Abstract
Many sophisticated schemes are springing up recently with better characteristics, such as higher capacity and better security. However, if we tune the size of the secret message progressively, most methods do not provide the progressive quality characteristic which means that the relationship between the quality of stego image and the size of the secret message could be represented by a smooth curve without any jump points. This paper designs a novel hiding strategy based on an equivalence relation, which not only provides the progressive quality characteristic but also enhances remarkably the quality of stego image without sacrificing the security and capacity compared with original steganography schemes. In the proposed strategy, all hiding units can be partitioned into equivalence classes according to a constructed equivalence relation based on the capacity of hiding units. Following that, the hiding procedure is performed in predefined order in equivalence classes as the traditional steganography scheme. Because of considering the relation between the length of message and capacity, the hiding method using proposed hiding strategy outperforms the original approaches when embedding same message. Experimental results indicate that the proposed strategy gains up to 4.0 dB over existing hiding schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann, San Francisco (2008)
Wang, S.J.: Steganography Of Capacity Required Using Modulo Operator For Embedding Secret Image. Applied Mathematics and Computation 164(1), 99–116 (2005)
Fridrich, J., Soukal, D.: Matrix Embedding for Large Payloads. IEEE Trans. On IFS 1(1), 390–395 (2006)
Gao, X.B., An, L.L., Li, X.L., Tao, D.C.: Reversiblility Improved Lossless Data Hiding. Signal Processing 89, 2053–2065 (2009)
Mielikainen, J.: LSB Matching Revisited. IEEE Signal Processing 13(5), 285–287 (2006)
Chan, C.K., Cheng, L.M.: Hiding Data in Image by Simple LSB Substitution. Pattern Recognition 37(3), 469–474 (2004)
Chang, C.C., Chan, C.S., Fan, Y.H.: Image Hiding Scheme with Modulus Function and Dynamic Programming Strategy on Partitioned Pixels. Pattern Recognition 39(6), 1155–1167 (2006)
Yu, Y.H., Chang, C.C., Hu, Y.C.: Hiding Secret Data In Images Via Predictive Coding. Pattern Recognition 38(5), 691–705 (2005)
Wu, D.C., Tsai, W.H.: A Steganographic Method For Images By Pixel-Value Differencing. Pattern Recognition 24(9), 1613–1626 (2003)
Zhang, X.P., Wang, S.Z.: Vulnerability Of Pixel-Value Differencing Steganography To Histogram Analysis And Modification For Enhanced Security. Pattern Recognition 25(3), 331–339 (2004)
Chang, C.C., Tseng, H.W.: A Steganographic Method For Digital Images Using Side Match. Pattern Recognition 25(12), 1431–1437 (2004)
Lee, C.C., Wu, H.C., Tsai, C.S., Chu, Y.P.: Adaptive Lossless Steganographic Scheme with Centralized Difference Expansion. Pattern Recognition 41(6), 2097–2106 (2008)
Lin, C.C., Hsueh, N.L.: A Lossless Data Hiding Scheme Based on Three-pixel Block Differences. Pattern Recognition 41(4), 1415–1425 (2008)
Jung, K.H., Yoo, K.Y.: Data Hiding Method Using Image Interpolation. Computer Standards & Interfaces 31(2), 465–470 (2009)
Liu, S.H., Yao, H.X., Gao, W., Yang, D.G.: Minimizing the Distortion Spatial Data Hiding Based on Equivalence Class. In: Huang, D.-S., Heutte, L., Loog, M. (eds.) ICIC 2007, Part I. LNCS, vol. 4681, pp. 667–678. Springer, Heidelberg (2007)
Westfeld, A.: High Capacity Despite Better Steganalysis (F5-a Steganographic Algorithm). In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001)
Provos, N.: Defending Against Statistical Steganalysis. In: 10th USENIX Security Symposium, Washington, DC, pp. 323–336 (2001)
Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: From error visibility to structural similarity. IEEE Transactions on Image Processing 13(4), 600–612 (2004)
Liu, C.L., Liao, S.R.: High-performance JPEG Steganography using complementary embedding strategy. Pattern Recognition 41(9), 2945–2955 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, S., Yao, H., Zhang, S., Gao, W. (2011). A Progressive Quality Hiding Strategy Based on Equivalence Partitions of Hiding Units. In: Shi, Y.Q., et al. Transactions on Data Hiding and Multimedia Security VI. Lecture Notes in Computer Science, vol 6730. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24556-5_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-24556-5_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24555-8
Online ISBN: 978-3-642-24556-5
eBook Packages: Computer ScienceComputer Science (R0)