Color image steganography scheme using DFT, SPIHT codec, and modified differential phase-shift keying techniques

被引:37
作者
Chen, Wen-Yuan [1 ]
机构
[1] Natl Chin Yi Univ Technol, Dept Elect Engn, Sect 1, Taiping City 411, Taichung County, Taiwan
关键词
steganography; set partitioning in hierarchical trees (SPIHT); differential phase-shift keying (DPSK); discrete fourier transform (DFT); discrete wavelet transform (DWT); embedded zerotree wavelet (EZW);
D O I
10.1016/j.amc.2007.05.063
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In this research, on the basis of the differential phase-shift keying (DPSK) technique which is widely used in digital communication systems to develop a steganography scheme, we aim to hide a "secret image" into a cover image of the same size so that the resultant image has no noticeable degradation. In our approach, three strategies are used to achieve this goal: (1) Compress the secret image to reduce the number of secret bits. The set partitioning in hierarchical trees (SPIHT) codec were used to obtain a high reconstructed image quality and low bit rate image compression. (2) A neighbor block signal phase comparison (NBSPC) mechanism is used to offer the location for secret data embedding. (3) A fold phase distribution differential phase-shift keying FPDPSK mechanism is used to improve the quality of the cover image. With our contribution, we have developed the fold phase distribution DPSK concept to obtain more than 1.5 dB quality improvement and twice the noise margin than the standard DPSK technique on the same test condition. (C) 2007 Elsevier Inc. All rights reserved.
引用
收藏
页码:40 / 54
页数:15
相关论文
共 22 条
[1]  
ABUHAJAR A, 2004, P IEEE INT C AC SPEE, V3
[2]   On the limits of steganography [J].
Anderson, RJ ;
Petitcolas, FAP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :474-481
[3]   A virtual image cryptosystem based upon vector quantization [J].
Chen, TS ;
Chang, CC ;
Hwang, MS .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1998, 7 (10) :1485-1488
[4]   Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation [J].
Chen, Wen-Yuan .
APPLIED MATHEMATICS AND COMPUTATION, 2007, 185 (01) :432-448
[5]   A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection [J].
Chen, WY ;
Chen, CH .
PATTERN RECOGNITION, 2005, 38 (04) :587-598
[6]   Public-key image steganography using discrete cosine transform and quadtree partition vector quantization coding [J].
Chen, WY ;
Chen, CH .
OPTICAL ENGINEERING, 2003, 42 (10) :2886-2892
[7]   Compression of multispectral images by three-dimensional SPIHT algorithm [J].
Dragotti, PL ;
Poggi, C ;
Ragozini, ARP .
IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 2000, 38 (01) :416-428
[8]   Detecting LSB steganography in color and gray-scale images [J].
Fridrich, J. ;
Goljan, M. ;
Du, R. .
IEEE Multimedia, 2001, 8 (04) :22-28
[9]  
Hou Y.C., 2000, J TECHNOLOGY, V15, P363
[10]  
Lie W.N., 1999, IEEE INT C IM PROC, V28, P286