An innovative information hiding technique utilizing cumulative peak histogram regions
Tóm tắt
The purpose of this paper is to develop an innovative information hiding algorithm.
The proposed algorithm is based on image histogram statistics. Cumulative‐peak histogram regions are utilized to hide multiple bits of the secret message by performing histogram bin substitution. The embedding capacity, otherwise known as payload, and peak signal to noise ratio (PSNR), as well as security, are the main metrics used to evaluate the performance of the proposed algorithm.
According to the obtained results, the proposed algorithm shows high embedding capacity and security at comparable PSNR compared with existing hiding information techniques.
The simplicity, security, random distribution of embedding pixels, and on‐demand high capacity are the key advantages of the proposed approach.
Từ khóa
Tài liệu tham khảo
Alturki, F. and Mersereau, R. (2001), “Secure blind image steganographic technique using discrete Fourier transform”, Proc. International Conference on Image Processing, Vol. 2, pp. 542‐5.
Barni, M. and Bartolini, F. (2004), Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications, Marcel Dekker, New York, NY.
Cao, Y., Zhao, X. and Feng, D. (2012), “Video steganalysis exploiting motion vector reversion‐based features”, IEEE Signal Processing Letters, Vol. 19 No. 1, pp. 35‐8.
Cetin, O., Akar, F., Ozcerit, A.T., Cakiroglu, M. and Bayilmis, C. (2012), “A blind steganography method based on histograms on video files”, The Imaging Science Journal, Vol. 60 No. 2, pp. 75‐82.
Chan, C.K. and Cheng, L.M. (2004), “Hiding data in image by simple LSB substitution”, Pattern Recognition, Vol. 37 No. 3, pp. 469‐74.
Chang, C.C. and Tseng, H.W. (2004), “A steganographic method for digital images using side match”, Pattern Recognition Letters, Vol. 25 No. 12, pp. 1431‐7.
Chang, C.‐C., Chen, T.‐S. and Chung, L.‐Z. (2002), “A steganographic method based upon JPEG and quantization table modification”, Information Sciences, Vol. 141 Nos 1/2, pp. 123‐38.
Chang, C.‐C., Kieu, T.D. and Chou, Y.‐C. (2008), “Using nearest covering codes to embed secret information in grayscale images”, Proc. 2nd International Conference on Ubiquitous Information Management and Communication, Korea, pp. 315‐20.
Chang, C.‐C., Lin, C. and Wang, Y. (2006), “New image steganographic methods using run‐length approach”, Information Sciences, Vol. 176 No. 22, pp. 3393‐408.
Cheddad, A., Condell, J., Curran, K. and Mc Kevitt, P. (2010), “Digital image steganography: survey and analysis of current methods”, Signal Processing, Vol. 90 No. 3, pp. 727‐52.
Chen, P.‐Y. and Lin, H.‐J. (2006), “A DWT based approach for image steganography”, International Journal of Applied Science and Engineering, Vol. 4 No. 3, pp. 275‐90.
Fallahpour, M. and Sedaaghi, M.H. (2007), “High capacity lossless data hiding based on histogram modification”, IEICE Electronic Express, Vol. 4 No. 7, pp. 205‐10.
Hmood, A.K., Jalab, H.A., Kasirun, Z.M., Zaidan, B.B. and Zaidan, A.A. (2010), “On the capacity and security of steganography approaches: an overview”, Journal of Applied Sciences, Vol. 10 No. 16, pp. 1825‐33.
Jain, A.K. (1989), Fundamentals of Digital Image Processing, Prentice‐Hall, Upper Saddle, NJ.
Lakshmi Narayanan, K., Prabakaran, G. and Bhavani, R. (2012), “A high capacity video steganography based on integer wavelet transform”, Journal of Computer Applications, Vol. 5 No. 4, pp. 358‐65.
Lee, C.‐F. and Chen, H.‐L. (2007), “High‐capacity data hiding using virtual window partition”, Proc. Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 315‐18.
Lu, C.‐S. (2004), Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property, Idea Group Publishing, Hershey, PA.
Potdar, V.M. and Chang, E. (2004), “Gray level modification steganography for secret communication”, Proc. IEEE 2nd International Conference on Industrial Informatics, Germany, pp. 223‐8.
Provos, N. and Honeyman, P. (2003), “Hide and seek: an introduction to steganography”, IEEE Security and Privacy, Vol. 1 No. 3, pp. 32‐44.
Sutaone, M.S. and Khandare, M.V. (2008), “Image based steganography using LSB insertion technique”, Proc. IET International Conference on Wireless, Mobile and Multimedia Networks, Mumbai, India, pp. 146‐51.
Thien, C.C. and Lin, J.C. (2003), “A simple and high‐hiding capacity method for hiding digit‐by‐digit data in images based on modulus function”, Pattern Recognition, Vol. 36 No. 12, pp. 2875‐81.
Wang, S.‐J. (2005), “Steganography of capacity required using modulo operator for embedding secret image”, Applied Mathematics and Computation, Vol. 164 No. 1, pp. 99‐116.
Wei, L.X., Yang, P. and Yang, X.Y. (2012), “A secure video steganography based on ECC and DCT”, Advanced Materials Research, Vol. 433‐440, pp. 5378‐83.
Wu, D.C. and Tsai, W.H. (2003), “A steganographic method for images by pixel‐value differencing”, Pattern Recognition Letters, Vol. 24 Nos 9/10, pp. 1613‐26.
Wu, H.C., Wu, N.I., Tsai, C.S. and Hwang, M.S. (2005), “Image steganographic scheme based on pixel‐value differencing and LSB replacement methods”, IEE Proceedings of Vision, Image and Signal Processing, Vol. 152 No. 5, pp. 611‐15.
Wu, N.‐I. and Hwang, M. (2007), “Data hiding: current status and key issues”, International Journal of Network Security, Vol. 4 No. 1, pp. 1‐9.
Zhicheng, N., Shi, Y.Q., Ansari, N. and Su, W. (2006), “Reversible data hiding”, IEEE Trans. Circuits Syst. Video Technology, Vol. 16 No. 3, pp. 354‐62.
Zollner, J., Federrath, H., Klimant, H., Pfitzman, A., Piotraschke, R., Westfeld, A., Wicke, G. and Wolf, G. (1998), “Modeling the security of steganographic systems”, Proc. 2nd Information Hiding Workshop, Germany, pp. 344‐54.
Ge, X., Jiao, R., Tian, H. and Wang, J. (2006), “Research on information hiding”, US‐China Education Review, Vol. 5 No. 3, pp. 77‐81.