Research on Embedding Capacity and Efficiency of Information Hiding Based on Digital Images

Abstract

Generally speaking, being an efficient information hiding scheme, what we want to achieve is high embedding capacity of the cover image and high visual quality of the stego image, high visual quality is also called embedding efficiency. This paper mainly studies on the information hiding technology based on gray-scale digital images and especially considers the improvement of embedding capacity and embedding efficiency. For the purpose of that, two algorithms for information hiding were proposed, one is called high capacity of information hiding algorithm (HCIH for short), which achieves high embedding rate, and the other is called high quality of information hiding algorithm (HQIH for short), which realizes high embedding efficiency. The simulation experiments show that our proposed algorithms achieve better performance.

Share and Cite:

Y. Zhang, J. Jiang, Y. Zha, H. Zhang and S. Zhao, "Research on Embedding Capacity and Efficiency of Information Hiding Based on Digital Images," International Journal of Intelligence Science, Vol. 3 No. 2, 2013, pp. 77-85. doi: 10.4236/ijis.2013.32009.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] S. Dumitrescu, X. Wu and Z. Wang, “Detection of LSB Steganography via Sample Pair Analysis,” IEEE Transactions on Signal Process, Vol. 51, 2003, pp. 355-372.
[2] A. Ker, “Improved Detection of LSB Steganography in Grayscale Images,” In: J. Fridrich, Ed., Proceedings of the Sixth International Workshop on Information Hiding, Vol. 3200, Springer, Toronto, 2004, pp. 97-115. doi:10.1007/978-3-540-30114-1_8
[3] C. K. Chan and L. M. Cheng, “Hiding Data in Images by Simple LSB Substitution,” Pattern Recognition, Vol. 37, No. 3, 2004, pp. 469-474. doi:10.1016/j.patcog.2003.08.007
[4] J. Mielikainen, “LSB Matching Revisited,” IEEE Signal Processing Letters, Vol. 13, No. 5, 2006, pp. 285-287. doi:10.1109/LSP.2006.870357
[5] A. Westfeld, “F5-a Steganographic Algorithm,” Proceedings of the 4th International Workshop on Information Hiding, Pittsburgh, 25-27 April 2001, pp. 289-302.
[6] C.-C. Chang, T. D. Kieu and Y.-C. Chou, “A High Payload Steganographic Scheme Based on (7,4) Hamming Code for Digital Images,” International Symposium on Electronic Commerce and Security, Guangzhou, 3-5 Au- gust 2008, pp. 16-21.
[7] Z. X. Yin, C. C. Chang and Y. P. Zhang, “A High Embedding Efficiency Steganography Scheme for Wet Paper Codes,” Proceedings of the 5th International Conference on Information Assurance and Security (IAS 2009), Xi’an, 18-20 August 2009, pp. 611-614. doi:10.1109/IAS.2009.93
[8] Z. X. Yin, C. C. Chang and Y. P. Zhang, “An Information Hiding Scheme Based on (7,4) Hamming Code Oriented Wet Paper Codes,” International Journal of Innovative Computing, Information and Control, Vol. 6, No. 7, 2010, pp. 3121-3130.
[9] Y. P. Zhang, J. Jiang, Z. X. Yin and C. C. Xu, “A Method Embedding Email Address into Digital Images,” Proceedings of the 5th International Conference on Computer Science & Education (ICCSE 2010), Heifei, 24-27 August 2010, pp. 346-350.
[10] J. Fridrich, M. Goljan, P. Lisonek and D. Soukal, “Writing on Wet Paper,” IEEE Transactions on Signal Processing, Vol. 53, No. 10, Part II, 2005, pp. 3923-3935.
[11] C. C. Thien and J. C. Lin, “A Simple and High-Hiding Capacity Method for Hiding Digit-by-Digit Data in Images Based on Modulus Function,” Pattern Recognition, Vol. 36, No. 12, 2003, pp. 2875-2881. doi:10.1016/S0031-3203(03)00221-8
[12] Y. C. Chou, C. C. Chang and K. M. Li, “A Large Payload Data Embedding Technique for Color Images,” Fundamenta Informaticae, Vol. 88, No. 1-2, 2008, pp. 47-61.
[13] T. D. Kieu and C. C. Chang, “A High Stego-Image Quality Steganographic Scheme with Reversibility and High Payload Using Multiple Embedding Strategy,” The Journal of Systems and Software, Vol. 82, No. 10, 2009, pp. 1743-1752. doi:10.1016/j.jss.2009.05.028
[14] W. Zhang, S. Wang and X. Zhang, “Improving Embedding Efficiency of Covering Codes for Applications in Steganography,” IEEE Communications Letters, Vol. 11, No. 8, 2007, pp. 680-682.
[15] X. Zhang and S. Wang, “Efficient Steganographic Embedding by Exploiting Modification Direction,” IEEE Communications Letters, Vol. 10, No. 113, 2006, 781-783. doi:10.1109/LCOMM.2006.060863
[16] C. C. Lin, W. L. Tai and C. C. Chang, “Multilevel Reversible Data Hiding Based on Histogram Modification of Difference Images,” Pattern Recognition, Vol. 41, No. 12, 2008, pp. 3582-3591. doi:10.1016/j.patcog.2008.05.015
[17] Y. A. Ho, Y. K. Chan, H. C. Wu and Y. P. Chu, “High Capacity Reversible Data Hiding in Binary Images Using Pattern Substitution,” Computer Standards & Interfaces, Vol. 31, No. 4, 2009, pp. 787-794. doi:10.1016/j.csi.2008.09.014
[18] R. Z. Wang and Y. D. Tsai, “An Image-Hiding Method with High Hiding Capacity Based on Best-Block Matching and k-Means Clustering,” Pattern Recognition, Vol. 40, No. 2, 2007, pp. 398-409. doi:10.1016/j.patcog.2006.07.015
[19] A. Tiwari and M. Sharma, “Comparative Evaluation of Semifragile Watermarking Algorithms for Image Authentication,” Journal of Information Security, Vol. 3, No. 3, 2012, pp. 189-195. doi:10.4236/jis.2012.33023
[20] V. H. Gaidhane, V. Singh, Y. V. Hote and M. Kumar, “New Approaches for Image Compression Using Neural Network,” Journal of Intelligent Learning Systems and Applications, Vol. 3, No. 4, 2011, pp. 220-229. doi:10.4236/jilsa.2011.34025
[21] R. Crandall, “Some Notes on Steganography,” Posted on Steganography Mailing List, 1998. http://os.inf.tu-dresden.de/west-feld/crandall.pdf
[22] J. J. Harmsen and W. A. Pearlman, “Steganalysis of Additive Noise Modelable Information Hiding,” In: E. J. Delp and P. W. Wong, Eds., Proceedings of SPIE Security Watermarking Multimedia Contents V, Vol. 5020, San Antonio, 13 June 2003, pp. 131-142. doi:10.1117/12.476813
[23] A. D. Ker, “Quantitative Evaluation of Pairs and RS Steganalysis,” In: E. J. Delp III and Pi. W. Wong, Eds., Proceedings of SPIE—Security, Steganography, and Watermarking of Multimedia Contents VI, SPIE, Vol. 5306, San Jose, 18-22 January 2004, pp. 83-97.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.