Czasopismo
2012
|
Vol. 20, No. 2
|
126-133
Tytuł artykułu
Autorzy
Wybrane pełne teksty z tego czasopisma
Warianty tytułu
Języki publikacji
Abstrakty
In this paper, we propose a stenography scheme based on predictive differencing to embed data in a grey-image. In order to promote the embedding capacity of pixel-value differencing (PVD), we use differencing between a predictive value and an input pixel as the predictive differencing to embed the message where a predictive value is calculated by using various predictors. If the predictive differencing is large, then it means that the input pixel is located in the edge area and, thus, has a larger embedding capacity than the pixel in a smooth area. The experimental result shows that our proposed scheme is capable of providing greater embedding capacity and high quality of stego-images then previous works. Furthermore, we have also applied various predictors to evaluate our proposed scheme.
Czasopismo
Rocznik
Tom
Strony
126-133
Opis fizyczny
Bibliogr. 23 poz., il., wykr.
Twórcy
autor
autor
- Department of Computer Science and Engineering, National Sun-sen University, Kaohsiung, Tajwan, 804 R.O.C.
Bibliografia
- [1] D. Artz: Digital steganographic: hiding data within data. IEEE Internet Comput. 5, 75-80 (2001).
- [2] Y. H. Chu and S. Chang: Dynamical cryptography based on synchronized chaotic systems. IEE Electronics Lett. 35, 974-975 (1999).
- [3] R. Riverst, A. Shamir, and L. Adleman: A method for obtaining digital signatures and public-key cryptosystem. Commu. ACM 21, 120-126 (1978).
- [4] Y. K. Lee and L. H. Chen: High capacity image steganography model. IEE P-Vis. Image Sign. 147, 288-294 (2000).
- [5] T. D. Kieu, Z. H. Wang, C. C. Chang, and C. M. Li: A sudokubased wep paper hiding scheme. Int. J. Smart Home (IJSH) 3, 1-12 (2009).
- [6] C. C. Chang, C. F. Lee, and L. Y. Chuang: Embedding secretbinary message using locally adaptive data compression coding. Int. J. Comput. Sci. Eng. 31, 55-61 (2009).
- [7] C. C. Chang, C. Y. Lin, and Y. Z. Wang: New image steganographic methods using runlength approach. Inform. Sciences 176, 3393-3408 (2006).
- [8] C. H. Yang: Inverted pattern approach to improve image quality of information hiding by LSB substitution. Pattern Recogn. 41, 2674-2683 (2008).
- [9] C. K. Chan and L. M. Chen: Hiding data in images by simple LSB substitution. Pattern Recogn. 37, 469-474 (2004).
- [10] R. Z. Wang, C. F. Lin, and J. C. Lin: Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn. 34, 671-683 (2000).
- [11] X. Li, B. Yang, D. F. Cheng, and T. Y. Zeng: A generalization of LSB matching. IEEE Signal Proc. Let. 16, 69-72 (2009).
- [12] C. C. Chang and H. W. Tseng: A steganographic method for digital images using side match. Pattern Recogn. Lett. 25, 1431-1437 (2004).
- [13] D. C. Wu and W. H. Tsai: A steganographic method for images by pixel-value differencing. Pattern Recogn. Lett. 24, 1613-1626 (2003).
- [14] C. C. Chang, J. C. Chuang, and Y. C. Hu: Spatial domain image hiding scheme using pixel-value differencing. Fundam. Inform. 70, 171-184 (2006).
- [15] H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang: Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE P.- Vis. Image Sign. 152, 611-615 (2005).
- [16] J. C. Liu and M. H. Shih: Generalizations of pixel-value differencing steganography for data hiding in images. Fundam. Inform. 83, 319-335 (2008).
- [17] C. M. Wang, N. I. Wu, C. S. Tsai, and M. S. Hwang: A high quality steganography method with pixel-value differencing and modulus function. J. Syst. Software 81, 150-158 (2008).
- [18] S. K. Yip, O. C. Au, H. M. Wong, and C. W. Ho: Generalized lossless data hiding by multiple predictors. Proc. IEEE Int. Symp. Circ. Syst., Island of Kos, 21-24 (2006).
- [19] H. W. Tseng and C. P. Hsieh: Prediction-based reversible data hiding. Inform. Sciences 179, 2460-2469 (2009).
- [20] E. A. Edirisinghe, S. Bedi, and C. Grecos: Local texture adaptive JPEG near lossless image compression with improve texture classification. Proc. IASTED Int. Conf. on Visualization, Imaging and Image Processing, Marbella, 340-346 (2001).
- [21] X. P. Zhang and S. Z. Wang: Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recogn. Lett. 25, 331-339 (2004).
- [22] A. Westfeld and A. Pfitzmann: Attacks on steganographic system. Lect. Notes Comput. Sc. 1768, 61-75 (2000).
- [23] J. Fridrich, M. Goljan, and R. Du: Reliable detection of LSB stegnography in greyscale and colour images. Proc. of Advances in Computing and Communications (ACM) Workshop on Multimedia and Security, Ottawa, 27-30 (2001).
Typ dokumentu
Bibliografia
Identyfikatory
Identyfikator YADDA
bwmeta1.element.baztech-article-BWAD-0027-0003