[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

High Capacity Data Hiding for Grayscale Images

Published: 01 December 2008 Publication History

Abstract

High embedding capacity and low image distortion factors are main concerns of information hiding researchers. No scheme can achieve these two factors simultaneously. The purpose of achieving either high embedding capacity or low image distortion varies from application to application. This paper presents a high embedding capacity information hiding method for grayscale images. The proposed method converts binary secret data into secret digits in the base-5 numeral system first. Next, one secret digit in the base-5 numeral system is embedded into one cover pixel. The experimental results show that the proposed method can be used to embed two secret bits into one cover pixel with the imperceptible image distortion. Comparing with some other works, we found that our method indeed outperforms all others in terms of embedding capacity.

References

[1]
Chan, C.-K., Cheng, L.-M.: Hiding Data in Images by Simple LSB Substitution, Pattern Recognition, 37(3), March 2004, 469-474.
[2]
Fridrich, J., Goljan, M.: Practical Steganalysis of Digital Images-State of the Art, Proceedings of SPIE Security Watermarking Multimedia Contents IV, 4675, (Edward J. Delp; Ping W. Wong; Eds.), SPIE, April 2002.
[3]
Fridrich, J., Goljan, M., Hogea, D., Soukal, D.: Quantitative Steganalysis of Digital Images: Estimating the Secret Message Length, Multimedia Systems, 9(3), September 2003, 288-302.
[4]
Harmsen, J. J., Pearlman, W. A.: Steganalysis of Additive Noise Modelable Information Hiding, Proceedings of SPIE Security Watermarking Multimedia Contents V, (E. J. Delp and P. W. Wong Eds.), Vol. 5020, San Antonio, Texas, USA, April 2003.
[5]
Ker, A. D.: Improved Detection of LSB Steganography in Grayscale Images, Proceedings of 6th International Workshop on Information Hiding, 3200, (Fridrich, J. Ed.), Springer, Toronto, Canada, May 2004.
[6]
Ker, A. D.: Quantitative Evaluation of Pairs and RS Steganalysis, Proceedings of SPIE - Security, Steganography, and Watermarking of Multimedia Contents VI, (Edward J. Delp III, Ping W. Wong, Eds.), SPIE, Vol. 5306, California, USA, January 2004.
[7]
Ker, A. D.: Steganalysis of LSB Matching in Grayscale Images, IEEE Signal Processing Letters, 12(6), June 2005, 441-444.
[8]
Mielikainen, J.: LSB Matching Revisited, IEEE Signal Processing Letters, 13(5), May 2006, 285-287.
[9]
Wang, H., Wang, S.: Cyber warfare: steganography vs. steganalysis, Communications of the ACM, 47(10), October 2004, 76-82.
[10]
Zhang, X., Wang, S.: Efficient Steganographic Embedding by Exploiting Modification Direction, IEEE Communications Letters, 10(11), November 2006, 1-3.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Fundamenta Informaticae
Fundamenta Informaticae  Volume 86, Issue 4
December 2008
130 pages

Publisher

IOS Press

Netherlands

Publication History

Published: 01 December 2008

Author Tags

  1. Covert communication
  2. data hiding
  3. steganography

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media