Data hiding based on extended turtle shell matrix construction method

被引:32
作者
Liu, Li [1 ,2 ]
Chang, Chin-Chen [3 ]
Wang, Anhong [2 ]
机构
[1] Northwestern Polytech Univ, Sch Comp Sci, Xian 710072, Peoples R China
[2] Taiyuan Univ Sci & Technol, Coll Elect Informat & Engn, Taiyuan 030024, Peoples R China
[3] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
基金
中国国家自然科学基金;
关键词
Data hiding; Turtle shell matrix; Pixel pair; N-ary notational system; STEGANOGRAPHIC METHOD; IMAGES;
D O I
10.1007/s11042-016-3624-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data hiding research has focused mainly on determining how to embed secret data into various public host media, and to also ensure the host medium is not changed to a degree such that it can be perceived by the human eye. In 2014, Chang et al. proposed a novel concept, named the turtle shell matrix, to embed secret data. This scheme has obvious advantages with respect to its hiding capacity and image quality. However, its disadvantage is lack of flexibility due to the fixed turtle shell matrix structure. In this paper, we extend this turtle shell matrix structure into a different matrix model to meet different hiding capacity and image quality needs. Meanwhile, a general extraction function is derived to generate a matrix having a different turtle shell model. The values of the pixel pairs in the cover image are modified according to guidance provided by the turtle shell to hide a secret digit in an N-ary notational system. The experimental results show that the proposed scheme not only has better flexibility in balancing the trade-off between hiding capacity and stego-image quality, but also provides higher hiding capacity and stego-images with better visual quality than previous schemes.
引用
收藏
页码:12233 / 12250
页数:18
相关论文
共 26 条
[11]   A novel data hiding scheme based on modulus function [J].
Lee, Chin-Feng ;
Chen, Hsing-Ling .
JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (05) :832-843
[12]   Edge Adaptive Image Steganography Based on LSB Matching Revisited [J].
Luo, Weiqi ;
Huang, Fangjun ;
Huang, Jiwu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (02) :201-214
[13]   Robust blind image watermarking scheme based on Redundant Discrete Wavelet Transform and Singular Value Decomposition [J].
Makbol, Nasrin M. ;
Khoo, Bee Ee .
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2013, 67 (02) :102-112
[14]   LSB matching revisited [J].
Mielikainen, J .
IEEE SIGNAL PROCESSING LETTERS, 2006, 13 (05) :285-287
[15]  
Panigrahi BK, 2014, INT J INNOV RES DEV, V3
[16]  
Sharma Vijay Kumar, 2012, Journal of Theoretical and Applied Information Technology, V36, P1
[17]   A data hiding scheme using pixel value differencing and improving exploiting modification directions [J].
Shen, Shu-Yuan ;
Huang, Li-Hong .
COMPUTERS & SECURITY, 2015, 48 :131-141
[18]   A steganographic scheme by fully exploiting modification directions [J].
The Duc Kieu ;
Chang, Chin-Chen .
EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (08) :10648-10657
[19]   A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function [J].
Thien, CC ;
Lin, JC .
PATTERN RECOGNITION, 2003, 36 (12) :2875-2881
[20]   A high quality steganographic method with pixel-value differencing and modulus function [J].
Wang, Chung-Ming ;
Wu, Nan-I ;
Tsai, Chwei-Shyong ;
Hwang, Min-Shiang .
JOURNAL OF SYSTEMS AND SOFTWARE, 2008, 81 (01) :150-158