Skip to main content
Log in

Data hiding by an improved exploiting modification direction

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper represents an improved data hiding scheme, CIE, which uses a codebook to improve the Exploiting Modification Direction (EMD) embedding scheme. In our scheme, one secret (2n + x − 1)-ary digit is hidden in a group of pixels in an image as a modified secret digit. Our proposed scheme has an embedding rate \(R=\log_2(2^{n+x}-1)/n\), which is greater than the rate of the EMD scheme, which is R = log2(2n + 1)/n for n ≥ 2 . Embedding rate R is the number of secret bits embedded in each cover pixel. Our experimental results demonstrate that our scheme is able to embed 3 times as many secret bits in an image compared to the original EMD embedding scheme when n = 2 and x = 5. Our scheme has low time complexity and achieves this higher embedding performance while retaining reasonable perceptual quality for the image. An experiment verifies these features of our proposed data hiding scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Bender W, Gruhl D, Mormoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35:313–336

    Article  Google Scholar 

  2. Byung JY, Jung KH, Yoo KY (2008) Improved data hiding method by exploiting modification direction. In: International symposium on ubiquitous multimedia computing, UMC ’08, pp 264–266

  3. Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474

    Article  MATH  Google Scholar 

  4. Chang CC, Chen TS, Chung LZ (2002) A steganographic method based upon JPEG and quantization table modification. Inf Sci-Inf Comput Sci 141(1–2):123–138

    MATH  Google Scholar 

  5. Chang C-C, Kieu TD, Chou Y-C (2008) A high payload steganographic scheme based on (7, 4) Hamming code for digital images. In: International symposium on electronic commerce and security, Guangzhou, China, pp 16–21

  6. Chao RM, Wu HC, Lee C-C, Chu Y-P (2009) A novel image data hiding scheme with diamond encoding. EURASIP J Inf Secur 2009:1–9

    Article  Google Scholar 

  7. Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color, and gray-scale images. IEEE Trans Multimedia 8:22–28

    Article  Google Scholar 

  8. Jung KH, Yoo KY (2009) Improved exploiting modification direction method by modulus operation. Int J Signal Process Image Process Pattern 2(1):79–87

    Google Scholar 

  9. Katzenbeisser S, Petitcolis FAP (2003) Higher-order statistical steganalysis of palette images. In: Proceedings of the SPIE, electronic imaging, security, steganography, watermarking of multimedia contents V, Santa Clara, California, pp 178–190

  10. Ker AD (2005) Steganalysis of LSB matching in grayscale images. IEEE Signal Process Lett 12(6):441–444

    Article  Google Scholar 

  11. Kim C, Shin DK, Shin DI, Zhang X (2011) Improved steganographic embedding exploiting modification direction in multimedia communications. Commun Comput Inf Sci 186:130–138

    Article  Google Scholar 

  12. Lee CF, Chang CC, Wang KH (2008) Improvement of EMD embedding method for large payloads by pixel segmentation strategy. Image Vis Comput 26(12):1670–1676

    Article  Google Scholar 

  13. Li X, Zeng T, Yang B (2008) Detecting LSB matching by applying calibration technique for difference image. In: Proc. of the 10th ACM workshop on multimedia and security. ACM Press, New York, pp 133–138

    Chapter  Google Scholar 

  14. Lin PL, Hsieh C-K, Huang P-W (2005) A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 38(12):2519–2529

    Article  Google Scholar 

  15. Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287

    Article  Google Scholar 

  16. Ni Z, Shi YQ, Ansari N, Su W, Sun Q, Lin X (2008) Robust lossless image data hiding designed for semi-fragile image authentication. IEEE Trans Circuits Syst Video Technol 18(4):497–509

    Article  Google Scholar 

  17. Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Privacy 1(3):32–44

    Article  Google Scholar 

  18. Spaulding J, Noda H, Shirazi MN, Kawaguchi E (2002) BPCS steganography using EZW lossy compressed images. Pattern Recogn Lett 23(13):1579–1587

    Article  MATH  Google Scholar 

  19. University of Southern California (2011) The USC-SIPI image database. Retrieved from http://sipi.usc.edu/database/ on 1 March 2011

  20. Wang H, Wang S (2004) Cyber warfare: steganography vs. steganalysis. Commun ACM 47(10):76–82

    Article  Google Scholar 

  21. Wang ZH, Kieu TD, Chang CC, Li MC (2010) A novel information concealing method based on exploiting modification direction. J Inf Hiding Multimedia Signal Process 1(1):1–9

    Google Scholar 

  22. Westfeld A (1999) Attacks on steganographic systems. In: Proceedings of the 3rd information hiding workshops, Dresden, Germany, 28 September–1 October, pp 61–75

  23. Westfeld A (2004) F5: a steganographic algorithm. In: Proceedings of the 4th international workshop on information hiding 2001. Lecture notes in computer science, vol 2137, Pittsburgh, PA, USA, pp 289–302

  24. Yu YH, Chang CC, Hu YC (2005) Hiding secret data in images via predictive coding. Pattern Recogn 38(5):691–705

    Article  Google Scholar 

  25. Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cheonshik Kim.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kim, C. Data hiding by an improved exploiting modification direction. Multimed Tools Appl 69, 569–584 (2014). https://doi.org/10.1007/s11042-012-1114-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-012-1114-0

Keywords

Navigation