Steganography of capacity required using modulo operator for embedding secret image

被引:67
作者
Wang, SJ [1 ]
机构
[1] Cent Police Univ, Dept Informat Management, Taoyuan 333, Taiwan
关键词
modulus; information hiding; embedding procedure; secret;
D O I
10.1016/j.amc.2004.04.059
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In this paper, a novel mechanism using modulus operations to incorporate secret data (with image form) into a host-image is proposed. The used modulus is a threshold value that indicates how many bits of the secret image are being incorporated into the host-image. In our scheme, there are two kinds of secret images processed. The capacities of these two types are half the size and a quarter the size of the chosen host-image, respectively. As can be seen in the result of our experiment, not only can the secret images be totally embedded, but the extra information, such as the auxiliary table, assisting the secret extraction is released as well. Even then, there is still space remaining after the hiding procedure is completed. The result is a higher capacity exploration for embedding the secret into a host-image. Upon inspection of the quality of the stego-image using the measurement of PSNR it is noted that not only does the image display make the grade of the human vision system, i.e., it is imperceptible by human eyes as far as the embedded secret is concerned, but also the valued results of PSNR remain sufficiently stable for a variety of host-image selections. Therefore, Our proposal scheme is notably superior to those in the previous literature [IEE Proc.-Vision Image Signal Process. 147(l) (2000) 29]. The advantages of this proposed scheme are the higher capacity exploration on secret embedding, and better stability on stego-image displays. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:99 / 116
页数:18
相关论文
共 24 条
  • [1] Techniques for data hiding
    Bender, W
    Gruhl, D
    Morimoto, N
    Lu, A
    [J]. IBM SYSTEMS JOURNAL, 1996, 35 (3-4) : 313 - 336
  • [2] BIHAM E, 1995, ADV CRYPTOLOYG
  • [3] BIHAM E, 1991, J CRYPTOL, V4, P3, DOI DOI 10.1007/BF00630563
  • [4] COX IJ, 1995, 9510 NECI NEC RES I
  • [5] EBERLE H, 1992, CRYPTO 92, P527
  • [6] Fridrich J, 1999, IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS, PROCEEDINGS VOL 2, P536, DOI 10.1109/MMCS.1999.778542
  • [7] AN ARCHITECTURAL COMPARISON OF 32-BIT MICROPROCESSORS
    GUPTA, A
    TOONG, HD
    [J]. IEEE MICRO, 1983, 3 (01) : 9 - 22
  • [8] Herrigel A, 1998, LECT NOTES COMPUT SC, V1525, P169
  • [9] Hidden digital watermarks in images
    Hsu, CT
    Wu, JL
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 1999, 8 (01) : 58 - 68
  • [10] Johnson N. F., 1998, COMPUT J, V31, DOI [DOI 10.1109/MC.1998.4655281, 10.1109/MC.1998.4655281]