Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector

Data hiding technique can facilitate security and the safe transmission of important information in the digital domain, which generally requires a high embedding payload and good stego image quality. Recently, a steganographic framework known as wet paper coding has been utilized as an effective strategy in image hiding to achieve the requirements of high embedding payload, good quality and robust security. In this paper, besides employing this mechanism as a fundamental stage, we take advantage of two novel techniques, namely, an efficient n-indicator and a fuzzy edge detector. The first is to increase the robustness of the proposed system to guard against being detected or traced by the statistics methods while allowing the receiver without knowledge of secret data positions to retrieve the embedded information. The second is to improve the payload and enhance the quality of stego image. The experimental results show that our proposed scheme outperforms its ability to reduce the conflict among three steganography requirements.

[1]  George J. Klir,et al.  Fuzzy sets, uncertainty and information , 1988 .

[2]  Y. Kuo,et al.  A new fuzzy edge detection method for image enhancement , 1997, Proceedings of 6th International Fuzzy Systems Conference.

[3]  Rainer Böhme,et al.  Exploiting Preserved Statistics for Steganalysis , 2004, Information Hiding.

[4]  Lotfi A. Zadeh,et al.  Fuzzy Sets , 1996, Inf. Control..

[5]  Jeng-Shyang Pan,et al.  The optimized copyright protection system with genetic watermarking , 2008, Soft Comput..

[6]  T.M. Amarunnishad,et al.  A Fuzzy Complement Edge Operator , 2006, 2006 International Conference on Advanced Computing and Communications.

[7]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[8]  Jiri Fridrich,et al.  Secure Steganographic Methods for Palette Images , 1999, Information Hiding.

[9]  Antje Winkler,et al.  Embedding with syndrome coding based on BCH codes: The corrected version of this paper is now available as full text. To view the original document as presented in the printed proceedings (with its errors), download the supplemental file , 2006, MM&Sec '06.

[10]  James C. Bezdek,et al.  A geometric approach to edge detection , 1998, IEEE Trans. Fuzzy Syst..

[11]  Jessica J. Fridrich,et al.  Efficient Wet Paper Codes , 2005, Information Hiding.

[12]  Min Wu,et al.  Data hiding in digital binary image , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[13]  Thomas S. Huang,et al.  Image processing , 1971 .

[14]  Jessica J. Fridrich,et al.  Wet paper codes with improved embedding efficiency , 2006, IEEE Transactions on Information Forensics and Security.

[15]  Jessica J. Fridrich,et al.  Writing on wet paper , 2005, IEEE Transactions on Signal Processing.

[16]  Huaiqing Wang,et al.  Cyber warfare: steganography vs. steganalysis , 2004, CACM.

[17]  Jessica J. Fridrich,et al.  Constructing Good Covering Codes for Applications in Steganography , 2008, Trans. Data Hiding Multim. Secur..

[18]  Hamid R. Tizhoosh,et al.  Fast fuzzy edge detection , 2002, 2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622).

[19]  Fabrizio Russo,et al.  FIRE operators for image processing , 1999, Fuzzy Sets Syst..

[20]  Gregory A. Kabatiansky,et al.  Information hiding by coverings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).

[21]  E.E. Pissaloux,et al.  Image Processing , 1994, Proceedings. Second Euromicro Workshop on Parallel and Distributed Processing.

[22]  Milan Sonka,et al.  Image Processing, Analysis and Machine Vision , 1993, Springer US.

[23]  Hsiang-Cheh Huang,et al.  Genetic Watermarking for Zerotree-Based Applications , 2008 .

[24]  Elke Franz Steganography Preserving Statistical Properties , 2002, Information Hiding.

[25]  Yu-Chee Tseng,et al.  A secure data hiding scheme for binary images , 2002, IEEE Trans. Commun..

[26]  Xinpeng Zhang,et al.  Efficient double-layered steganographic embedding , 2007 .

[27]  Jessica J. Fridrich,et al.  Matrix embedding for large payloads , 2006, IEEE Transactions on Information Forensics and Security.

[28]  V. K. Govindan,et al.  Improving BTC image compression using a fuzzy complement edge operator , 2008, Signal Process..