Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Capacity-Raising Steganography Using Multi-Pixel Differencing and Pixel-Value Shifting Operations

Published: 01 April 2010 Publication History

Abstract

In order to provide large embedding capacity and to minimize distortion for the stego-image, a steganographic method using multi-pixel differencing is presented in this paper. It takes into consideration four pixels of a block, and the differences between the lowest gray-value pixel and its surrounding pixels are used to determine the degree of smoothness and sharpness for embedding the secret data. If the difference values are large in a block, and the block is located in the sharp area then more data can be embedded. On the other hand, if the block is located in the smooth area less data can be embedded. The multi-pixel differencing method is employed in our scheme. We also propose the pixel-value shifting method to increase the image quality. The experimental results show that our scheme has a large embedding capacity without creating a noticeable distortion.

References

[1]
Anderson, R. R., Peticolas, F. A. P.: On the Limits of Steganography, EEE J. Selected Areas Commun., 16(4), 1998, 474-481.
[2]
Artz, D.: Digital Steganographic: Hiding Data within Data, IEEE Internet Comput., 5, 2001, 75-80.
[3]
Bender, D. W., Gruhl, N. M., Lu, A.: Techniques for Data Hiding, IBM System J., 35, 1996, 313-316.
[4]
Chan, C. K., Chen, L. M.: Hiding Data in Images by Simple LSB Substitution, Pattern Recognition, 37, 2004, 469-474.
[5]
Chang, C. C., Tseng, H. W.: A Steganographic Method for Digital Images Using Side Match, Pattern Recognition Letters, 25, 2004, 1431-1437.
[6]
Chu, Y. H., Chang, S.: Dynamical Cryptography Based on Synchronized Chaotic Systems, IEE Electronics Letters, 35(2), 1999, 974-975.
[7]
Cox, I. J., Miller, M. L., Bloom, J. A.: Watermarking Applications and Their Properties, n: Proc. Internet. Conf. on Information Technology: Coding and Computing, 2000, 6-10.
[8]
Cox, I. J., Miller, M. L., Bloom, J. A.: Digital Watermarking: Principles and Pactice, Morgan Kaufmann Publisher, San Francisco, 2001.
[9]
Fridrich, J., Goljan, M., Du, R.: Reliable Detection of LSB Stegnography in Grayscale and Color Images, In: proc. ACM Workshop on Multimedia and Security, 2001, 27-30.
[10]
H., Y. C., Wang, S. J.: Weighted Bipartite Graph for Locating Optimal LSB Substitution for Secret Embedding, Journal of Discrete Mathematical Sciences and Cryptography, 9(1), 2006, 153-164.
[11]
Highland, H. J.: Data Encryption: a non-Mathematical Approach, Comput. Security, 16, 1997, 369-386.
[12]
Lee, Y. K., Chen, C. H.: Multipurpose watermarking for image authentication and protection, IEE Proceedings on Vision Image, and Signal Processing, 147(3), 2000, 288-294.
[13]
Liu, J. C., Shih, M. H.: Generalizations of Pixel-Value Differencing Steganography for Data Hiding in Images, Fundamenta Informaticae, 83(3), 2008, 319-335.
[14]
Wang, C. M., Wu, N. I., Tsai, C. S., Hwang, M. S.: A high quality steganographic method with pixel-value differencing and modulus function, Journal of Systems and Software, 81(1), 2008, 150-158.
[15]
Wang, R. Z., Lin, C. F., Lin, J. C.: Image Hiding by Optimal LSB Substitution and Genetic Algorithm, Pattern Recognition, 34, 2000, 671-683.
[16]
Wu, D. C., Tsai, W. H.: A Steganographic Method for Images by Pixel-Value Differencing, Pattern Recognition Letters, 24, 2004, 1613-1623.
[17]
Wu, N. I., Tsai, C. S., Hwang, M. S.: Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods, IEE Proc.-Vis. Images Signal Process., 152(5), 2005, 611-615.
[18]
Yang, C. H., Wang, S. J., Weng, C. Y.: Analyses of Pixel-Value-Differencing Schemes with LSB Replacement in Stegonagraphy, In: The Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2007, 445-448.
[19]
Yu, Y. H., Chang, C. C., Hu, Y. C.: Hiding Secret Data in Images via Predictive Coding, Pattern Recognition, 38, 2005, 691-705.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Fundamenta Informaticae
Fundamenta Informaticae  Volume 98, Issue 2-3
April 2010
190 pages

Publisher

IOS Press

Netherlands

Publication History

Published: 01 April 2010

Author Tags

  1. PSNR
  2. Steganography
  3. capacity
  4. embedding systems
  5. information hiding
  6. multimedia security

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Nov 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media