Steganography Based on Grayscale Images Using (5,3) Hamming Code

被引:5
作者
Kim, Cheonshik [1 ]
Yang, Ching-Nung [2 ]
机构
[1] Anyang Univ, Dept Digital Media Engn, Anyang Si, Gyeonggi Do, South Korea
[2] Natl Dong Hwa Univ, Dept Comp Sci & Informat Engn, Hualien 97401, Taiwan
来源
DIGITAL-FORENSICS AND WATERMARKING, IWDW 2014 | 2015年 / 9023卷
关键词
Steganography; Data hiding; LSB; Hamming code; MODIFICATION DIRECTION;
D O I
10.1007/978-3-319-19321-2_45
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Steganography is a technique to hide secret data in cover images securely. This technique is used for secret communication. However, steganography is not as strong as watermark against various attacks. "Hamming+1" scheme is a well known scheme in the steganography. In this paper, we propose new data hiding scheme that showed better performance compared to "Hamming+1". The proposed scheme conceals 3 bits per 5 pixels of an image. The experimental result showed that the proposed scheme achieves an 0.599 bpp embedding payload and a higher visual quality of stego images compared to the previous schemes.
引用
收藏
页码:588 / 598
页数:11
相关论文
共 18 条
[1]  
[Anonymous], 2001, Information hiding, DOI 10.1007/3-540-
[2]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[3]  
Chang C.-C., 2002, INT S EL COMM SEC GU, P16
[4]   A steganographic method based upon JPEG and quantization table modification [J].
Chang, CC ;
Chen, TS ;
Chung, LZ .
INFORMATION SCIENCES, 2002, 141 (1-2) :123-138
[5]  
Chi-Shiang Chan, 2010, 2010 9th IEEE International Conference on Cognitive Informatics (ICCI), P835, DOI 10.1109/COGINF.2010.5599798
[6]  
Crandall R., 1998, SOME NOTES STEGANOGR
[7]   Higher-order statistical steganalysis of palette images [J].
Fridrich, J ;
Miroslav, G ;
Soukal, D .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V, 2003, 5020 :178-190
[8]   ERROR DETECTING AND ERROR CORRECTING CODES [J].
HAMMING, RW .
BELL SYSTEM TECHNICAL JOURNAL, 1950, 29 (02) :147-160
[9]   Data hiding by an improved exploiting modification direction [J].
Kim, Cheonshik .
MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 69 (03) :569-584
[10]  
Kim C, 2011, COMM COM INF SC, V186, P130