Steganography of capacity required using modulo operator for embedding secret image

被引:67
作者
Wang, SJ [1 ]
机构
[1] Cent Police Univ, Dept Informat Management, Taoyuan 333, Taiwan
关键词
modulus; information hiding; embedding procedure; secret;
D O I
10.1016/j.amc.2004.04.059
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In this paper, a novel mechanism using modulus operations to incorporate secret data (with image form) into a host-image is proposed. The used modulus is a threshold value that indicates how many bits of the secret image are being incorporated into the host-image. In our scheme, there are two kinds of secret images processed. The capacities of these two types are half the size and a quarter the size of the chosen host-image, respectively. As can be seen in the result of our experiment, not only can the secret images be totally embedded, but the extra information, such as the auxiliary table, assisting the secret extraction is released as well. Even then, there is still space remaining after the hiding procedure is completed. The result is a higher capacity exploration for embedding the secret into a host-image. Upon inspection of the quality of the stego-image using the measurement of PSNR it is noted that not only does the image display make the grade of the human vision system, i.e., it is imperceptible by human eyes as far as the embedded secret is concerned, but also the valued results of PSNR remain sufficiently stable for a variety of host-image selections. Therefore, Our proposal scheme is notably superior to those in the previous literature [IEE Proc.-Vision Image Signal Process. 147(l) (2000) 29]. The advantages of this proposed scheme are the higher capacity exploration on secret embedding, and better stability on stego-image displays. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:99 / 116
页数:18
相关论文
共 24 条
  • [11] Adaptive LMS L-filters for noise suppression in images
    Kotropoulos, C
    Pitas, I
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 1996, 5 (12) : 1596 - 1609
  • [12] Lu CS, 2000, IEEE T MULTIMEDIA, V2, P209, DOI 10.1109/6046.890056
  • [13] Matsui Mitsuru, 1994, LNCS, P386, DOI [DOI 10.1007/3-540-48285-7_33, DOI 10.1007/3-540-48285-7]
  • [14] Nikolaidis N, 1996, INT CONF ACOUST SPEE, P2168, DOI 10.1109/ICASSP.1996.545849
  • [15] Information hiding - A survey
    Petitcolas, FAP
    Anderson, RJ
    Kuhn, MG
    [J]. PROCEEDINGS OF THE IEEE, 1999, 87 (07) : 1062 - 1078
  • [16] Pfitzmann B., 1996, Lecture Notes in Computer Science, V1, P347
  • [17] SCHNEIER B, 1996, APPL CRYPTOLGRAPHY
  • [18] Robust data hiding for images
    Swanson, MD
    Zhu, B
    Tewfik, AH
    [J]. 1996 IEEE DIGITAL SIGNAL PROCESSING WORKSHOP, PROCEEDINGS, 1996, : 37 - 40
  • [19] VANSCHYNDELL RG, 1994, IEEE IMAGE PROC, P86, DOI 10.1109/ICIP.1994.413536
  • [20] Digital image watermarking using mixing systems
    Voyatzis, G
    Pitas, I
    [J]. COMPUTERS & GRAPHICS, 1998, 22 (04) : 405 - 416