Browse > Article
http://dx.doi.org/10.3837/tiis.2021.04.018

High Capacity Information Hiding Method Based on Pixel-value Adjustment with Modulus Operation  

Li, Teng (School of Computer and Information Science, Southwest University)
Zhang, Yu (School of Computer and Information Science, Southwest University)
Wang, Sha (School of Computer and Information Science, Southwest University)
Sun, Jun-jie (School of Computer and Information Science, Southwest University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.15, no.4, 2021 , pp. 1521-1537 More about this Journal
Abstract
Through information hiding technique, secret message can be hidden in pictures. Stego-image quality and hiding capacity are two important metrics for information hiding. To enhance these metrics, many schemes were proposed by scholars in recent years. Some of them are effective and successful, but there is still a room for further improvement. A high capacity information hiding scheme (PAMO, Pixel-value Adjustment with Modulus Operation Algorithm) is introduced in this paper. PAMO scheme uses pixel value adjustment with modulus operation to hide confidential data in cover-image. PAMO scheme and some referenced schemes are implemented in Python and experiments are carried out to evaluate their performance. In the experiments, PAMO scheme shows better performance than other methods do. When secret message length is less than 72000 bits, the highest hiding capacity of PAMO can reach 7 bits per pixel, at the same time the PSNR of stego-images is greater than 30 dB.
Keywords
Cover-image; Hiding Capacity; Information Hiding; Modulus Operation; Stego-image;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. C. Cheng, W. C. Kuo, and B. R. Su, "Data-hiding based on sudoku and generalized exploiting modification direction," Journal of Electronic Science Technology, vol. 16, no. 2, pp. 123-128, 2018.
2 W. C. Kuo, C. C. Wang, and Y. C. Huang, "Binary power data hiding scheme," AEU - International Journal of Electronics and Communications, vol. 69, no. 11, pp. 1574-1581, 2015.   DOI
3 C. K. Chan and L. M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognittion, vol. 37, no. 3, pp. 469-474, 2004.   DOI
4 C. F. Lee, Y. R. Wang, and C. C. Chang, "A steganographic method with high embedding capacity by improving exploiting modification direction," in Proc. of the 3 rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP), vol. 1, pp. 497-500, 2007.
5 C. H. Yang, "Inverted pattern approach to improve image quality of information hiding by LSB substitution," Pattern Recognition, vol. 41, no. 8, pp. 2674-2683, 2008.   DOI
6 F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding - a survey," Proceedings of IEEE, vol. 87, no. 7, pp. 1062-1078, 1999.   DOI
7 S. Y. Shen and L. H. Huang, "A data hiding scheme using pixel value differencing and improving exploiting modification directions," Computers and Securrity, vol. 48, pp. 131-141, 2015.   DOI
8 J. Mielikainen, "LSB matching revisited," IEEE Signal Processing Letters, vol. 13, no. 5, pp. 285-287, 2006.   DOI
9 C. C. Chang, M. H. Lin, and Y. C. Hu, "A fast and secure image hiding scheme based on LSB substitution," International Journal Pattern Recognition and Artificial Intelligence, vol. 16, no. 4, pp. 399-416, 2002.   DOI
10 Y. Y. Tsai, C. S. Chan, C. L. Liu, and B. R. Su, "A reversible steganographic algorithm for BTCcompressed images based on difference expansion and median edge detector," Imaging Science Journal, vol. 62, no. 1, pp. 48-55, 2014.   DOI
11 X. Zhang and S. Wang, "Efficient steganographic embedding by exploiting modification direction," IEEE Communications Letters, vol. 10, no. 11, pp. 781-783, 2006.   DOI
12 H. J. Kim, C. Kim, Y. Choi, S. Wang, and X. Zhang, "Improved modification direction methods," Computers and Mathematics with Applications, vol. 60, no. 2, pp. 319-325, 2010.   DOI
13 W. C. Kuo, "Secure modulus data hiding scheme," KSII Transactions on Internet Information Systems, vol. 7, no. 3, pp. 610-622, 2013.
14 W. Hong and T. S. Chen, "A novel data embedding method using adaptive pixel pair matching," IEEE Transactions on Information Forensics Security, vol. 7, no. 1, pp. 176-184, 2012.   DOI
15 K. Jung and K. Y. Yoo, "Improved Exploiting Modification Direction Method by Modulus Operation," International Journal of Signal Processing, Image Processing and Pattern Recognition, vol. 2, no. 1, pp. 79-88, 2009.
16 T. D. Sairam and K. Boopathybagan, "An improved high capacity data hiding scheme using pixel value adjustment and modulus operation," Multimedia Tools Applications, vol. 79, pp. 17003-17013, 2019.   DOI
17 Y. Zhang, S. Wang, T. Li, B. Liu, and D. B. Pan, "Modulus Calculations on Prime Number Algorithm for Information Hiding with High Comprehensive Performance," IEEE Access, vol. 8, pp. 85309-85320, 2020.   DOI
18 W. C. Kuo, S. H. Kuo, C. C. Wang, and L. C. Wuu, "High capacity data hiding scheme based on multi-bit encoding function," Optik (Stuttg), vol. 127, no. 4, pp. 1762-1769, 2016.   DOI
19 K. H. Jung, J. G. Yu, S. M. Kim, K. J. Kim, J. Y. Byun, and K. Y. Yoo, "The hiding of secret data using the run length matching method," in Proc. of KES International Symposium on Agent and Multi-Agent Systmes: Technologies and Applications, vol. 4496, pp. 1027-1034, 2007.
20 W. C. Kuo, C. C. Wang, and H. C. Hou, "Signed digit data hiding scheme," Information Processing Letters, vol. 116, no. 2, pp. 183-191, 2016.   DOI
21 USC-SIPI image database.