : 2018.05.14
  • Published : 2018.10.01

Abstract

A novel data hiding technique based on modified histogram shifting that incorporates multi-bit secret data hiding is proposed. The proposed technique divides the image pixel values into embeddable and nonembeddable pixel values. Embeddable pixel values are those that are within a specified limit interval surrounding the peak value of an image. The limit interval is calculated from the number of secret bits to be embedded into each embeddable pixel value. The embedded secret bits can be perfectly extracted from the stego image at the receiver side without any overhead bits. From the simulation, it is found that the proposed technique produces a better quality stego image compared to other data hiding techniques, for the same embedding rate. Since the proposed technique only embeds the secret bits in a limited number of pixel values, the change in the visual quality of the stego image is negligible when compared to other data hiding techniques.

Keywords

References

  1. C. K. Chan et al., Hiding data in images by simple LSB substitution, Pattern Recog. 37 (2004), 469-474. https://doi.org/10.1016/j.patcog.2003.08.007
  2. J. Fridrich et al., Reliable detection of LSB steganography in color and grayscale images, Int. Conf. Multimedia Security: New Challenges, Ottawa, Canada, Oct. 2001, pp. 27-30.
  3. J. Mielikainen, LSB matching revisited, IEEE Signal Process. Lett. 13 (2006), no. 5, 285-287. https://doi.org/10.1109/LSP.2006.870357
  4. X. Zhang and S. Wnag, Efficient steganographic embedding by exploiting modification direction, IEEE Commun. Lett. 10 (2006), no. 11, 781-783. https://doi.org/10.1109/LCOMM.2006.060863
  5. H. Hajizadeh, A. Ayatollahi, and S. Mirzakuchaki, A new high capacity and EMD-based image steganography scheme in spatial domain, Iranian Conf. Electrical Eng., Mashhad, Iran, May 2013, pp. 1-6.
  6. T. D. Kieu and C. Chang, A steganographic scheme by fully exploiting modification directions, Expert Syst. Appl. 38 (2011), no. 8, 10648-10657. https://doi.org/10.1016/j.eswa.2011.02.122
  7. J. H. Kim et al., Improved modification direction methods, Comput. Math. Appl. 60 (2010), no. 2, 319-325. https://doi.org/10.1016/j.camwa.2010.01.006
  8. C. F. Lee, Y. R. Wnag, and C. C. Chang, A steganographic method with high embedding capacity by improving exploiting modification direction, Int. Conf. Intell. Inform. Hiding Multimedia Signal Process., Kaohsiung, Taiwan, Nov. 2007, pp. 497-500.
  9. J. Wang et al., An improved section-wise exploiting modification direction method, Signal Process. 90 (2010), no. 11, 2954-2964. https://doi.org/10.1016/j.sigpro.2010.04.022
  10. C. C. Chang, Y. C. Chou, and T. D. Kieu, An information hiding scheme using Sudoku, Int. Conf. Innovative Comput. Inform. Contr., Dalian, Liaoning, China, June 2008, pp. 17-22.
  11. D. C. Wu et al., A steganographic method for images by pixelvalue differencing, Pattern Recog. Lett. 24 (2003), no. 9-10, 1613-1626. https://doi.org/10.1016/S0167-8655(02)00402-6
  12. J. C. Joo, H. Y. Lee, and H. K. Lee, Improved steganographic method preserving pixel-value differencing histogram with modulus function, EURASIP J. Adv. Signal Proc. 2010 (2010), 1-13.
  13. C. M. Wang et al., A high quality steganographic method with pixel-value differencing and modulus function, J. Sys. Soft. 81 (2008), no. 1, 150-158. https://doi.org/10.1016/j.jss.2007.01.049
  14. S. Y. Shen and L. H. Huang, A data hiding scheme using pixel value differencing and improving exploiting modification directions, Comput. Security 48 (2015), 131-141. https://doi.org/10.1016/j.cose.2014.07.008
  15. B. Kaur, A. Kaur, and J. Singh, Steganographic approach for hiding image in DCT domain, Int. J. Adv. Eng. Technol. 1 (2011), 72-78.
  16. C. C. Lin and P. F. Shiu, High capacity data hiding scheme for DCT-based images, J. Inform. Hiding Multimedia Signal Proc. 1 (2010), no. 3, 220-240.
  17. B. K. Panigrahi and P. S. Reddy, High quality high capacity robust DWT based steganography, Int. J. Innov. Res. Dev. 3 (2014), no. 5, 49-52.
  18. Y. P. Lee et al., High-payload image hiding with quality recovery using tri-way pixel-value differencing, Inform. Sci. 191 (2012), 214-255. https://doi.org/10.1016/j.ins.2012.01.002
  19. X. Zhang, S. Wnag, and Z. Zhou, Multibit assignment steganography in palette images, IEEE Sign. Proc. Lett. 15 (2008), 553-556. https://doi.org/10.1109/LSP.2008.2001117
  20. H. Z. Wu et al., Multi-layer assignment steganography using graph-theoretic approach, Multimedia Tools Appl. 74 (2015), no. 18, 8171-8196. https://doi.org/10.1007/s11042-014-2050-y
  21. S. Voloshynovskiy et al., Attacks on digital watermarks: Classification, estimation based attacks and benchmarks, IEEE Commun. Mag. 39 (2001), no. 8, 118-126. https://doi.org/10.1109/35.940053
  22. N. M. Makbol and B. E. Khoo, Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition, AEU - Int. J. Elec. Commun. 67 (2013), no. 2, 102-112. https://doi.org/10.1016/j.aeue.2012.06.008
  23. Z. Wang and A. C. Bovik, A universal image quality index, IEEE Sign. Proc. Lett. 9 (2002), no. 3, 81-84. https://doi.org/10.1109/97.995823
  24. C. C. Chang and T. C. Lu, A difference expansion oriented data hiding scheme for restoring the original host image, J. Sys. Soft. 79 (2006), no. 12, 1754-1766. https://doi.org/10.1016/j.jss.2006.03.035
  25. C. T. Lu, C. C. Chang, and Y. H. Huang, High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting, Multimedia Tools Appl. 72 (2014), no. 1, 417-435. https://doi.org/10.1007/s11042-013-1369-0

Cited by

  1. An Advanced Reversible Data Hiding Algorithm Using Local Similarity, Curved Surface Characteristics, and Edge Characteristics in Images vol.10, pp.3, 2020, https://doi.org/10.3390/app10030836