A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding

被引:19
作者
Chang, Chin-Chen [1 ,2 ]
Chen, Yi-Hui [2 ]
Lin, Chia-Chen [3 ]
机构
[1] Feng Chia Univ, Dept Comp Sci & Informat Engn, Taichung 40724, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
[3] Providence Univ, Dept Comp Sci & Informat Management, Taichung 43301, Taiwan
关键词
Data embedding; Steganography; Genetic algorithm; Block truncation code; Modification direction; VECTOR QUANTIZATION; SIDE-MATCH; WATERMARKING; SUBSTITUTION;
D O I
10.1007/s00500-008-0332-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, embedding a large amount of secret data into gray-level and color images with low distortion has become an important research issue in steganography. In this paper, we propose a data embedding scheme by using a well-known genetic algorithm, block truncation code and modification direction techniques to embed secret data into compression codes of color images to expand the variety of cover media. In the scheme, the common bitmap generation procedure of GA-AMBTC has been modified to speed up the hiding procedure. Two embedding strategies are proposed to hide secret data into the common bitmap and the quantization values in each block of the cover image. Experimental results confirm that the proposed scheme can provide high data capacity with acceptable image quality of the stego-images. Moreover, the compression ratio of the scheme is exactly the same as that of GA-AMBTC so that attackers cannot detect any trace of hidden data from the size of the modified compressed result.
引用
收藏
页码:321 / 331
页数:11
相关论文
共 35 条
[1]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[2]   Hiding data in images by simple LSB substitution [J].
Chan, CK ;
Cheng, LM .
PATTERN RECOGNITION, 2004, 37 (03) :469-474
[3]   Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy [J].
Chang, CC ;
Hsiao, JY ;
Chan, CS .
PATTERN RECOGNITION, 2003, 36 (07) :1583-1595
[4]   Hybrid image compression methods based on vector quantization and block truncation coding [J].
Chang, CC ;
Hu, YC .
OPTICAL ENGINEERING, 1999, 38 (04) :591-598
[5]   A reversible data hiding scheme based on side match vector quantization [J].
Chang, Chin-Chen ;
Tai, Wei-Liang ;
Lin, Chia-Chen .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2006, 16 (10) :1301-1308
[6]   New image steganographic methods using run-length approach [J].
Chang, Chin-Chen ;
Lin, Chih-Yang ;
Wang, Yu-Zheng .
INFORMATION SCIENCES, 2006, 176 (22) :3393-3408
[7]   Edge enhancement of remote sensing image data in the DCT domain [J].
Chen, B ;
Latifi, S ;
Kanai, J .
IMAGE AND VISION COMPUTING, 1999, 17 (12) :913-921
[8]  
Chen WJ, 1999, IEICE T FUND ELECTR, VE82A, P1456
[9]  
Chuang J. C., 2006, INT J COMPUT APPL, V28, P1735
[10]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687