共查询到20条相似文献,搜索用时 15 毫秒
1.
A novel data hiding scheme based on modulus function 总被引:1,自引:0,他引:1
Chin-Feng Lee Author Vitae Hsing-Ling Chen Author Vitae 《Journal of Systems and Software》2010,83(5):832-843
Four criteria are generally used to evaluate the performance of data hiding scheme: the embedding capacity, the visual quality of the stego-image, the security, and the complexity of the data-embedding algorithm. However, data hiding schemes seldom take all these factors into consideration. This paper proposes a novel data hiding scheme that uses a simple modulus function to address all the performance criteria listed above. According to the input secret keys, the encoder and decoder use the same set-generation functions Hr() and Hc() to first generate two sets Kr and Kc. A variant Cartesian product is then created using Kr and Kc. Each cover pixel then forms a pixel group with its neighboring pixels by exploiting an efficient modulus function; the secret data are then embedded or extracted via a mapping process between the variant of the Cartesian product and each pixel group. The proposed scheme offers several advantages, namely (1) the embedding capacity can be scaled, (2) a good visual quality of the stego-image can be achieved, (3) the computational cost of embedding or extracting the secret data is low and requires little memory space, (4) secret keys are used to protect the secret data and (5) the problem of overflow or underflow does not occur, regardless of the nature of the cover pixels.We tested the performance of the proposed scheme by comparing it with Mielikainen’s and Zhang and Wang’s schemes for gray-scale images. The experimental results showed that our proposed scheme outperforms Mielikainen’s in three respects, namely scalable embedding capacity, embedding rate, and level of security. Our data hiding scheme also achieved a higher embedding capacity than Zhang and Wang’s. The proposed scheme can easily be applied to both gray-scale and color images. Analyses of its performance showed that our proposed scheme outperforms Tsai and Wang’s in terms of its time complexity and memory space requirement. 相似文献
2.
A high quality steganographic method with pixel-value differencing and modulus function 总被引:2,自引:0,他引:2
In this paper, we shall propose a new image steganographic technique capable of producing a secret-embedded image that is totally indistinguishable from the original image by the human eye. In addition, our new method avoids the falling-off-boundary problem by using pixel-value differencing and the modulus function. First, we derive a difference value from two consecutive pixels by utilizing the pixel-value differencing technique (PVD). The hiding capacity of the two consecutive pixels depends on the difference value. In other words, the smoother area is, the less secret data can be hidden; on the contrary, the more edges an area has, the more secret data can be embedded. This way, the stego-image quality degradation is more imperceptible to the human eye. Second, the remainder of the two consecutive pixels can be computed by using the modulus operation, and then secret data can be embedded into the two pixels by modifying their remainder. In our scheme, there is an optimal approach to alter the remainder so as to greatly reduce the image distortion caused by the hiding of the secret data. The values of the two consecutive pixels are scarcely changed after the embedding of the secret message by the proposed optimal alteration algorithm. Experimental results have also demonstrated that the proposed scheme is secure against the RS detection attack. 相似文献
3.
In this paper, a data hiding scheme by simple LSB substitution is proposed. By applying an optimal pixel adjustment process to the stego-image obtained by the simple LSB substitution method, the image quality of the stego-image can be greatly improved with low extra computational complexity. The worst case mean-square-error between the stego-image and the cover-image is derived. Experimental results show that the stego-image is visually indistinguishable from the original cover-image. The obtained results also show a significant improvement with respect to a previous work. 相似文献
4.
In this paper, we shall propose a novel image-hiding scheme. Our new scheme classifies the host image pixels into two groups of pixels according to the pixel values. For each group of pixels, the corresponding secret pixel values go through an optimal substitution process and are transformed into other pixel values by following the dynamic programming strategy. Then, we can embed the transformed pixel values in the host pixels by using the modulus functions and obtain the stego-image. Extensive experimental results demonstrate that our new method is capable of offering better stego-image quality than a number of well-accepted schemes. 相似文献
5.
This paper proposes a novel data hiding method using pixel-value difference and modulus function for color image with the large embedding capacity(hiding 810757 bits in a 512×512 host image at least) and a high-visual-quality of the cover image. The proposed method has fully taken into account the correlation of the R, G and B plane of a color image. The amount of information embedded the R plane and the B plane determined by the difference of the corresponding pixel value between the G plane and the median of G pixel value in each pixel block. Furthermore, two sophisticated pixel value adjustment processes are provided to maintain the division consistency and to solve underflow and overflow problems. The most importance is that the secret data are completely extracted through the mathematical theoretical proof. 相似文献
6.
7.
8.
Osamah M. Al-QershiAuthor Vitae Bee Ee Khoo Author Vitae 《Journal of Systems and Software》2011,84(1):105-112
Since the difference expansion (DE) technique was proposed, many researchers tried to, improve its performance in terms of hiding capacity and visual quality. In this paper, a new scheme, based on DE is proposed in order to increase the hiding capacity for medical images. One of the characteristics of medical images, among the other types of images, is the large smooth regions. Taking advantage of this characteristic, our scheme divides the image into two regions; smooth region and non-smooth region. For the smooth region, a high embedding capacity scheme is applied, while the original DE method is applied to the non-smooth region. Sixteen DICOM images of different modalities were used for testing the proposed schemes. The results showed that the proposed scheme has higher hiding capacity compared to the original schemes. 相似文献
9.
Hsien-Chu Wu Author Vitae Author Vitae Chwei-Shyong Tsai Author Vitae Yen-Ping Chu Author Vitae Author Vitae 《Journal of Systems and Software》2009,82(12):1966-1973
To enhance the embedding capacity of a reversible data hiding system, in this paper, a novel multiple-base lossless scheme based on JPEG-LS pixel value prediction and reversible difference expansion will be presented. The proposed scheme employs a pixel value prediction mechanism to decrease the distortion caused by the hiding of the secret data. In general, the prediction error value tends to be much smaller in smooth areas than in edge areas, and more secret data embedded in smooth areas still meets better stego-image quality. The multiple-base notational system, on the other hand, is applied to increase the payload of the image. With the system, the payload of each pixel, determined by the complexity of its neighboring pixels, can be very different. In addition, the cover image processed by the proposed scheme can be fully recovered without any distortion. Experimental results, as shown in this paper, have demonstrated that the proposed method is capable of hiding more secret data while keeping the stego-image quality degradation imperceptible. 相似文献
10.
The simple least-significant-bit (LSB) substitution technique is the easiest way to embed secret data in the host image. To
avoid image degradation of the simple LSB substitution technique, Wang et al. proposed a method using the substitution table
to process image hiding. Later, Thien and Lin employed the modulus function to solve the same problem. In this paper, the
proposed scheme combines the modulus function and the optimal substitution table to improve the quality of the stego-image.
Experimental results show that our method can achieve better quality of the stego-image than Thien and Lin’s method does.
The text was submitted by the authors in English.
Chin-Shiang Chan received his BS degree in Computer Science in 1999 from the National Cheng Chi University, Taipei, Taiwan and the MS degree
in Computer Science and Information Engineering in 2001 from the National Chung Cheng University, ChiaYi, Taiwan. He is currently
a Ph.D. student in Computer Science and Information Engineering at the National Chung Cheng University, Chiayi, Taiwan. His
research fields are image hiding and image compression.
Chin-Chen Chang received his BS degree in applied mathematics in 1977 and his MS degree in computer and decision sciences in 1979, both from
the National Tsing Hua University, Hsinchu, Taiwan. He received his Ph.D. in computer engineering in 1982 from the National
Chiao Tung University, Hsinchu, Taiwan. During the academic years of 1980–1983, he was on the faculty of the Department of
Computer Engineering at the National Chiao Tung University. From 1983–1989, he was on the faculty of the Institute of Applied
Mathematics, National Chung Hsing University, Taichung, Taiwan. From 1989 to 2004, he has worked as a professor in the Institute
of Computer Science and Information Engineering at National Chung Cheng University, Chiayi, Taiwan. Since 2005, he has worked
as a professor in the Department of Information Engineering and Computer Science at Feng Chia University, Taichung, Taiwan.
Dr. Chang is a Fellow of IEEE, a Fellow of IEE and a member of the Chinese Language Computer Society, the Chinese Institute
of Engineers of the Republic of China, and the Phi Tau Phi Society of the Republic of China. His research interests include
computer cryptography, data engineering, and image compression.
Yu-Chen Hu received his Ph.D. degree in Computer Science and Information Engineering from the Department of Computer Science and Information
Engineering, National Chung Cheng University, Chiayi, Taiwan in 1999. Dr. Hu is currently an assistant professor in the Department
of Computer Science and Information Engineering, Providence University, Sha-Lu, Taiwan. He is a member of the SPIE society
and a member of the IEEE society. He is also a member of the Phi Tau Phi Society of the Republic of China. His research interests
include image and data compression, information hiding, and image processing. 相似文献
11.
Shang-Kuan ChenAuthor Vitae 《Computer Standards & Interfaces》2011,33(4):367-371
All the various data hiding methods can be simply divided into two types: (1) the extracted important data are lossy, (2) the extracted important data are lossless. The proposed method belongs to the second type. In this paper, a module-based substitution method with lossless secret data compression function is used for concealing smoother area of secret image by modifying fewer pixels in the generated stego-image. Compared with the previous data hiding methods that extract lossless data, the generated stego-image by the proposed method is always with better quality, unless the hidden image is with very strong randomness. 相似文献
12.
An image-hiding method with high hiding capacity based on best-block matching and k-means clustering
This paper presents a novel image-hiding method that exhibits a high hiding capacity that allows the embedded important image to be larger than the cover image, a facility that is seldom described in the literature. In the proposed method, the entire important image is divided into many nonoverlapping blocks. For each block of the important image, a block-matching procedure is used to search for the best similar block from a series of numbered candidate blocks. The obtained indices of the best-matching blocks are encoded using Huffman coding scheme, and then recorded in the least-significant-bit planes of the cover image through a monoalphabetic transposition cipher. The proposed method exhibits the following advantages over existing methods: (1) a high hiding capacity such that the embedded important image can be larger than the cover image; (2) a stego-image with a high quality, which improves the secrecy of the hidden image; and (3) a small error between the extracted important image and the original important image indicating that the extracted important image is of acceptable quality. 相似文献
13.
Yuan-Hui Yu Chin-Chen Chang Iuon-Chang Lin 《Computer Vision and Image Understanding》2007,107(3):183-194
In this paper, we present a steganographic method for embedding a color or a grayscale image in a true color image. Three types of secret images can be carried by the proposed method: hiding a color secret image, hiding a palette-based 256-color secret image, and hiding a grayscale image in a true color image. Secret data are protected by the conventional crypto system DES. We compare the image quality and hiding capacity of the proposed method with those of the scheme in Lin et al.’s scheme. According to the experimental results, the image quality of the proposed method is better than that of the Lin et al.’s scheme. In addition, annotation data can be hidden with the secret image in the host image. The hiding capacity of the proposed method is greater than that of other compared schemes. The experimental results show that the proposed method is a secure steganographic method that provides high hiding capacity and good image quality. 相似文献
14.
Di Fuqiang Zhang Minqing Huang Fangjun Liu Jia Kong Yongjun 《Multimedia Tools and Applications》2019,78(24):34541-34561
Multimedia Tools and Applications - Recently, reversible data hiding (RDH) in joint photographic experts group (JPEG) images has received a great deal of attention since the JPEG image is one of... 相似文献
15.
Multimedia Tools and Applications - A novel semantic compression based on vector quantization (VQ) and data hiding is proposed. A compact version of the original image is generated, and then, VQ... 相似文献
16.
17.
Chin-Chen Chang Yi-Hui Chen Chia-Chen Lin 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2009,13(4):321-331
Recently, embedding a large amount of secret data into gray-level and color images with low distortion has become an important
research issue in steganography. In this paper, we propose a data embedding scheme by using a well-known genetic algorithm,
block truncation code and modification direction techniques to embed secret data into compression codes of color images to
expand the variety of cover media. In the scheme, the common bitmap generation procedure of GA-AMBTC has been modified to
speed up the hiding procedure. Two embedding strategies are proposed to hide secret data into the common bitmap and the quantization
values in each block of the cover image. Experimental results confirm that the proposed scheme can provide high data capacity
with acceptable image quality of the stego-images. Moreover, the compression ratio of the scheme is exactly the same as that
of GA-AMBTC so that attackers cannot detect any trace of hidden data from the size of the modified compressed result. 相似文献
18.
A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images
Yang Yang Zhang Weiming Liang Dong Yu Nenghai 《Multimedia Tools and Applications》2018,77(14):18043-18065
Multimedia Tools and Applications - In this paper, we attempt to investigate the secure archiving of medical images which are stored on semi-trusted cloud servers, and focus on addressing the... 相似文献
19.
In this paper, we present a novel, reversible steganographic method, which can reconstruct an original image effectively after extracting the embedded secret data. The proposed reversible hiding method aims at BTC (block truncation coding)-compressed color images. Conventionally, each block of a color image compressed by BTC requires three bitmaps and three pairs of quantization levels for reconstruction. In order to improve the compression rate, a genetic algorithm (GA) is applied to find an approximate optimal common bitmap to replace the original three. The secret data then are embedded in the common bitmap and the quantization levels of each block use the properties of side matching and the order of these quantization levels to achieve reversibility. The experimental results demonstrate that the proposed method is practical for BTC-compressed color images and can embed more than three bits in each BTC-encoded block on average. 相似文献