Browse > Article
http://dx.doi.org/10.9766/KIMST.2013.16.2.185

Steganographic Method Based on Interpolation and Improved JPEG Prediction  

Jeon, Byoung-Hyun (경북대학교)
Lee, Gil-Jae (경북대학교)
Jung, Ki-Hyun (영진전문대학 컴퓨터정보계열)
Yoo, Kee-Young (경북대학교)
Publication Information
Journal of the Korea Institute of Military Science and Technology / v.16, no.2, 2013 , pp. 185-190 More about this Journal
Abstract
The previous steganographic methods by using the interpolation were difficult to estimate the distortion because the size of cover image is extended by interpolation algorithms. In this paper, to solve the problems of previous methods proposed the improved steganographic method based on the pixel replacement algorithms. In our method, we cannot extend a cover image, but also can estimate exactly the distortion of the stego-images. In the experimental results, the estimated distortion and embedding capacity of stego-image are shown on three pixel replacement methods.
Keywords
Interpolation; Steganography; JPEG Prediction; PSNR;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 N. F. Johnson and Jajodia, "Exploding Steganography : Seeing the Unseen", Computer Practices, Vol. 31, No. 2, pp. 26-34, 1998.
2 R. J. Anderson and F. A. P. Petitcols, "On the Limits of Steganography", IEEE Journal on Selected Areas in communications, Vol. 16, No. 4, pp. 747-781, 1998.
3 Y. R. Park and J. H Park, "A Study of Steganography Using Cartoon Image", Journal of Korea Multimedia Society, Vol. 7, No. 7, pp. 913-921, 2004.   과학기술학회마을
4 N. Johnson and S. Jajodia, "Steganalysis of Images Created Using Current Steganography Software", Second Information Hiding Workshop held in Portland, Oregon, USA, LNCS 1525, pp. 273-289, 1998.
5 E. Kawaguchi, H. Noda, and M. Niimi, "Image Data Based Steganograpy", Information Processing Society of Japan(IPSJ MAGAZINE), Vol. 44, No, pp. 223-241, 2003.
6 K. H. Jung and K. Y. Yoo, "Steganographic Method Based on Three Directional Embedding", 7, 3-5, 2010.
7 C. F. Lee and Y. L. Huang, "An Efficient Image Interpolation Increasing Payload in Reversible Data Hiding", Expert Systems with Applications, Vol. 39, pp. 6712-6719, 2012.   DOI   ScienceOn
8 W. Hong and T. S. Chen, "Reversible Data Embedding for High Quality Images using Interpolation and Reference Pixel Distribution Mechanism", J. Vis. Commun. Image R., Vol. 22, pp. 131-140, 2011.   DOI   ScienceOn
9 C. K. Chan and L. M. Cheng, "Hidding Data in Images by Simple LSB Substitution", Journal of Pattern Recognition, Vol. 37, No. 3, pp. 469-474, 2004.   DOI   ScienceOn
10 R. Z. Wang, C. F. Lin, and J. C. Lin, "Image Hiding by Optimal LSB Substitution and Genetic Algorithm", Journal of pattern Recognition, Vol. 34, No. 3, pp. 671-683, 2001.   DOI   ScienceOn
11 H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang, "Image Steganography Scheme Based on Pixel-Value Differencing and LSB Replacement Methods", Visual Image Signal Processing, Vol. 152, No. 5, pp. 611-615, 2005.   DOI   ScienceOn
12 D. C. Wu and W. H. Tsai, "A Steganographic Method for Images by Pixel-Value Differencing", Journal of Pattern Recognition Letters, Vol. 24, No. 9-10, pp. 1613-1626, 2003.   DOI   ScienceOn
13 R. E. Crochiere and L. R. Rabiner, "Multirate Digital Signal Processing", Prentice-Hall, 1983.
14 H. Noda, J. Spaulding, M. N. Shirazi, M. Nimi, and E. Kawaguchi, with JPEG2000 Compreasion, Proceedings of Pacifix Rim Workshop on Digital Steganograpy(STEG 2002), pp. 98-107, 2002.