An Efficient Hybrid Steganography Method Based on Edge Adaptive and Tree Based Parity Check

A major requirement for any steganography method is to minimize the changes that are introduced to the cover image by the data embedding process. Since the Human Visual System (HVS) is less sensitive to changes in sharp regions compared to smooth regions, edge adaptive has been proposed to discover edge regions and enhance the quality of the stego image as well as improve the embedding capacity. However, edge adaptive does not apply any coding scheme, and hence it embedding efficiency may not be optimal. In this paper, we propose a method that enhances edge adaptive by incorporating the Tree-Based Parity Check (TBPC) algorithm, which is a well-established coding-based steganography method. This combination enables not only the identification of potential pixels for embedding, but it also enhances the embedding efficiency through an efficient coding mechanism. More specifically, the method identifies the embedding locations according to the difference value between every two adjacent pixels, that form a block, in the cover image, and the number of embedding bits in each block is determined based on the difference between its two pixels. The incorporation of TBPC minimizes the modifications of the cover image, as it changes no more than two bits out of seven pixel bits when embedding four secret bits. Experimental results show that the proposed scheme can achieve both large embedding payload and high embedding efficiency.

[1]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[2]  Samarjit Kar,et al.  Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015 , 2013 .

[3]  Oscar C. Au,et al.  Data Hiding with Tree Based Parity Check , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[4]  Aakanksha Pandey,et al.  Steganography and Its Technique: Technical Overview , 2013 .

[5]  Wen-Guey Tzeng,et al.  An Optimal Data Hiding Scheme With Tree-Based Parity Check , 2011, IEEE Transactions on Image Processing.

[6]  Jessica J. Fridrich,et al.  On estimation of secret message length in LSB steganography in spatial domain , 2004, IS&T/SPIE Electronic Imaging.

[7]  Vyacheslav N. Yarmolik,et al.  Cryptography and Steganography: teaching experience , 2005, Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems.

[8]  Nabin Ghoshal,et al.  Steganography Based Visual Cryptography (SBVC) , 2013 .

[9]  Jiwu Huang,et al.  A more secure steganography based on adaptive pixel-value differencing scheme , 2011, Multimedia Tools and Applications.

[10]  R. M. Samant,et al.  Data hiding in gray-scale images using pixel value differencing , 2011, ICWET.

[11]  Kevin Curran,et al.  An evaluation of image based steganography methods , 2006, Multimedia Tools and Applications.

[12]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[13]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998 .

[14]  Weiwei Liu,et al.  Adaptive steganography based on block complexity and matrix embedding , 2013, Multimedia Systems.

[15]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[16]  Jessica J. Fridrich,et al.  Steganalysis of LSB Replacement Using Parity-Aware Features , 2012, Information Hiding.

[17]  N. Verma,et al.  Review of steganography techniques , 2011, ICWET.

[18]  Jessica J. Fridrich,et al.  Matrix embedding for large payloads , 2006, IEEE Transactions on Information Forensics and Security.