Browse > Article
http://dx.doi.org/10.3837/tiis.2013.03.011

Secure Modulus Data Hiding Scheme  

Kuo, Wen-Chung (Department of Computer Science and Information Engineering, National Yunlin University of Science & Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.7, no.3, 2013 , pp. 600-612 More about this Journal
Abstract
In 2006, Zhang and Wang proposed a data hiding scheme based on Exploiting Modification Direction (EMD) to increase data hiding capacity. The major benefit of EMD is providing embedding capacity greater than 1 bit per pixel. Since then, many EMD-type data hiding schemes have been proposed. However, a serious disadvantage common to these approaches is that the embedded data is compromised when the embedding function is disclosed. Our proposed secure data hiding scheme remedies this disclosure shortcoming by employing an additional modulus function. The provided security analysis of our scheme demonstrates that attackers cannot get the secret information from the stegoimage even if the embedding function is made public. Furthermore, our proposed scheme also gives a simple solution to the overflow/underflow problem and maintains high embedding capacity and good stegoimage quality.
Keywords
Data hiding; Modulus method; Cryptography; Steganography; Least significant bit replace method;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 X. T. Wang, C. C. Chang, C. C. Lin, M. C. Li, "A novel multi-group exploiting modification direction method based on switch map," Signal Processing, Vol.92, No.6, pp.1525-1535, 2012.   DOI   ScienceOn
2 F. M. J. Willems and M. Dijk, "Capacity and codes for embedding information in gray-scale signals," IEEE Trans. On Information Theory, Vol.51, No.3, pp.1209-1214, 2005.   DOI   ScienceOn
3 X. Zhang and S. Wang, "Efficient steganogrraphic embedding by exploiting modification," IEEE Communications Letters, Vol.10, No.11, pp.781-783, 2006.   DOI   ScienceOn
4 C. S. Kim, D. K. Shin, D. G. Shin and X. P. Zhang, "Im roved steganographic embedding exploiting modification direction in multimedia communications," Springer, CCIS 186, pp.130-138, 2011.
5 W. C. Kuo, and C. C. Wang, "Data hiding based on generalized exploiting modification direction method," Imaging Science Journal, http://dx.doi.org/ 10.1179 /1743131X12Y.0000000011, 2012.
6 W. C. Kuo, L. C. Wuu, C. N. Shyi, and S. H. Kuo, "A data hiding scheme with high embedding capacity based on general improving exploiting modification direction method," in Proc. of the Ninth International Conference on Hybrid Intelligent Systems(HIS2009), pp.69-73, 2009.
7 W. C. Kuo, L. C. Wuu, and S. H. Kuo, "The high embedding steganographic method based on general multi-EMD," in Proc. of the 2012 International Conference on Information Security and Intelligent Control (ISIC' , pp.286-289, 2012.
8 X. Liao, Q. Y. Wen, J. Zhang, "A steganographic method for digita images with four-pixe differencing and modified LSB substitution," Journal of Visual Communication and Image Representation, Vol.22, No.1, pp.1-8, 2011.   DOI   ScienceOn
9 C. F. Lee, Y. R. Wang and C. C. Chang, "A steganographic method with high embedding capacity by improving exploiting modification direction," in Proc. of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIHMSP07), Vol.1 , pp.497-500 , 2007.
10 C. F. Lee, C. C. Chang and K. H. Wang, "An improvement of EMD embedding method for large payloads by pixel segmentation strateg ," Image and Vision Computing, Vol 26, No.12, pp.1670-1676, 2008.   DOI   ScienceOn
11 K. Y. Lin, W. Hong, J. Chen, T. S. Chen and W. C. Chiang, "Data hiding by exploiting modification direction technique using optimal pixel grouping," in Proc. of the 2nd International Conference on Education Technology and Computer (ICETC2010), Vol.3, pp.121-123, 2010.
12 J. Mielikainen, "LSB matching revisited," IEEE Signal Processing Letters, Vol.13, No.5, pp.285-287, 2006.   DOI   ScienceOn
13 F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, "Information hiding-a survey," Proceedings of the IEEE, Vol.87, No.7, pp.1062-1078, 1999.   DOI   ScienceOn
14 R. L. Rivest, A. Shamir and L. Adleman, "A method or obtaining digita signatures and public-key cryptosystems," Communications of the ACM, Vol.21, No.2, pp.120-126, 1978.   DOI   ScienceOn
15 T. Sharp, "An implementation of key-based digita signa steganography," in Proc. of the 4th international workshop on information hiding. Springer, LNCS 2137, pp.13-26, 2001.
16 D. Stinson, Cryptography: Theory and Practice, CRC Press, 1995.
17 L. F. Turner, "Digita data security system," Patent IPN, WO 89/08915, 1989.
18 C. S. Chan, Y. Y. Tsai, and C. L. Liu, "An image hiding scheme by linking pixels in the circular Wa ," KSII Trans. On Internet and Information Systems, Vol.6, No.6, pp.1718-1734, 2012.
19 J. Fridrich, M. Goljan, and R. Du, "Detecting steganography in color and gray scale images, " IEEE Multimedia, Vol.8, No.4, pp.22-28, 2001.