Efficient Information Hiding Based on Theory of Numbers

被引:11
作者
Liu, Yanjun [1 ]
Chang, Chin-Chen [1 ]
Huang, Peng-Cheng [1 ,2 ]
Hsu, Cheng-Yi [1 ]
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 407, Taiwan
[2] Xiamen Univ Technol, Dept Comp Sci, Xiamen 361024, Peoples R China
来源
SYMMETRY-BASEL | 2018年 / 10卷 / 01期
关键词
data hiding; exploiting modification direction (EMD); Chinese remainder theorem (CRT); extraction function; embedding capacity; CHINESE REMAINDER THEOREM; MODIFICATION DIRECTION; SCHEME;
D O I
10.3390/sym10010019
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Data hiding is an efficient technique that conceals secret data into a digital medium. In 2006, Zhang and Wang proposed a data hiding scheme called exploiting modification direction (EMD) which has become a milestone in the field of data hiding. In recent years, many EMD-type data hiding schemes have been developed, but their embedding capacity remains restricted. In this paper, a novel data hiding scheme based on the combination of Chinese remainder theorem (CRT) and a new extraction function is proposed. By the proposed scheme, the cover image is divided into non-overlapping pixel groups for embedding to increase the embedding capacity. Experimental results show that the embedding capacity of the proposed scheme is significantly higher (greater than 2.5 bpp) than previously proposed schemes while ensuring very good visual quality of the stego image. In addition, security analysis is given to show that the proposed scheme can resist visual attack.
引用
收藏
页数:17
相关论文
共 25 条
[1]  
[Anonymous], 2001, Galoi's theory of algebraic equation
[2]   High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation [J].
Cao, Xiaochun ;
Du, Ling ;
Wei, Xingxing ;
Meng, Dan ;
Guo, Xiaojie .
IEEE TRANSACTIONS ON CYBERNETICS, 2016, 46 (05) :1132-1143
[3]  
Chang C.C., P ICICIC 08 3 INT C, P17
[4]   less and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation [J].
Chang, Chin-Chen ;
Ngoc-Tu Huynh ;
Le, Hai-Duong .
SIGNAL PROCESSING, 2014, 99 :159-170
[5]   A Novel Turtle Shell Based Scheme for Data Hiding [J].
Chang, Ching-Chun ;
Liu, Yanjun ;
Thai-Son Nguyen .
2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, :89-93
[6]   Verifiable secret sharing based on the Chinese remainder theorem [J].
Harn, Lein ;
Miao Fuyou ;
Chang, Chin-Chen .
SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (06) :950-957
[7]   A Minimal Euclidean Distance Searching Technique for Sudoku Steganography [J].
Hong, Wien ;
Chen, Tung-Shou ;
Shiu, Chih-Wei .
ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, :515-+
[8]  
Ker AD, 2004, LECT NOTES COMPUT SC, V3200, P97
[9]   Improved modification direction methods [J].
Kim, H. J. ;
Kim, C. ;
Choi, Y. ;
Wang, S. ;
Zhang, X. .
COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 60 (02) :319-325
[10]   Data hiding based on generalised exploiting modification direction method [J].
Kuo, W-C ;
Wang, C-C .
IMAGING SCIENCE JOURNAL, 2013, 61 (06) :484-490