A secure data hiding scheme for two-color images

In this paper we propose a new steganography scheme for hiding a piece of critical information in a host binary image (such as facsimiles). A secret key and a weight matrix are used to protect the hidden data. Given an image block of size m/spl times/n, our scheme can hide as many as [log/sub 2/(mn+1)] bits of data in the image by changing at most 2 bits in the image. This scheme, as compared to an existing scheme by M. Y. Wu et al. 1998), can provide higher security, embed more data, and maintain higher quality of the host image.

[1]  Ping Wah Wong,et al.  A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[2]  Frank Bossen,et al.  Digital watermarking of color images using amplitude modulation , 1998, J. Electronic Imaging.

[3]  M. Y. Wu,et al.  A Novel Data Embedding Method for Two-Color Facsimile Images , 1998 .

[4]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..

[5]  Gustavus J. Simmons,et al.  Results concerning the bandwidth of subliminal channels , 1998, IEEE J. Sel. Areas Commun..

[6]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[7]  Ross J. Anderson Stretching the Limits of Steganography , 1996, Information Hiding.

[8]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[9]  William Stallings,et al.  Cryptography and network security , 1998 .

[10]  D. Kahn The codebreakers : the story of secret writing , 1968 .

[11]  Frank Bossen,et al.  Digital signature of color images using amplitude modulation , 1997, Electronic Imaging.

[12]  Walter Bender,et al.  Information Hiding to Foil the Casual Counterfeiter , 1998, Information Hiding.

[13]  Peter Wayner Should encryption be regulated: politics, not technology, may hamstring the use of data encryption in the U.S. , 1993 .

[14]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[15]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[16]  Gustavus J. Simmons,et al.  The history of subliminal channels , 1996, IEEE J. Sel. Areas Commun..

[17]  Ping Wah Wong,et al.  A Watermark for Image Integrity and Ownership Verification , 1998, PICS.

[18]  Ingo Stierand,et al.  Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best , 1996, Information Hiding.