Advertisement

High Payload Data Hiding Based on Just Noticeable Distortion Profile and LSB Substitution

  • Hui-Shih LengEmail author
  • Hsien-Wen Tseng
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 63)

Abstract

The growth of the Internet with the rapid advance of technology raises consumers’ concerns regarding threats to their personal privacy. Data hiding is a technique that conceals data into a carrier for conveying the secret message confidentially and do not show any visible marks to draw the attention of the intruders. In this study, the grayscale image is divided into non-overlapping blocks. In each block, calculates the sum of the just noticeable distortion profile of each pixel. Based on this value, the block is classified into four levels, such as, lower, lower-middle, high-middle, and higher. According to these levels, 2, 3, 4, and 5 bits can be embedded by using the least significant bit (LSB) substitution method. The experimental results show that the proposed scheme achieves high payload with acceptable image quality according to the human visual system (HVS).

Keywords

data hiding just distortion profile least significant bit substitution 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    C. K. Chan, L. M. Cheng: Hiding data in images by simple LSB substitution. Pattern recognition, 37(3), 469{474 (2004)Google Scholar
  2. 2.
    Fridrich, Jessica, Miroslav Goljan, Rui Du: Reliable detection of LSB steganography in color and grayscale images. Proceedings of the 2001 workshop on Multimedia and security: new challenges, ACM, (2001)Google Scholar
  3. 3.
    Swain, Gandharba: Digital image steganography using nine-pixel differencing and modified LSB substitution. Indian Journal of Science and Technology, 7(9), 1444–1450 (2014)Google Scholar
  4. 4.
    C. H. Chou, Y. C. Li: A perceptually tuned subband image coder based on the measure of just-noticeable-distortion profile. IEEE Transactions on Circuits and Systems for Video Technology, 5(6), 467–476 (1995)Google Scholar
  5. 5.
    Jayant, Nikil, James Johnston, Robert Safranek: Signal compression based on models of human perception. Proceedings of the IEEE, 81(10), 1385–1422 (1993)Google Scholar
  6. 6.
    Kutter, Martin, Stefan Winkler: A vision-based masking model for spread-spectrum image watermarking. IEEE Transactions on Image Processing, 11(1), 16–25 (2002)Google Scholar
  7. 7.
    Z. Lu, W. Lin, X. Yang, E. Ong, S. Yao: Modeling visual attention’s modulatory aftereffects on visual sensitivity and quality evaluation. IEEE Transactions on Image Processing, 14(11), 1928-1942 (2005)Google Scholar
  8. 8.
    Z. H. Wei, P. Qin, Y. Q. Fu: Perceptual digital watermark of images using wavelet transform. IEEE Transactions on Consumer Electronic, 44(4), 1267-1272 (1998)Google Scholar
  9. 9.
    Peter H. W. Wong, Oscar C. Au: A capacity estimation technique for JPEG-to-JPEG image watermarking. IEEE Transactions on Circuits and Systems for Video Technology, 13(8), 746–752 (2003)Google Scholar
  10. 10.
    Yang, X. K., Ling,W. S., Lu, Z. K., Ong, E. P., Yao, S. S.: Just noticeable distortion model and its applications in video coding. Signal Processing: Image Communication, 20(7), 662–680 (2005)Google Scholar
  11. 11.
    Gao, Y., Xiu, X., Liang, J., Lin, W.: Perceptual multiview video coding using synthesized just noticeable distortion maps. IEEE International Symposium of Circuits and Systems, 2153–2156 (2011)Google Scholar
  12. 12.
    Chou, C. H., Li, Y. C.: A perceptually tuned subband image coder based on the measure of just-noticeable-distortion profile. IEEE Transactions on Circuits and Systems for Video Technology, 5(6), 467–476 (1995)Google Scholar
  13. 13.
    Yang, X., Lin, W., Lu, Z., Ong, E. P., Yao, S.: Perceptually adaptive hybrid video encoding based on just-noticeable-distortion profile. Visual Communications and Image Processing, 1448–1459 (2003)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Dept. of MathematicsNational Changhua Univ. of EducationChanghuaTaiwan
  2. 2.Dept. of Information ManagementChaoyang Univ. of TechnologyTaichung CityTaiwan

Personalised recommendations