Browse > Article
http://dx.doi.org/10.9717/kmms.2015.18.4.483

Data Hiding Using Pixel-Value Modular Operation  

Byun, Jin-Yong (School of Computer Science and Engineering, Kyungpook National University)
Kim, Pyung-Han (School of Computer Science and Engineering, Kyungpook National University)
Lee, Joon-Ho (Agency for Defense Development)
Jung, Ki-Hyun (Department of Cyber Security, Kyungil University)
Yoo, Kee-Young (School of Computer Science and Engineering, Kyungpook National University)
Publication Information
Abstract
Data hiding is one of protective methods that can authenticate the completeness of digital information and protect intelligent property rights and copyright through secret communications. In this paper, we propose a data hiding method using pixel-value modular operation that has a high capacity while maintaining a good visual quality. The proposed method can embed secret data on the every pixel of a cover image by modular operation. The experiment results demonstrate that the proposed method has a high capacity and good visual quality where the embedding capacity is 91,138 bytes, the PSNR is 47.94dB, and the Q index is 0.968.
Keywords
Information Hiding; Steganography; Watermarking;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 D.S Kim, K.Y Yoo, “A novel Reversible Data Hiding Scheme based on Modulo Operation and Histogram Shifting,” Journal of Korea Multimedia Society, Vol. 15, No. 5, pp. 639-650, 2012.   DOI   ScienceOn
2 N.F. Johnson and S. Jajodia, "Exploring Steganography: Seeing the Unseen," Computer Practices, Vol. 31, No. 2, pp. 26-34, 1998.
3 K.H. Jung and K.Y. Yoo, “Data Hiding Method using Image Interpolation,” Computer Standards & Interfaces, Vol. 31, No. 2, pp. 465-470, 2009.   DOI
4 F.A.P. Petitcolas, R.J. Anderson, and M.G, Kuhn, “Information Hiding-a Survey,” Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, Vol. 7, No. 87, pp. 1062-1078, 1999.
5 J. Zollner, H. Fedrrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, G. wolf, et al., “Modeling the Security of Steganographic Systems,” Lecture Notes in Computer Science, Vol. 1525, No.1, pp. 344-354, 1998.   DOI
6 W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for Data Hiding,” IBM Systems Journal, Vol. 35, No. 3-4, pp. 313-336, 1996.   DOI
7 R.J. Anderson and F.A.P. Petitcolas, “On The Limits of Steganography,” IEEE Journal of Selected Areas in Communications, Vol. 16, No. 4, pp. 474-481, 1998.   DOI
8 K.H. Jung and K.Y. Yoo, “Improved Exploiting Modification Direction Method by Modulus Operation,” International Journal of Signal Processing, Image Processing and Pattern, Vol. 2, No. 1, pp. 79-88, 2009.
9 A.D. Ker, “Improved Detection of LSB Steganography in Grayscale Images,” Proceeding of the 6th International Conference on Information Hiding, pp. 97-115, 2004.
10 T. Sharp, “An Implementation of Key-based Digital Signal Steganography,” Proceeding of Information Hiding Workshop, pp. 13-26, 2001.
11 C.C. Chang, W.L. Tai, and N.N. Chen, “Improvements of EMD Embedding for Large Payloads,” Proceeding of the Interlligent Information Hiding and Multimedia Signal Processing, Vol. 1, pp. 474-476, 2007.
12 J. Mielikainen, “LSB Matching Revisited,” IEEE Signal Processing Letters, Vol. 13, No. 5, pp. 285-287, 2006.   DOI   ScienceOn
13 J. Wang, Y. Sun, H. Xu, K. Chen, H.J. Kim, S.H. Joo, et al., “An Improved Section-wise Exploiting Modification Direction Method,” Signal Processing, Vol. 90, No. 11, pp. 2954-2964, 2010.   DOI
14 H. J Kwon, H.M Kim, S.J Kim, "A Data Hiding Scheme for Grayscale Images Using a Square Function." Journal of Korea Multimedia Society, Vol. 17, No. 4, pp. 466-477, 2014.   DOI
15 X. Zhang and S. Wang, “Efficient Steganographic Embedding by Exploiting Modification Direction,” IEEE Communication Letters, Vol. 10, No. 11, pp. 781-783, 2006.   DOI
16 C.F. Lee, Y.R. Wang, and C.C. Chang, “A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction,” Proceeding of the Interlligent Information Hiding and Multimedia Signal Processing, Vol. 1, pp. 497-500, 2007.
17 Z. Wang and A.C. Bovik, “A Universal Image Quality Index,” IEEE Signal Processing Letters, Vol. 3, No. 9, pp. 81-84, 2002.   DOI