Both color and gray scale secret images hiding in a color image

被引:21
作者
Lin, MH [1 ]
Hu, YC
机构
[1] Providence Univ, Dept Comp Sci & Informat Management, Taichung 433, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 62107, Taiwan
关键词
color image hiding; cryptography technique; DES; color quantization;
D O I
10.1142/S0218001402001903
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the past, most image hiding techniques have been applied only to gray scale images. Now, many valuable images are color images. Thus, it has become important to be able to apply image-hiding techniques to hide color images. In this paper, our proposed scheme can not only be applied to "a color host image hiding a color secret image", but also to "a color host image hiding a gray scale secret image". Our scheme utilizes the rightmost 3, 2 and 3 bits of the R, G, B channels of every pixel in the host image to hide related information from the secret image. Meanwhile, we utilize the leftmost 5, 6, 5 bits of the R, G, B channels of every pixel in the host image and set the remaining bits as zero to generate a palette. We then use the palette to conduct color quantization on the secret image to convert its 24-bit pixels into pixels with 8-bit palette index values. DES encryption is then conducted on the index values before the secret image is embedded into the rightmost 3, 2, 3 bits of the R, G, B channels of every pixel in the host image. The experimental results show that even under the worst case scenario our scheme guarantees an average host image PSNR value of 39.184 and an average PSNR value of 27.3415 for the retrieved secret image. In addition to the guarantee of the quality of host images and retrieved secret images, our scheme further strengthens the protection of the secret image by conducting color quantization and DES encryption on the secret image in advance. Therefore, our scheme not only expands the application area of image hiding, but is also practical and secure.
引用
收藏
页码:697 / 713
页数:17
相关论文
共 15 条
[1]  
Adelson E., 1990, U.S. Patent, Patent No. [4,939,515, 4939515]
[2]  
[Anonymous], P IEEE INT C IM PROC
[3]  
Bender W., 1995, Proceedings of the SPIE - The International Society for Optical Engineering, V2420, P164, DOI 10.1117/12.205315
[4]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[5]   Aqueous humor nitric oxide levels differ in patients with different types of glaucoma [J].
Chang, CJ ;
Chiang, CH ;
Chow, JCK ;
Lu, DW .
JOURNAL OF OCULAR PHARMACOLOGY AND THERAPEUTICS, 2000, 16 (05) :399-406
[6]   Digital watermarking of images using neural networks [J].
Hwang, MS ;
Chang, CC ;
Hwang, KF .
JOURNAL OF ELECTRONIC IMAGING, 2000, 9 (04) :548-555
[7]   A watermarking technique based on one-way hash functions [J].
Hwang, MS ;
Chang, CC ;
Hwang, KF .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 1999, 45 (02) :286-294
[8]  
LAI X, 1992, EUROCRYPT 91, P17
[9]  
LAI X, 1991, EUROCRYPT 90, P389
[10]  
Rhee M.Y., 1994, CRYPTOGRAPHY SECURE