A novel data hiding scheme based on modulus function

被引:45
作者
Lee, Chin-Feng [1 ]
Chen, Hsing-Ling [2 ]
机构
[1] Chaoyang Univ Technol, Dept Informat Management, Wufong Township 41349, Taichung County, Taiwan
[2] Chaoyang Univ Technol, Grad Inst Informat, Doctoral Program, Wufong Township 41349, Taichung County, Taiwan
关键词
Data hiding; Steganography; Modulus operation; DIGITAL IMAGE WATERMARKING; RIGHTFUL OWNERSHIP; LSB SUBSTITUTION; GRAYSCALE IMAGES; STEGANALYSIS;
D O I
10.1016/j.jss.2009.12.018
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Four criteria are generally used to evaluate the performance of data hiding scheme: the embedding capacity, the visual quality of the stego-image, the security, and the complexity of the data-embedding algorithm. However, data hiding schemes seldom take all these factors into consideration. This paper proposes a novel data hiding scheme that uses a simple modulus function to address all the performance criteria listed above. According to the input secret keys, the encoder and decoder use the same set-generation functions H(r)() and H(c)() to first generate two sets Kr and Kc. A variant Cartesian product is then created using Kr and Kc. Each cover pixel then forms a pixel group with its neighboring pixels by exploiting an efficient modulus function; the secret data are then embedded or extracted via a mapping process between the variant of the Cartesian product and each pixel group. The proposed scheme offers several advantages, namely (1) the embedding capacity can be scaled, (2) a good visual quality of the stego-image can be achieved, (3) the computational cost of embedding or extracting the secret data is low and requires little memory space, (4) secret keys are used to protect the secret data and (5) the problem of overflow or underflow does not occur, regardless of the nature of the cover pixels. We tested the performance of the proposed scheme by comparing it with Mielikainen's and Zhang and Wang's schemes for gray-scale images. The experimental results showed that our proposed scheme outperforms Mielikainen's in three respects, namely scalable embedding capacity, embedding rate, and level of security. Our data hiding scheme also achieved a higher embedding capacity than Zhang and Wang's. The proposed scheme can easily be applied to both gray-scale and color images. Analyses of its performance showed that our proposed scheme outperforms Tsai and Wang's in terms of its time complexity and memory space requirement. (C) 2009 Elsevier Inc. All rights reserved.
引用
收藏
页码:832 / 843
页数:12
相关论文
共 18 条
[1]   Hiding data in images by simple LSB substitution [J].
Chan, CK ;
Cheng, LM .
PATTERN RECOGNITION, 2004, 37 (03) :469-474
[2]   Adaptive watermark mechanism for rightful ownership protection [J].
Chang, Chin-Chen ;
Lin, Pei-Yu .
JOURNAL OF SYSTEMS AND SOFTWARE, 2008, 81 (07) :1118-1129
[3]   Quantitative steganalysis of digital images: estimating the secret message length [J].
Fridrich, J ;
Goljan, M ;
Hogea, D ;
Soukal, D .
MULTIMEDIA SYSTEMS, 2003, 9 (03) :288-302
[4]   Steganalysis of LSB matching in grayscale images [J].
Ker, AD .
IEEE SIGNAL PROCESSING LETTERS, 2005, 12 (06) :441-444
[5]   Data hiding in grayscale images by dynamic programming based on a human visual model [J].
Lee, I-Shi ;
Tsai, Wen-Hsiang .
PATTERN RECOGNITION, 2009, 42 (07) :1604-1611
[6]  
Liao Z., 2007, INT J NETWORK SECURI, V5, P140
[7]   Digital watermarking models for resolving rightful ownership and authenticating legitimate customer [J].
Lin, PL .
JOURNAL OF SYSTEMS AND SOFTWARE, 2001, 55 (03) :261-271
[8]   LSB matching revisited [J].
Mielikainen, J .
IEEE SIGNAL PROCESSING LETTERS, 2006, 13 (05) :285-287
[9]   Human visual system based adaptive digital image watermarking [J].
Qi, Huiyan ;
Zheng, Dong ;
Zhao, Jiying .
SIGNAL PROCESSING, 2008, 88 (01) :174-188
[10]   A robust content-based digital image watermarking scheme [J].
Qi, Xiaojun ;
Qi, Ji .
SIGNAL PROCESSING, 2007, 87 (06) :1264-1280