Browse > Article
http://dx.doi.org/10.3837/tiis.2012.06.013

An Image Hiding Scheme by Linking Pixels in the Circular Way  

Chan, Chi-Shiang (Department of Applied Informatics and Multimedia, Asia University)
Tsai, Yuan-Yu (Department of Applied Informatics and Multimedia, Asia University)
Liu, Chao-Liang (Department of Applied Informatics and Multimedia, Asia University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.6, no.6, 2012 , pp. 1718-1734 More about this Journal
Abstract
The proposed method in this paper is derived from Mielikainen's hiding method. However, there exist some significant differences between two methods. In Mielikainen's method, pixels are partitioned into pairs and a LSB matching function is applied to two pixels for hiding. On the contrary, the proposed method partitions pixels into groups with three pixels in each group. The bits of pixels in each group are linked by using an exclusive OR (XOR) operator in a circular way. If the number of different values between the calculated XOR values and the secret bits is smaller than or equal to 2 in a group, the proposed method can guarantee that at most one pixel is needed to be modified by adding/subtracting its value to/from one, and three secret bits can be embedded to three pixels. Through theoretical analysis, the amount of the embedded secret data in the proposed method is larger than those in other methods under the same amount of pixel modifications. Taking real images in our experiments, the quality of stego-images in the proposed method is higher than those in other methods.
Keywords
Information hiding; LSB matching; LSB matching revisited;
Citations & Related Records

Times Cited By Web Of Science : 0  (Related Records In Web of Science)
연도 인용수 순위
  • Reference
1 C. S. Chan, "On using lsb matching function for data hiding in pixels," Fundamenta Informaticae, vol.96, pp.49-59, 2009.
2 C. C. Chang, J. Y. Hsiao, and C. S. Chan, " finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy," Pattern Recognition, vol.36, no.7, pp.1583-1595, Jul.2003.   DOI   ScienceOn
3 J. J. Harmsen, and W. A. Pearlman, "steganalysis of additive noise modelable information hiding," in Proc. of SPIE Security Watermarking Multimedia Contents V, vol.5020, pp.131-142, 2003.
4 A. Ker, "Improved detection of LSB steganography in grayscale image," in Proc. of Information Hiding Workshop, vol.3200, pp.97-115, 2004.
5 C. C. Lin, "An information hiding scheme with minimal image distortion," Computer Standards & Interfaces, vol.33, pp.477-484, 2011.   DOI   ScienceOn
6 J. Mielikainen, "LSB Matching Revisited," IEEE Signal Processing Letters, vol.13, no.5, pp.285-287, 2006.   DOI
7 C. C. Thien, and J. C. Lin, "A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function," Pattern Recognition, vol.36, pp.2875-2881, 2003.   DOI   ScienceOn
8 A. Westfeld, "F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis," ILNCS 2137, Springer-Verlag, vol. 2137, no.11, pp. 289-302, 2001.
9 R. Z. Wang, C. F. Lin, and J. C. Lin, "Image hiding by optimal LSB substitution and genetic algorithm," Pattern Recognition, vol.34, no.3, pp.671-683, 2001.   DOI   ScienceOn
10 X. Zhang, and S. Wang, "Efficient steganographic embedding by exploiting modification direction," IEEE Communications Letters, vol.10, no.11, pp.781-783, 2006.   DOI
11 W. Zhang, S. Wang, and X. Zhang, "Improving embedding efficiency of covering codes for applications in steganography," IEEE Communications Letters, vol.11, no.8, pp.680-682, 2007.   DOI