A novel data hiding scheme for color images using a BSP tree

被引:14
作者
Tsai, Yuan-Yu [1 ]
Wang, Chung-Ming [1 ]
机构
[1] Natl Chung Hsing Univ, Graph Multimedia & Virtual Real Lab, Inst Comp Sci, Taichung 402, Taiwan
关键词
blind detection; BSP tree data structures; data hiding; color images;
D O I
10.1016/j.jss.2006.06.016
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we propose a novel data hiding technique for color images using a BSP (Binary Space Partitioning) tree. First, we treat the RGB values at each pixel as a three-dimensional (3D) virtual point in the XYZ coordinates and a bounding volume is employed to enclose them. Using predefined termination criteria, we construct a BSP tree by recursively decomposing the bounding volume into voxels containing one or several 3D virtual points. The voxels are then further categorized into eight subspaces, each of which is numbered and represented as three-digit binary characters. In the embedding process, we first traverse the BSP tree, locating a leaf voxel; then we embed every three bits of the secret message into the points inside the leaf voxel. This is realized by translating a point's current position to the corresponding numbered subspace. Finally, we transform the data-embedded 3D points to the stego color image. Our technique is a blind extraction scheme, where embedded messages can be extracted without the aid of the original cover image. It achieves high data capacity, equivalent to at least three times the number of pixels in the cover image. The stego image causes insignificant visual distortion under this high data capacity embedding scheme. In addition, we can take advantage of the properties of tree data structure to improve the security of the embedding process, making it difficult to extract the secret message without the secret key provided. Finally, when we adaptively modify the thresholds used to construct the BSP tree, our technique can be robust against attacks including image cropping, pixel value perturbation, and pixel reordering. But, the scheme is not robust against image compression, blurring, scaling, sharpening, and rotation attacks. (C) 2006 Elsevier Inc. All rights reserved.
引用
收藏
页码:429 / 437
页数:9
相关论文
共 9 条
[1]  
Bender W., 1996, IBM SYST J, V35, DOI DOI 10.1147/SJ.353.0313
[2]   A steganographic method for digital images using side match [J].
Chang, CC ;
Tseng, HW .
PATTERN RECOGNITION LETTERS, 2004, 25 (12) :1431-1437
[3]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[4]  
Dugad R, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 2, P419, DOI 10.1109/ICIP.1998.723406
[5]  
KATZENBEISSER S, 2000, INFORMATION HIDNG TE
[6]  
LIE WN, 1999, P IEEE INT C IM PROC, V1, P286
[7]   Information hiding - A survey [J].
Petitcolas, FAP ;
Anderson, RJ ;
Kuhn, MG .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1062-1078
[8]   Image hiding by optimal LSB substitution and genetic algorithm [J].
Wang, RZ ;
Lin, CF ;
Lin, JC .
PATTERN RECOGNITION, 2001, 34 (03) :671-683
[9]   A steganographic method for images by pixel-value differencing [J].
Wu, DC ;
Tsai, WH .
PATTERN RECOGNITION LETTERS, 2003, 24 (9-10) :1613-1626