DOI QR코드

DOI QR Code

Secure Modulus Data Hiding Scheme

  • Kuo, Wen-Chung (Department of Computer Science and Information Engineering, National Yunlin University of Science & Technology)
  • Received : 2012.10.11
  • Accepted : 2013.02.23
  • Published : 2013.03.31

Abstract

In 2006, Zhang and Wang proposed a data hiding scheme based on Exploiting Modification Direction (EMD) to increase data hiding capacity. The major benefit of EMD is providing embedding capacity greater than 1 bit per pixel. Since then, many EMD-type data hiding schemes have been proposed. However, a serious disadvantage common to these approaches is that the embedded data is compromised when the embedding function is disclosed. Our proposed secure data hiding scheme remedies this disclosure shortcoming by employing an additional modulus function. The provided security analysis of our scheme demonstrates that attackers cannot get the secret information from the stegoimage even if the embedding function is made public. Furthermore, our proposed scheme also gives a simple solution to the overflow/underflow problem and maintains high embedding capacity and good stegoimage quality.

Keywords

References

  1. C. S. Chan, Y. Y. Tsai, and C. L. Liu, "An image hiding scheme by linking pixels in the circular Wa ," KSII Trans. On Internet and Information Systems, Vol.6, No.6, pp.1718-1734, 2012.
  2. J. Fridrich, M. Goljan, and R. Du, "Detecting steganography in color and gray scale images, " IEEE Multimedia, Vol.8, No.4, pp.22-28, 2001.
  3. C. S. Kim, D. K. Shin, D. G. Shin and X. P. Zhang, "Im roved steganographic embedding exploiting modification direction in multimedia communications," Springer, CCIS 186, pp.130-138, 2011.
  4. W. C. Kuo, and C. C. Wang, "Data hiding based on generalized exploiting modification direction method," Imaging Science Journal, http://dx.doi.org/ 10.1179 /1743131X12Y.0000000011, 2012.
  5. W. C. Kuo, L. C. Wuu, C. N. Shyi, and S. H. Kuo, "A data hiding scheme with high embedding capacity based on general improving exploiting modification direction method," in Proc. of the Ninth International Conference on Hybrid Intelligent Systems(HIS2009), pp.69-73, 2009.
  6. W. C. Kuo, L. C. Wuu, and S. H. Kuo, "The high embedding steganographic method based on general multi-EMD," in Proc. of the 2012 International Conference on Information Security and Intelligent Control (ISIC' , pp.286-289, 2012.
  7. X. Liao, Q. Y. Wen, J. Zhang, "A steganographic method for digita images with four-pixe differencing and modified LSB substitution," Journal of Visual Communication and Image Representation, Vol.22, No.1, pp.1-8, 2011. https://doi.org/10.1016/j.jvcir.2010.08.007
  8. C. F. Lee, Y. R. Wang and C. C. Chang, "A steganographic method with high embedding capacity by improving exploiting modification direction," in Proc. of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIHMSP07), Vol.1 , pp.497-500 , 2007.
  9. C. F. Lee, C. C. Chang and K. H. Wang, "An improvement of EMD embedding method for large payloads by pixel segmentation strateg ," Image and Vision Computing, Vol 26, No.12, pp.1670-1676, 2008. https://doi.org/10.1016/j.imavis.2008.05.005
  10. K. Y. Lin, W. Hong, J. Chen, T. S. Chen and W. C. Chiang, "Data hiding by exploiting modification direction technique using optimal pixel grouping," in Proc. of the 2nd International Conference on Education Technology and Computer (ICETC2010), Vol.3, pp.121-123, 2010.
  11. J. Mielikainen, "LSB matching revisited," IEEE Signal Processing Letters, Vol.13, No.5, pp.285-287, 2006. https://doi.org/10.1109/LSP.2006.870357
  12. F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, "Information hiding-a survey," Proceedings of the IEEE, Vol.87, No.7, pp.1062-1078, 1999. https://doi.org/10.1109/5.771065
  13. R. L. Rivest, A. Shamir and L. Adleman, "A method or obtaining digita signatures and public-key cryptosystems," Communications of the ACM, Vol.21, No.2, pp.120-126, 1978. https://doi.org/10.1145/359340.359342
  14. T. Sharp, "An implementation of key-based digita signa steganography," in Proc. of the 4th international workshop on information hiding. Springer, LNCS 2137, pp.13-26, 2001.
  15. D. Stinson, Cryptography: Theory and Practice, CRC Press, 1995.
  16. L. F. Turner, "Digita data security system," Patent IPN, WO 89/08915, 1989.
  17. X. T. Wang, C. C. Chang, C. C. Lin, M. C. Li, "A novel multi-group exploiting modification direction method based on switch map," Signal Processing, Vol.92, No.6, pp.1525-1535, 2012. https://doi.org/10.1016/j.sigpro.2011.12.013
  18. F. M. J. Willems and M. Dijk, "Capacity and codes for embedding information in gray-scale signals," IEEE Trans. On Information Theory, Vol.51, No.3, pp.1209-1214, 2005. https://doi.org/10.1109/TIT.2004.842707
  19. X. Zhang and S. Wang, "Efficient steganogrraphic embedding by exploiting modification," IEEE Communications Letters, Vol.10, No.11, pp.781-783, 2006. https://doi.org/10.1109/LCOMM.2006.060863