Development of a data hiding scheme based on combination theory for lowering the visual noise in binary images

被引:7
作者
Wu, Nan-I [1 ]
Hwang, Min-Shiang [2 ,3 ]
机构
[1] Toko Univ, Dept Animat & Game Design, 51,Sec 2,Syuefu Rd, Puzih City 61363, Chiayi, Taiwan
[2] Asia Univ, Dept Comp Sci & Informat Engn, 500 Lioufeng Rd, Taichung 41354, Taiwan
[3] China Med Univ, China Med Univ Hosp, Dept Med Res, 91 Xueshi Rd, Taichung 40402, Taiwan
关键词
Binary image; Combination theory; Data hiding; High capacity; Imperceptible; STEGANOGRAPHIC METHOD; AUTHENTICATION;
D O I
10.1016/j.displa.2017.07.009
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In order to raise the embedding capacity and simultaneously reduce the artifact effect caused by embedding secret messages into binary images, a novel data hiding method based on the combination theory is proposed. In the proposed scheme, a secret position matrix is designed to improve the hiding capacity which is capable of preventing the least distortion based on the combination theory. Our new scheme enables users to conceal more than one bit of secret data by changing at most one pixel in one subimage. We have derived a formula for computing the payload and the possible modification pixels of a block. Compared with the existing schemes in terms of the hiding capacity and the visual artifacts, as our experimental results show, the proposed scheme is capable of providing a better image quality protector even with a more efficient secret data hider. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:116 / 123
页数:8
相关论文
共 20 条
  • [1] [Anonymous], IEEE INT C IMAGE PRO
  • [2] [Anonymous], INT J ELECT INF ENG
  • [3] Hiding data in images by simple LSB substitution
    Chan, CK
    Cheng, LM
    [J]. PATTERN RECOGNITION, 2004, 37 (03) : 469 - 474
  • [4] Fan Li, 2016, International Journal of Network Security, V18, P410
  • [5] Jana Biswapati, 2016, International Journal of Network Security, V18, P633
  • [6] Jana B., 2016, INT J ELECT INFORM E, V5, P6
  • [7] Data hiding method in binary images based on block masking for key authentication
    Jung, Ki-Hyun
    Yoo, Kee-Young
    [J]. INFORMATION SCIENCES, 2014, 277 : 188 - 196
  • [8] A novel adaptive steganography based on local complexity and human vision sensitivity
    Lou, Der-Chyuan
    Wu, Nan-I
    Wang, Chung-Ming
    Lin, Zong-Han
    Tsai, Chwei-Shyong
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (07) : 1236 - 1248
  • [9] Mersaid A., 2016, INT J ELECT INFORM E, V4, P1
  • [10] Simmons GJ, 1984, ADV CRYPTOLOGY, P51, DOI DOI 10.1007/978-1-4684-4730-9_5