An improved least-significant-bit substitution method using the modulo three strategy

被引:25
作者
Xu, Wen-Long [1 ]
Chang, Chin-Chen [2 ]
Chen, Tung-Shou [3 ]
Wang, Liang-Min [1 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Hefei 230601, Peoples R China
[2] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[3] Notat Taichung Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taichung 40401, Taiwan
关键词
High embedding capacity; Modulo three strategy; LSB scheme; Steganalysis; IMAGE; SMVQ; STEGANALYSIS; ALGORITHM; INDEX;
D O I
10.1016/j.displa.2016.03.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we proposed a novel method to embed a series of ternary secret data into a cover image based on an improved Least-Significant-Bit (LSB) scheme using the modulo three strategy. Our new method can hide two ternary numbers into each grayscale pixel, normally only modify the two LSBs of the pixel, while it may cause overflow/underflow and a carry/borrow. We solve these problems by adding 1 to the pixel or subtracting 1 from the pixel before embedding. The embedding capacity of our method can be 3.1699 bpp. At the same time, the quality of the stego image of our new method also is better than traditional LSB scheme when the embedding capacity is greater than 3 bpp with a Peak Signal-to-Noise Ratio (PSNR) greater than 37 dB. Extensive experimental results indicated that our new method is capable of getting a higher PSNR than traditional LSB scheme when the embedding capacity is greater than 3 bpp, and it has higher resistance ability against the chosen steganalysis algorithm when the embedding capacity is low. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:36 / 42
页数:7
相关论文
共 33 条
  • [1] [Anonymous], 2004, ELECT IMAGING
  • [2] Bai J., 2015, IMAGE GRAPHICS, P415
  • [3] Techniques for data hiding
    Bender, W
    Gruhl, D
    Morimoto, N
    Lu, A
    [J]. IBM SYSTEMS JOURNAL, 1996, 35 (3-4) : 313 - 336
  • [4] Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy
    Chang, CC
    Hsiao, JY
    Chan, CS
    [J]. PATTERN RECOGNITION, 2003, 36 (07) : 1583 - 1595
  • [5] A reversible compression code hiding using SOC and SMVQ indices
    Chang, Chin-Chen
    Nguyen, Thai Son
    Lin, Chia-Chen
    [J]. INFORMATION SCIENCES, 2015, 300 : 85 - 99
  • [6] A high payload frequency-based reversible image hiding method
    Chang, Chin-Chen
    Pai, Pei-Yan
    Yeh, Chia-Ming
    Chan, Yung-Kuan
    [J]. INFORMATION SCIENCES, 2010, 180 (11) : 2286 - 2298
  • [7] High capacity reversible data hiding scheme based on residual histogram shifting for block truncation coding
    Chang, I-Cheng
    Hu, Yu-Chen
    Chen, Wu-Lin
    Lo, Chun-Chi
    [J]. SIGNAL PROCESSING, 2015, 108 : 376 - 388
  • [8] A DCT/DST-based error propagation-free data hiding algorithm for HEVC intra-coded frames
    Chang, Po-Chun
    Chung, Kuo-Liang
    Chen, Jiann-Jone
    Lin, Chien-Hsiung
    Lin, Tseng-Jung
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (02) : 239 - 253
  • [9] Recursive code construction for reversible data hiding in DCT domain
    Chen, Biao
    Zhang, Weiming
    Ma, Kede
    Yu, Nenghai
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 72 (02) : 1985 - 2009
  • [10] High payload steganography mechanism using hybrid edge detector
    Chen, Wen-Jan
    Chang, Chin-Chen
    Le, T. Hoang Ngan
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (04) : 3292 - 3301