Advertisement

A Novel Data Embedding Method for High Payload Using Improved Pixel Segmentation Strategy

  • Wien Hong
  • Che-Lun Pan
  • Tung-Shou Chen
  • Wan-Yi Ji
  • Yeon-Kang Wang
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 99)

Abstract

In this paper, we propose a novel data embedding method based on the pixel segmentation strategy with minimum distortion. The well-known exploring modification direction (EMD) embedding method achieves a high image quality; however, the corresponding embedding capacity is low. Some recent works extended the embedding capacity of EMD method by using various strategies. Inspired by Lee et al.’s work, the proposed method uses an indicator bit to improve the stego image quality under various payloads. The experimental results revealed that the proposed method not only greatly enhances the embedding capacity of EMD, but also maintains a very acceptable image quality.

Keywords

EMD Data Embedding Embedding Capacity 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Provos, N., Honeyman, P.: Hide and Seek: An Introduction to Steganography. IEEE Security and Privacy 3, 32–44 (2003)Google Scholar
  2. 2.
    Cheddad, A., Condell, J., Curran, K., McKevitt, P.: Digital Image Steganography: Survey and Analysis of Current Methods. Signal Processing 90, 727–752 (2010)zbMATHCrossRefGoogle Scholar
  3. 3.
    Wang, H., Wang, S.: Cyber Warfare: Steganography vs. Steganalysis. Communications of the ACM 47(10), 76–82 (2004)CrossRefGoogle Scholar
  4. 4.
    Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible Data Hiding. IEEE Transactions on Circuits and Systems for Video Technology 16(3), 354–362 (2006)CrossRefGoogle Scholar
  5. 5.
    Hong, W., Chen, T.S.: A Local Variance-Controlled Reversible Data Hiding Method Using Prediction and Histogram-Shifting. The Journal of Systems and Software 83(12), 2653–2663 (2010)CrossRefMathSciNetGoogle Scholar
  6. 6.
    Hong, W., Chen, T.S.: Reversible Data Embedding for High Quality Images Using Interpolation and Reference Pixel Distribution Mechanism. Journal of Visual Communication and Image Representation 22(2), 131–140 (2011)CrossRefGoogle Scholar
  7. 7.
    Thodi, D.M., Rodríguez, J.J.: Expansion Embedding Techniques for Reversible Watermarking. IEEE Transactions on Image Processing 16(3), 721–730 (2007)CrossRefMathSciNetGoogle Scholar
  8. 8.
    Chan, C.K., Cheng, L.M.: Hiding Data in Images by Simple LSB Substitution. Pattern Recognition 37(3), 469–474 (2004)zbMATHCrossRefGoogle Scholar
  9. 9.
    Mielikainen, J.: LSB Matching Revisited. IEEE Signal Processing Letters 13(5), 285–287 (2006)CrossRefGoogle Scholar
  10. 10.
    Zhang, X., Wang, S.: Efficient Steganographic Embedding by Exploiting Modification Direction. IEEE Communications Letters 10(11), 781–783 (2006)CrossRefGoogle Scholar
  11. 11.
    Lin, K.Y., Hong, W., Chen, J., Chen, T.S., Chiang, W.C.: Data Hiding by Exploiting Modification Direction Technique Using Optimal Pixel Grouping. In: The 2010 International Conference on Education Technology and Computer (ICETC 2010), July 2010, vol. 3, pp. 121–123 (2010)Google Scholar
  12. 12.
    Fridrich, J., Goljan, M., Du, R.: Reliable Detection of LSB Steganography in Color and Grayscale Images. In: Proceedings of the International Workshop on Multimedia and Security, pp. 27–30 (2001)Google Scholar
  13. 13.
    Ker, A.D.: Steganalysis of LSB Matching in Grayscale Images. IEEE Signal Processing Letters 12(6), 441–444 (2005)CrossRefGoogle Scholar
  14. 14.
    Lee, C.F., Chang, C.C., Wang, K.H.: An Improvement of EMD Embedding Method for Large Payloads by Pixel Segmentation Strategy. Image and Vision Computing 26(12), 1670–1676 (2008)CrossRefGoogle Scholar
  15. 15.
    Chao, R.M., Wu, H.C., Lee, C.C., Chu, Y.P.: A Novel Image Data Hiding Scheme with Diamond Encoding. EURASIP Journal on Information Security, 2009, Article ID 658047 (2009)Google Scholar
  16. 16.
    USC-SIPI image database, http://sipi.usc.edu/database

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Wien Hong
    • 1
  • Che-Lun Pan
    • 2
  • Tung-Shou Chen
    • 3
  • Wan-Yi Ji
    • 1
  • Yeon-Kang Wang
    • 2
  1. 1.Department of Information ManagementYu Da UniversityTaiwan
  2. 2.Department of Multimedia and Game ScienceYu Da UniversityTaiwan
  3. 3.Deptartment of Computer Science and Information EngineeringNational Taichung Institute of TechnologyTaiwan

Personalised recommendations