A Reversible Steganography Suitable for Embedding Small Amounts of Data

A reversible information hiding scheme that is suitable for embedding small amounts of data is proposed in this paper. The secret data are transformed to base-k data stream, and each number is embedded into a pixel pair if the pixels' difference is within a certain range. Referring a pre-determined table, the gray values of the pixel pair are modified so as to carry the secret number. In order to distinguish the secret-carry pairs from no-secret-carry pairs, the differences of the pixel pairs without secret data embedded are expanded by modification of the difference histogram. The proposed information hiding scheme has flexible embedding capacity and low overhead. The peak signal-to-noise ratio (PSNR) is greater than those of existing methods that are based on histogram modification when the embedding capacity is low. Experimental results showed that the proposed scheme provides good embedding performances for small amounts of embedded data.

[1]  Chin-Chen Chang,et al.  Reversible Data Hiding Based on Histogram Modification of Pixel Differences , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[2]  Mehdi Fallahpour,et al.  High capacity lossless data hiding based on histogram modification , 2007, IEICE Electron. Express.

[3]  Osamah M. Al-Qershi,et al.  Two-dimensional difference expansion (2D-DE) scheme with a characteristics-based threshold , 2013, Signal Process..

[4]  A. Murat Tekalp,et al.  Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.

[5]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[6]  R. Crandall,et al.  Some Notes on Steganography , 1999 .

[7]  Tieyong Zeng,et al.  Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection , 2011, IEEE Transactions on Image Processing.

[8]  M. Mohammed Sathik,et al.  A Novel DWT Based Blind Watermarking for Image Authentication , 2012, Int. J. Netw. Secur..

[9]  Jessica J. Fridrich,et al.  Wet paper codes with improved embedding efficiency , 2006, IEEE Transactions on Information Forensics and Security.

[10]  Chin-Chen Chang,et al.  An Information Hiding Scheme Using Sudoku , 2008, 2008 3rd International Conference on Innovative Computing Information and Control.

[11]  Mohammad Reza Keyvanpour,et al.  Blind image watermarking method based on chaotic key and dynamic coefficient quantization in the DWT domain , 2013, Math. Comput. Model..

[12]  Min-Shiang Hwang,et al.  The Study of Data Hiding in Medical Images , 2012, Int. J. Netw. Secur..

[13]  Wien Hong,et al.  Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique , 2013, Inf. Sci..

[14]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[15]  Hsien-Wen Tseng,et al.  Prediction-based reversible data hiding , 2009, Inf. Sci..

[16]  G. N. Swamy,et al.  Sensitive Digital Image Watermarking for Copyright Protection , 2013, Int. J. Netw. Secur..

[17]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[18]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[19]  Tung-Shou Chen,et al.  Steganography Using Sudoku Revisited , 2008, 2008 Second International Symposium on Intelligent Information Technology Application.

[20]  Jessica J. Fridrich,et al.  Lossless data embedding for all image formats , 2002, IS&T/SPIE Electronic Imaging.

[21]  Xinpeng Zhang,et al.  Dynamical running coding in digital steganography , 2006, IEEE Signal Processing Letters.

[22]  Tung-Shou Chen,et al.  A Minimal Euclidean Distance Searching Technique for Sudoku Steganography , 2008, 2008 International Symposium on Information Science and Engineering.