Browse > Article
http://dx.doi.org/10.9717/kmms.2014.17.4.466

A Data Hiding Scheme for Grayscale Images Using a Square Function  

Kwon, Hyejin (School of Electronics Engineering, Kyungpook National Univ.)
Kim, Haemun (Department of Materials and Energy Engineering, Kyungwoon Univ.)
Kim, Soonja (School of Electronics Engineering, Kyungpook National Univ.)
Publication Information
Abstract
Many image hiding schemes based on least significant bit (LSB) transformation have been proposed. One of the LSB-based image hiding schemes that employs diamond encoding was proposed in 2008. In this scheme, the binary secret data is converted into base n representation, and the converted secret data is concealed in the cover image. Here, we show that this scheme has two vulnerabilities: noticeable spots in the stego-image, i.e., a non-smooth embedding result, and inefficiency caused by rough re-adjustment of falling-off-boundary value and impractical base translation. Moreover, we propose a new scheme that is efficient and produces a smooth and high quality embedding result by restricting n to power of 2 and using a sophisticated re-adjustment procedure. Our experimental results show that our scheme yields high quality stego-images and is secure against RS detection attack.
Keywords
Image hiding; Steganography; hiding capacity; base conversion; modular arithmetic; RS detection attack;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 R. Z. Wang, C. F. Lin, and J. C. Lin, "Image Hiding by Optimal LSB Substitution and Genetic Algorithm," Pattern Recognition, Vol. 34, No. 3, pp. 671-683, 2001.   DOI   ScienceOn
2 Y. H. Yu, C. C. Chang, and I. C. Lin, "A New Steganographic Method for Color and Grayscale Image Hiding," Computer Vision and Image Understanding, Vol. 107, No. 3, pp. 183-194, 2007.   DOI
3 C. C. Change and H. W. Tseng, "A Steganographic Method for Digital Images using Side Match," Pattern Recognition Letters, Vol. 25, No. 12, pp. 1431-1437, 2004.   DOI   ScienceOn
4 C. C. Lin and N. L. Hsueh, "A Lossless Data Hiding Scheme based on Three-pixel Block Differences," Pattern Recognition, Vol. 41, No. 4, pp. 1415-1425, 2008.   DOI   ScienceOn
5 T. Morkel, J. H. P. Eloff, and M. S. Olivier, "An Overview of Image Steganography," Information and Computer Security Architecture (ISSA), pp. 1-11, 2005.
6 C. L. Liu and S. R. Liao, "High-performance JPEG Steganography using Complementary Embedding Strategy," Pattern Recognition, Vol. 41, No. 9, pp. 2945-2955, 2008.   DOI
7 C. C. Chang, C. Y. Lin, and Y. Z. Wang, "New Image Steganographic Methods using Runlength Approach," Information Sciences, Vol. 176, No. 22, pp. 3393-3408, 2006.   DOI
8 D. C. Wu and W. H. Tsai, "A Steganographic Method for Images by Pixel-value Differencing," Pattern Recognition Letters, Vol. 24, No. 9, pp. 1613-1626, 2003.   DOI   ScienceOn
9 J. Fridrich, M. Goljan, and R. Du, "Reliable Detection of LSB Steganography in Color and Grayscale Images," Proceeding of the 2001 Workshop on Multimedia and Security: New Challenges, pp. 27-30, 2001.
10 R. M. Chao, H. C. Wu, C. C. Lee, and Y. P. Chu, "A Novel Image Data Hiding Scheme with Diamond Encoding," European Association for Signal Processing(EURASIP) Journal on Information Security, Vol. 2009, No. 1, pp. 1-9, 2009.
11 C. C. Lin, W. L. Tai, and C. C. Chang, "Multilevel Reversible Data Hiding based on Histogram Modification of Difference Images," Pattern Recognition, Vol. 41, No. 12, 3582-3591, 2008.   DOI   ScienceOn
12 N. Koblitz, A Course in Number Theory and Cryptography, Springer, New York, 1994.
13 X. Zhang and S. Wang, "Efficient Steganographic Embedding by Exploiting Modification Direction," IEEE Communications Letters, Vol. 10, No. 11, 781-783, 2006.   DOI   ScienceOn
14 D. Kim, K. Yoo, " A novel Reversible Data Hiding Scheme based on Modulo Operation and Histogram Shifting," Journal of Korea Multimedia Society, Vol. 15, No. 5, pp. 639-650, 2012.   과학기술학회마을   DOI   ScienceOn