A data hiding scheme using the varieties of pixel-value differencing in multimedia images

被引:48
作者
Yang, Cheng-Hsing [2 ]
Weng, Chi-Yao [3 ]
Tso, Hao-Kuan [4 ]
Wang, Shiuh-Jeng [1 ]
机构
[1] Cent Police Univ, Dept Informat Management, Tao Yuan 333, Taiwan
[2] Natl Pingtung Univ Educ, Dept Comp Sci, Pingtung 900, Taiwan
[3] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[4] Army Acad ROC, Dept Comp Sci & Commun Engn, Tao Yuan 320, Taiwan
关键词
Capacity; Pixel-value differencing; Image quality; STEGANOGRAPHIC METHOD; QUALITY;
D O I
10.1016/j.jss.2010.11.889
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, a capacity promoting technique is proposed for embedding data in an image using pixel-value differencing (PVD). The PVD scheme embeds data by changing the difference value between two adjacent pixels so that more data is embedded into two pixels located in the edge area, than in the smooth area. In order to increase the embedding capacity, a new approach is proposed in this paper by searching edge area more flexibly. Instead of processing a pair of pixels at a time as proposed by Wu and Tsai, two pairs of pixels in a block are processed at the same time. In addition, we proposed a pixel-value shifting scheme to further increase the chances for embedding data. Our scheme exploits the edge areas more efficiently, thus leading to an increase in embedding capacity as shown by experimental results compared to Wu and Tsai's method. Also, the embedding result of our scheme passes the Fridrich et al.'s detection. Besides, according to the distribution of difference values, more practical range partitions are suggested for improving capacity. (C) 2010 Elsevier Inc. All rights reserved.
引用
收藏
页码:669 / 678
页数:10
相关论文
共 21 条
[1]   On the limits of steganography [J].
Anderson, RJ ;
Petitcolas, FAP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :474-481
[2]   Digital steganography: Hiding data within data [J].
Artz, D .
IEEE INTERNET COMPUTING, 2001, 5 (03) :75-80
[3]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[4]   Hiding data in images by simple LSB substitution [J].
Chan, CK ;
Cheng, LM .
PATTERN RECOGNITION, 2004, 37 (03) :469-474
[5]   A steganographic method based upon JPEG and quantization table modification [J].
Chang, CC ;
Chen, TS ;
Chung, LZ .
INFORMATION SCIENCES, 2002, 141 (1-2) :123-138
[6]   A steganographic method for digital images using side match [J].
Chang, CC ;
Tseng, HW .
PATTERN RECOGNITION LETTERS, 2004, 25 (12) :1431-1437
[7]   Dynamical cryptography based on synchronised chaotic systems [J].
Chu, YH ;
Chang, S .
ELECTRONICS LETTERS, 1999, 35 (12) :974-975
[8]  
Fridrich J., 2001, P ACM INT MULT C EXH, P27, DOI [10.1145/1232454.1232466, DOI 10.1145/1232454.1232466]
[9]   Data encryption: A Nonmathematical approach [J].
Highland, HJ .
COMPUTERS & SECURITY, 1997, 16 (05) :369-386
[10]   Steganalysis of embedding in two least-significant bits [J].
Ker, Andrew D. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2007, 2 (01) :46-54