Signed digit data hiding scheme

The EMD (Exploiting Modification Direction) method by Zhang and Wang uses ( 2 n + 1 )-ary notation to achieve secret message embedding into a cover image. However, the maximum capacity of this method is 1.16 ? bpp for cover pixel number n = 2 . Its embedding capacity rapidly decreases when selected pixels increase. In order to improve this shortcoming, a new data hiding scheme based on MSD (Modified Signed-Digit) is proposed. There are three major contributions in this proposed scheme. The first is only ? n 2 ? pixels will be modified and the value is +1 or -1 when the group has n pixels. Secondly, the embedded capacity maintains at least 1 ? bpp when n is increasing. The last is the stego image quality is better than 52 ? dB when the cover image's pixels are greater than 4 for each group.

[1]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[2]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[3]  Alimohammad Latif An Adaptive Digital Image Watermarking Scheme using Fuzzy Logic and Tabu Search , 2013, J. Inf. Hiding Multim. Signal Process..

[4]  C. Mitchell,et al.  Minimum weight modified signed-digit representations and fast exponentiation , 1989 .

[5]  Shu-Chuan Chu,et al.  Invariability of Mean Value Based Reversible Watermarking , 2013, J. Inf. Hiding Multim. Signal Process..

[6]  Jessica J. Fridrich,et al.  Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.

[7]  Chin-Chen Chang,et al.  A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[8]  Luxi Yang,et al.  Optimal pilot sequence design for channel estimation in MIMO OFDM systems , 2006, IEEE Commun. Lett..

[9]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[10]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[11]  Xinpeng Zhang,et al.  Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications , 2011, STA.

[12]  Kenneth H. Rosen Elementary Number Theory: And Its Applications , 2010 .

[13]  Chin-Chen Chang,et al.  A steganographic scheme by fully exploiting modification directions , 2011, Expert Syst. Appl..

[14]  Wen-Chung Kuo,et al.  Data hiding schemes based on the formal improved exploiting modification direction method , 2013 .

[15]  W. Kuo,et al.  Data hiding based on generalised exploiting modification direction method , 2013 .

[16]  Chin-Chen Chang,et al.  A novel multi-group exploiting modification direction method based on switch map , 2012, Signal Process..