Browse > Article
http://dx.doi.org/10.4218/etrij.2018-0089

High capacity multi-bit data hiding based on modified histogram shifting technique  

Sivasubramanian, Nandhini (Department of Electronics and Communication, College of Engineering, Guindy, Anna University)
Konganathan, Gunaseelan (Department of Electronics and Communication, College of Engineering, Guindy, Anna University)
Rao, Yeragudipati Venkata Ramana (Department of Electronics and Communication, College of Engineering, Guindy, Anna University)
Publication Information
ETRI Journal / v.40, no.5, 2018 , pp. 677-686 More about this Journal
Abstract
A novel data hiding technique based on modified histogram shifting that incorporates multi-bit secret data hiding is proposed. The proposed technique divides the image pixel values into embeddable and nonembeddable pixel values. Embeddable pixel values are those that are within a specified limit interval surrounding the peak value of an image. The limit interval is calculated from the number of secret bits to be embedded into each embeddable pixel value. The embedded secret bits can be perfectly extracted from the stego image at the receiver side without any overhead bits. From the simulation, it is found that the proposed technique produces a better quality stego image compared to other data hiding techniques, for the same embedding rate. Since the proposed technique only embeds the secret bits in a limited number of pixel values, the change in the visual quality of the stego image is negligible when compared to other data hiding techniques.
Keywords
data hiding; embedding capacity; image processing; adaptive embedding; steganography;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. K. Chan et al., Hiding data in images by simple LSB substitution, Pattern Recog. 37 (2004), 469-474.   DOI
2 J. Fridrich et al., Reliable detection of LSB steganography in color and grayscale images, Int. Conf. Multimedia Security: New Challenges, Ottawa, Canada, Oct. 2001, pp. 27-30.
3 X. Zhang and S. Wnag, Efficient steganographic embedding by exploiting modification direction, IEEE Commun. Lett. 10 (2006), no. 11, 781-783.   DOI
4 H. Hajizadeh, A. Ayatollahi, and S. Mirzakuchaki, A new high capacity and EMD-based image steganography scheme in spatial domain, Iranian Conf. Electrical Eng., Mashhad, Iran, May 2013, pp. 1-6.
5 T. D. Kieu and C. Chang, A steganographic scheme by fully exploiting modification directions, Expert Syst. Appl. 38 (2011), no. 8, 10648-10657.   DOI
6 J. H. Kim et al., Improved modification direction methods, Comput. Math. Appl. 60 (2010), no. 2, 319-325.   DOI
7 C. F. Lee, Y. R. Wnag, and C. C. Chang, A steganographic method with high embedding capacity by improving exploiting modification direction, Int. Conf. Intell. Inform. Hiding Multimedia Signal Process., Kaohsiung, Taiwan, Nov. 2007, pp. 497-500.
8 J. Wang et al., An improved section-wise exploiting modification direction method, Signal Process. 90 (2010), no. 11, 2954-2964.   DOI
9 C. C. Chang, Y. C. Chou, and T. D. Kieu, An information hiding scheme using Sudoku, Int. Conf. Innovative Comput. Inform. Contr., Dalian, Liaoning, China, June 2008, pp. 17-22.
10 D. C. Wu et al., A steganographic method for images by pixelvalue differencing, Pattern Recog. Lett. 24 (2003), no. 9-10, 1613-1626.   DOI
11 J. C. Joo, H. Y. Lee, and H. K. Lee, Improved steganographic method preserving pixel-value differencing histogram with modulus function, EURASIP J. Adv. Signal Proc. 2010 (2010), 1-13.
12 C. M. Wang et al., A high quality steganographic method with pixel-value differencing and modulus function, J. Sys. Soft. 81 (2008), no. 1, 150-158.   DOI
13 J. Mielikainen, LSB matching revisited, IEEE Signal Process. Lett. 13 (2006), no. 5, 285-287.   DOI
14 B. K. Panigrahi and P. S. Reddy, High quality high capacity robust DWT based steganography, Int. J. Innov. Res. Dev. 3 (2014), no. 5, 49-52.
15 S. Y. Shen and L. H. Huang, A data hiding scheme using pixel value differencing and improving exploiting modification directions, Comput. Security 48 (2015), 131-141.   DOI
16 B. Kaur, A. Kaur, and J. Singh, Steganographic approach for hiding image in DCT domain, Int. J. Adv. Eng. Technol. 1 (2011), 72-78.
17 C. C. Lin and P. F. Shiu, High capacity data hiding scheme for DCT-based images, J. Inform. Hiding Multimedia Signal Proc. 1 (2010), no. 3, 220-240.
18 Y. P. Lee et al., High-payload image hiding with quality recovery using tri-way pixel-value differencing, Inform. Sci. 191 (2012), 214-255.   DOI
19 X. Zhang, S. Wnag, and Z. Zhou, Multibit assignment steganography in palette images, IEEE Sign. Proc. Lett. 15 (2008), 553-556.   DOI
20 H. Z. Wu et al., Multi-layer assignment steganography using graph-theoretic approach, Multimedia Tools Appl. 74 (2015), no. 18, 8171-8196.   DOI
21 S. Voloshynovskiy et al., Attacks on digital watermarks: Classification, estimation based attacks and benchmarks, IEEE Commun. Mag. 39 (2001), no. 8, 118-126.   DOI
22 N. M. Makbol and B. E. Khoo, Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition, AEU - Int. J. Elec. Commun. 67 (2013), no. 2, 102-112.   DOI
23 Z. Wang and A. C. Bovik, A universal image quality index, IEEE Sign. Proc. Lett. 9 (2002), no. 3, 81-84.   DOI
24 C. T. Lu, C. C. Chang, and Y. H. Huang, High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting, Multimedia Tools Appl. 72 (2014), no. 1, 417-435.   DOI
25 C. C. Chang and T. C. Lu, A difference expansion oriented data hiding scheme for restoring the original host image, J. Sys. Soft. 79 (2006), no. 12, 1754-1766.   DOI