Image hiding with an improved genetic algorithm and an optimal pixel adjustment process

被引:9
作者
Tseng, Lin-Yu [1 ]
Chan, Yung-Kuan [2 ]
Ho, Yu-An [1 ]
Chu, Yen-Ping [1 ]
机构
[1] Natl Chung Hsing Univ, Dept Comp Sci & Engn, Taichung, Taiwan
[2] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung, Taiwan
来源
ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS | 2008年
关键词
D O I
10.1109/ISDA.2008.235
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Image hiding techniques embed a secret image into a cover image. The fusion of the two, called a stego-image, fools grabbers who would not be conscious of the differences between the cover image and. the stego-image. A secret image can be transferred safely using this technique. In general, we would disarrange each pixel in the secret image and adjust all of them to form a suitable string of bits that could be embedded. Then these bits are embedded into the cover image in corresponding places, and this image would become a stego-image that hides secret data. This paper suggests a new image disarranging technique. It uses an improved genetic algorithm and an Optimal Pixel Adjustment Process, OPAP, to enhance the quality of a Stego-image. Experimental results show that a stego-image is indistinguishable from the cover-image. The stego-image can embed 4 bits per pixel, and the mean-square error of a stego-image is much lower than results for previous methods [1, 2, 4, 12].
引用
收藏
页码:320 / +
页数:3
相关论文
共 16 条
[1]  
Adelson E., 1990, U.S. Patent, Patent No. [4,939,515, 4939515]
[2]   Applications for data hiding [J].
Bender, W ;
Butera, W ;
Gruhl, D ;
Hwang, R ;
Paiz, FJ ;
Pogreb, S .
IBM SYSTEMS JOURNAL, 2000, 39 (3-4) :547-568
[3]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[4]   PICTURE DATA ENCRYPTION USING SCAN PATTERNS [J].
BOURBAKIS, N ;
ALEXOPOULOS, C .
PATTERN RECOGNITION, 1992, 25 (06) :567-581
[5]   Hiding data in images by simple LSB substitution [J].
Chan, CK ;
Cheng, LM .
PATTERN RECOGNITION, 2004, 37 (03) :469-474
[6]   Improved hiding data in images by optimal moderately-significant-bit replacement [J].
Chan, CK ;
Cheng, LM .
ELECTRONICS LETTERS, 2001, 37 (16) :1017-1018
[7]   Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy [J].
Chang, CC ;
Hsiao, JY ;
Chan, CS .
PATTERN RECOGNITION, 2003, 36 (07) :1583-1595
[8]   A virtual image cryptosystem based upon vector quantization [J].
Chen, TS ;
Chang, CC ;
Hwang, MS .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1998, 7 (10) :1485-1488
[9]   New approach to image encryption [J].
Chuang, TJ ;
Lin, JC .
JOURNAL OF ELECTRONIC IMAGING, 1998, 7 (02) :350-356
[10]   A novel SVD- and VQ-based image hiding scheme [J].
Chung, KL ;
Shen, CH ;
Chang, LC .
PATTERN RECOGNITION LETTERS, 2001, 22 (09) :1051-1058