A Novel High Quality High Capacity Image Hiding Scheme Based on Image Compression and an Optical Pixel Adjustment Process

被引:1
作者
Tawalbeh, Lo'ai A. [1 ]
Banimelhem, Omar [2 ]
Al-Batati, Mohammed [1 ]
机构
[1] Jordan Univ Sci & Technol, Dept Comp Engn, Irbid 22110, Jordan
[2] Jordan Univ Sci & Technol, Dept Network Engn & Secur, Irbid, Jordan
来源
INFORMATION SECURITY JOURNAL | 2012年 / 21卷 / 05期
关键词
image hiding; genetic algorithm; OPAP; steganography;
D O I
10.1080/19393555.2012.694979
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Image hiding methods embed a secret image into a host image. The resultant stego-image does not attract the interceptors that would not detect the differences between the host image and the stego-image. To exploit the great developments in the area of image compression and to improve the quality of stego-image, this paper proposes a new method to embed the secret image into the host image. Basically, the secret image is compressed and then embedded into host image. The embedding method is based on the Optimal Pixel Adjustment Process (OPAP) and genetic algorithm. In the paper we addressed the important issues to build such systems. The experimental results showed that the proposed method can improve the quality from 60% to 80% when compared with the simple Least Significant Bit (LSB) replacement methods. Adding to that, the mean square error of the stego-image is much lower compared with other methods (Chan & Cheng, 2004; Chang, Hsiao, & Chan, 2003; Thien & Lin, 2003; Tseng, Chan, Ho, & Chu, 208; Wang, Lin, & Lin, 2001). Also, the proposed technique improves capacity. In other words, we can embed a secret image with size 450 x 450 inside a hosting image with size 512 x 512.
引用
收藏
页码:256 / 268
页数:13
相关论文
共 40 条
  • [1] Adelson E., 1990, U.S. Patent, Patent No. [4,939,515, 4939515]
  • [2] Agaian SS, 2005, LECT NOTES COMPUT SC, V3776, P481
  • [3] Techniques for data hiding
    Bender, W
    Gruhl, D
    Morimoto, N
    Lu, A
    [J]. IBM SYSTEMS JOURNAL, 1996, 35 (3-4) : 313 - 336
  • [4] Bender W., 2000, IBM SYSTEMS J
  • [5] A Steganographic Approach by using Session Based Stego-Key, Genetic Algorithm and Variable Bit Replacement Technique
    Bhattacharya, Tanmay
    Bhowmik, Sandeep
    Chaudhuri, S. R. Bhadra
    [J]. ICCEE 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2008, : 51 - +
  • [6] Hiding data in images by simple LSB substitution
    Chan, CK
    Cheng, LM
    [J]. PATTERN RECOGNITION, 2004, 37 (03) : 469 - 474
  • [7] Improved hiding data in images by optimal moderately-significant-bit replacement
    Chan, CK
    Cheng, LM
    [J]. ELECTRONICS LETTERS, 2001, 37 (16) : 1017 - 1018
  • [8] A steganographic method based upon JPEG and quantization table modification
    Chang, CC
    Chen, TS
    Chung, LZ
    [J]. INFORMATION SCIENCES, 2002, 141 (1-2) : 123 - 138
  • [9] Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy
    Chang, CC
    Hsiao, JY
    Chan, CS
    [J]. PATTERN RECOGNITION, 2003, 36 (07) : 1583 - 1595
  • [10] New image steganographic methods using run-length approach
    Chang, Chin-Chen
    Lin, Chih-Yang
    Wang, Yu-Zheng
    [J]. INFORMATION SCIENCES, 2006, 176 (22) : 3393 - 3408