Browse > Article
http://dx.doi.org/10.3837/tiis.2021.09.012

A Two-Layer Steganography for Mosaic Images  

Horng, Ji-Hwei (Department of Electronic Engineering, National Quemoy University)
Chang, Chin-Chen (Department of Information Engineering and Computer Science, Feng Chia University)
Sun, Kun-Sheng (Department of Electronic Engineering, National Quemoy University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.15, no.9, 2021 , pp. 3298-3321 More about this Journal
Abstract
A lot of data hiding schemes have been proposed to embed secret data in the plain cover images or compressed images of various formats, including JPEG, AMBTC, VQ, etc. In this paper, we propose a production process of mosaic images based on three regular images of coffee beans. A primary image is first mimicked by the process to produce a mosaic cover image. A two-layer steganography is applied to hide secret data in the mosaic image. Based on the low visual quality of the mosaic cover image, its PSNR value can be improved about 1.5 dB after embedding 3 bpp. This is achieved by leveraging the newly proposed polarized search mask and the concepts of strong embedding and weak embedding. Applying steganography to the mosaic cover images is a completely new idea and it is promising.
Keywords
Data hiding; mosaic image; polarized mask; strong embedding; weak embedding;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. Fridrich and J. Kodovsky, "Rich Models for Steganalysis of Digital Images," IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 868-882, June 2012.   DOI
2 Zhang, X., Wang, S., "Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security," Pattern Recognition Letters, vol. 25, no. 3, 331-339, 2004.   DOI
3 C. N. Yang, T. S. Chen, K. H. Yu and C. C. Wang, "Improvements of image sharing with steganography and authentication," Journal of Systems and Software, vol. 80, no. 7, pp. 1070-1076, 2007.   DOI
4 https://www.kdccoffee.com/.
5 Dengpan, Y., Shunzhi, J., Shiyu, L. et al., "Faster and transferable deep learning steganalysis on GPU," J Real-Time Image Proc, 16, 623-633, 2019.   DOI
6 Y. Liu, C. C. Chang, T. S. Nguyen, "High capacity turtle shell-based data hiding," IET Image Process, vol. 10, no. 2, pp. 130-137, 2016.
7 S. Kurup, A. Rodrigues, A. Bhise, "Data hiding scheme based on octagon shaped shell," in Proc. of International Conference on Advances in Computing, Communication and Informatics, Kerala, India, pp. 1982-1986, 2015.
8 X. Zhang, S. Wang, "Efficient steganographic embedding by exploiting modification direction," IEEE Communications Letters, vol. 10, no. 11, pp. 781-783, Nov. 2006.   DOI
9 H. J. Kim, C. Kim, Y. Choi, et al., "Improved modification direction methods," Comput. Math.Appl, vol. 60, no. 2, pp. 319-325, 2010.   DOI
10 C. C. Chang, Y. Liu, T. S. Nguyen, "A novel turtle shell-based scheme for data hiding," in Proc. of 10th Int. Conf. Intell. Inf. Hiding Multimedia Signal Process. (IIHMSP), Kitakyushu, Japan, pp. 89-93, Aug. 2014.
11 L. Liu, C. C. Chang, A. Wang, "Data hiding based on extended turtle shell matrix construction method," Multimedia Tools Appl, vol. 76, pp. 12233-12250, 2017.   DOI
12 X. Z. Xie, C. C. Lin, C. C. Chang, "Data hiding based on a two-layer turtle shell matrix," Symmetry, vol. 10, no. 2, pp. 47, 2018.   DOI
13 F. Huang, X. Qu, H. J. Kim and J. Huang, "Reversible data hiding in JPEG images," IEEE Transactions on Circuits Systems for Video Technology, vol. 26, no. 9, pp.1610-1621, 2016.   DOI
14 Y. Shi, X. Li, X. Zhang, H. Wu and B. Ma, "Reversible data hiding: Advances in the past two decades," IEEE Access, vol. 4, pp. 3210-3237, 2016.   DOI
15 H. S. Leng, "Generalized scheme based on octagon-shaped shell for data hiding in steganographic applications," Symmetry, vol. 11, no. 6, pp. 1-10, 2019.
16 M. Z. He, Y. J. Liu, C. C. Chang, et al., "A mini Sudoku matrix-based data embedding scheme with high payload," IEEE Access, vol. 7, pp. 141414-141425, 2019.   DOI
17 J. Lin, J. H. Horng, Y. Liu and C. C. Chang, "An Anisotropic Reference Matrix for Image Steganography," Journal of Visual Communication and Image Representation, Vol. 74, 102969, January 2021.   DOI
18 T. S. Nguyen, C. C. Chang, "A reversible data hiding scheme based on the Sudoku technique," Displays, vol. 39, pp. 109-116, 2015.   DOI
19 C. C. Chang, C. T. Li, Y. Q. Shi, "Privacy-aware reversible watermarking in cloud computing environments," IEEE Access, vol. 6, no. 1, pp. 70720-70733, 2018.   DOI
20 C. C. Chang, C. T. Li, "Algebraic secret sharing using privacy homomorphisms for IoT-based healthcare systems," Math. Biosci. Eng, vol. 16, no. 5, pp. 3367-3381, 2019.   DOI
21 https://unsplash.com/.
22 K. Gao, J. H. Horng, Y. J. Liu, and C. C. Chang, "A Reversible Secret Image Sharing Scheme Based on Stick Insect Matrix," IEEE Access, vol. 8, pp. 130405-130416, 2020.   DOI
23 W. Hong, "Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique," Information Sciences, vol. 221, pp. 473-489, 2013.   DOI
24 T. D. Kieu, C. C. Chang, "A steganographic scheme by fully exploiting modification directions," Expert system with applications, vol. 38, no. 8, pp. 10648-10657, 2011.   DOI
25 Q. Jin, Z. Li, C. C. Chang, et al., "Minimizing turtle-shell matrix based stego image distortion using particle swarm optimization," Int. J. Netw. Secur., vol. 19, no. 1, pp. 154-162, 2017.
26 J. H. Horng, J. Lin, Y. J. Liu, C. C. Chang, "3D Multilayered Turtle Shell Models for Image Steganography," Computer Modeling in Engineering & Sciences, vol. 125, no. 2, pp. 879-906, 2020.   DOI
27 C. C. Chang, Y. C. Chou, T. D. Kieu, "An information hiding scheme using Sudoku," in Proc. of 3rd Int. Conf. Innov. Comput. Inf. Control (ICICIC), Dalian, China, pp. 17-22, Jun. 2008.
28 X. Liao, S. Guo, J. Yin, H. Wang, X. Li, A. K. Sangaiah, "New cubic reference table based image steganography," Multimed Tools Appl, vol. 77, pp. 10033-10050, 2018.   DOI
29 C. C. Chang, C. T. Li, and K. Chen, "Privacy-preserving reversible information hiding based on arithmetic of quadratic residues," IEEE Access, vol. 7, no. 1, pp. 54117-54132, 2019.   DOI
30 J. H. Horng, C. C. Chang, G. L. Li, "Steganography using Quotient Value Differencing and LSB Substitution for AMBTC Compressed Images," IEEE Access, vol. 8, pp. 129347-129358, 2020.   DOI
31 Y. Li, S. Yao, K. Yang, et al., "A High-imperceptibility and histogram-shifting data hiding scheme for JPEG images," IEEE Access, vol. 7, pp. 73573-73582, 2019.   DOI
32 https://www.pexels.com/zh-tw/.