Hiding data in multitone images for data communications

被引:5
作者
Chang, CC [1 ]
Chuang, JC [1 ]
Lai, YP [1 ]
机构
[1] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chaiyi 621, Taiwan
来源
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING | 2004年 / 151卷 / 02期
关键词
D O I
10.1049/ip-vis:20040045
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Two novel data-hiding schemes for secure data communications are presented. These two schemes perform on the pixel differences between the original (host) image and the decompressed image, which is inspired from Wu's and Chao's methods. The first scheme, referred to as 'scheme-1', utilises the differences between two similar images and then embeds the secret data into the different parts. In the embedding process, two auxiliary techniques, zero-replacement and complement-bit, will also be incorporated. In addition, to enhance the hiding efficiency of scheme-1, the authors have followed the bit-plane hiding strategy and created scheme-2. The proposed schemes have two advantages. First, the error distortion can be measured before the hiding process begins. Second, there is no complex computation, which means the hiding process can be executed very efficiently. The experimental results show that the two proposed schemes can achieve better image quality than other data-hiding schemes. At the same time, the new schemes can also satisfy the three basic requirements a data hiding scheme should live up to: invisibility, capacity and data security.
引用
收藏
页码:137 / 145
页数:9
相关论文
共 22 条
[1]   PICTURE DATA ENCRYPTION USING SCAN PATTERNS [J].
BOURBAKIS, N ;
ALEXOPOULOS, C .
PATTERN RECOGNITION, 1992, 25 (06) :567-581
[2]  
Chang C.-C., 2000, INFORMATICA, V24, P505
[3]   A steganographic method based upon JPEG and quantization table modification [J].
Chang, CC ;
Chen, TS ;
Chung, LZ .
INFORMATION SCIENCES, 2002, 141 (1-2) :123-138
[4]   A data-hiding technique with authentication, integration, and confidentiality for electronic patient records [J].
Chao, HM ;
Hsu, CM ;
Miaou, SG .
IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2002, 6 (01) :46-53
[5]   A virtual image cryptosystem based upon vector quantization [J].
Chen, TS ;
Chang, CC ;
Hwang, MS .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1998, 7 (10) :1485-1488
[6]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[7]   IMAGE COMPRESSION USING BLOCK TRUNCATION CODING [J].
DELP, EJ ;
MITCHELL, OR .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1979, 27 (09) :1335-1342
[8]   Data hiding watermarking for halftone images [J].
Fu, MS ;
Au, OC .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (04) :477-484
[9]   Halftone image data hiding with intensity selection and connection selection [J].
Fu, MS ;
Au, OC .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2001, 16 (10) :909-930
[10]   Hidden digital watermarks in images [J].
Hsu, CT ;
Wu, JL .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1999, 8 (01) :58-68