PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Generalizations of Pixel-Value Differencing Steganography for Data Hiding in Images

Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Generalizations of the pixel-value differencing (PVD) method for data hiding in gray-level images are proposed. Two extensions of the PVD method are analyzed: the block-based approach and the Haar-based approach. For the block-based PVD, the cover image is divided into non-overlapping horizontal or square blocks of n pixels. In each block, n-1 differences are calculated between consecutive pixels. These differences are classified to embed the secret message. For the Haar-based PVD, the 2-D integer Haar wavelet is applied to decomposed the cover image. The high-frequency components are used to hide message. Higher level of Haar decomposition allows more bits to be embedded. For both proposed generalizations, the capacity of the embedded message is significantly increased. Moreover, both generalizations are invulnerable to the RS-diagram and histogram steganalysis.
Wydawca
Rocznik
Strony
319--335
Opis fizyczny
bibliogr. 14 poz., fot., tab., wykr.
Twórcy
autor
autor
  • Department of Computer Science and Information Engineering, National Chi Nan University, Puli, Nantou, Taiwan 545, R.O.C, jcliu@ncnu.edu.tw
Bibliografia
  • [1] Wu, D. C, Tsai, W. H.: A steganographic method for images by pixel-value differencing, Pattern Recognition Letters, vol. 24, pp. 1613 - 1626, 2003.
  • [2] Zhang, X., Wang, S.: Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security, Pattern Recognition Letters, vol. 25, pp. 331 - 339, 2004.
  • [3] Potdar, V., Chang, E.: Grey level modification steganography for secret communication, Proceedings of IEEE Conference on Industrial Informatics, pp. 223 - 228, June 2004.
  • [4] Wu, M., Liu, B.: Data hiding in image and video: part I - fundamental issues and solutions, IEEE Trans, on Image Processing, vol. 12, pp. 685 - 695, June 2003.
  • [5] Cox, I. J., Miller, M. L., Bloom, J. A.: Digital Watermarking, Academic Press, 2002.
  • [6] Marsy, M., Ramos, M., Hemami, S. S.: Robust data hiding using psychovisual thresholding, Proc. IEEE International Conference on Image Processing, vol. 1, pp. 593 - 596, September 2000.
  • [7] Mallat, S.: A Wavelet Tour of Signal Processing, Academic Press, 1998.
  • [8] Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color, and gray-scale images, IEEE Multimedia, vol. 8, Issue 4, pp. 22 - 28, October - December. 2001.
  • [9] Wang, Z., Bovik, A. C: A universal image quality index, IEEE Signal Processing Letters, vol. 9, pp. 81 - 84, March 2002.
  • [10] Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding, IBM System J., 35 (3 - 4), pp. 313 - 336, 1996.
  • [11] Girod, B.: What's wrong with mean-squared error?, Digital Images and Human Vision, MIT Press, 1993.
  • [12] Dewitte, S., Cornelis, J.: Loseless integer wavelet transform, IEEE Signal Processing letter, vol. 4, no. 6, June 1997.
  • [13] Calderbank, A. R., Daubechies, I., Sweldens, W, Yeo B.: Wavelet transforms that map integers to integers, Appl. Comput. Harmon. Analysis, pp. 332 - 369, 1998.
  • [14] Simmons, G. J.: The prisoner's problem and the subliminal channel, Proceedings ofCRYPTO'83,1984
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS5-0015-0053
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.