DOI QR코드

DOI QR Code

An Image Hiding Scheme by Linking Pixels in the Circular Way

  • Chan, Chi-Shiang (Department of Applied Informatics and Multimedia, Asia University) ;
  • Tsai, Yuan-Yu (Department of Applied Informatics and Multimedia, Asia University) ;
  • Liu, Chao-Liang (Department of Applied Informatics and Multimedia, Asia University)
  • Received : 2011.04.02
  • Accepted : 2012.06.13
  • Published : 2012.06.30

Abstract

The proposed method in this paper is derived from Mielikainen's hiding method. However, there exist some significant differences between two methods. In Mielikainen's method, pixels are partitioned into pairs and a LSB matching function is applied to two pixels for hiding. On the contrary, the proposed method partitions pixels into groups with three pixels in each group. The bits of pixels in each group are linked by using an exclusive OR (XOR) operator in a circular way. If the number of different values between the calculated XOR values and the secret bits is smaller than or equal to 2 in a group, the proposed method can guarantee that at most one pixel is needed to be modified by adding/subtracting its value to/from one, and three secret bits can be embedded to three pixels. Through theoretical analysis, the amount of the embedded secret data in the proposed method is larger than those in other methods under the same amount of pixel modifications. Taking real images in our experiments, the quality of stego-images in the proposed method is higher than those in other methods.

Keywords

References

  1. C. S. Chan, "On using lsb matching function for data hiding in pixels," Fundamenta Informaticae, vol.96, pp.49-59, 2009.
  2. C. C. Chang, J. Y. Hsiao, and C. S. Chan, " finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy," Pattern Recognition, vol.36, no.7, pp.1583-1595, Jul.2003. https://doi.org/10.1016/S0031-3203(02)00289-3
  3. J. J. Harmsen, and W. A. Pearlman, "steganalysis of additive noise modelable information hiding," in Proc. of SPIE Security Watermarking Multimedia Contents V, vol.5020, pp.131-142, 2003.
  4. A. Ker, "Improved detection of LSB steganography in grayscale image," in Proc. of Information Hiding Workshop, vol.3200, pp.97-115, 2004.
  5. C. C. Lin, "An information hiding scheme with minimal image distortion," Computer Standards & Interfaces, vol.33, pp.477-484, 2011. https://doi.org/10.1016/j.csi.2011.02.003
  6. J. Mielikainen, "LSB Matching Revisited," IEEE Signal Processing Letters, vol.13, no.5, pp.285-287, 2006. https://doi.org/10.1109/LSP.2006.870357
  7. C. C. Thien, and J. C. Lin, "A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function," Pattern Recognition, vol.36, pp.2875-2881, 2003. https://doi.org/10.1016/S0031-3203(03)00221-8
  8. A. Westfeld, "F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis," ILNCS 2137, Springer-Verlag, vol. 2137, no.11, pp. 289-302, 2001.
  9. R. Z. Wang, C. F. Lin, and J. C. Lin, "Image hiding by optimal LSB substitution and genetic algorithm," Pattern Recognition, vol.34, no.3, pp.671-683, 2001. https://doi.org/10.1016/S0031-3203(00)00015-7
  10. X. Zhang, and S. Wang, "Efficient steganographic embedding by exploiting modification direction," IEEE Communications Letters, vol.10, no.11, pp.781-783, 2006. https://doi.org/10.1109/LCOMM.2006.060863
  11. W. Zhang, S. Wang, and X. Zhang, "Improving embedding efficiency of covering codes for applications in steganography," IEEE Communications Letters, vol.11, no.8, pp.680-682, 2007. https://doi.org/10.1109/LCOMM.2007.070438