High-capacity steganography: a global-adaptive-region discrete cosine transform approach

An increasing number of spatial and frequency domain data hiding techniques have been proposed to address the relatively low embedding capacities of image-based steganography. These techniques have brought promise of higher embedding capacities, albeit at the expense of lower perceptibility. This work proposes a new discrete cosine transform (DCT) approach for color image steganography and implements a global-adaptive-region (GAR) embedding scheme that allows for extremely high embedding capacities while maintaining enhanced perceptibility. The idea is to adapt the variable region size, used to hide the data, in each DCT block of the cover image to the amount of correlation of the image values in the corresponding block. We will demonstrate how this new technique achieves enhanced hiding capacities and perceptibility compared to other spatial, Fourier, and adaptive-region DCT based steganography schemes.

[1]  B. S. Manjunath,et al.  Robust image-adaptive data hiding using erasure and error correction , 2004, IEEE Transactions on Image Processing.

[2]  Reza Safabakhsh,et al.  High-capacity method for hiding data in the discrete cosine transform domain , 2013, J. Electronic Imaging.

[3]  George Pavlidis,et al.  JPEG2000 over noisy communication channels thorough evaluation and cost analysis , 2003, Signal Process. Image Commun..

[4]  Wilhelm Burger,et al.  Digital Image Processing - An Algorithmic Introduction using Java , 2008, Texts in Computer Science.

[5]  Chia-Chen Lin,et al.  DCT-based reversible data hiding scheme , 2009, ICUIMC '09.

[6]  A. Murat Tekalp,et al.  Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.

[7]  Min Wu,et al.  Data hiding in image and video .I. Fundamental issues and solutions , 2003, IEEE Trans. Image Process..

[8]  Motoi Iwata,et al.  Digital Steganography Utilizing Features of JPEG Images , 2004 .

[9]  Philip Ogunbona,et al.  High-capacity steganography using a shared colour palette , 2005 .

[10]  Ibrahim Kamel,et al.  On the embedding limits of the discrete cosine transform , 2015, Multimedia Tools and Applications.

[11]  Chin-Chen Chang,et al.  Reversible Steganographic Method with High Payload for JPEG Images , 2008, IEICE Trans. Inf. Syst..

[12]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[13]  Michiharu Niimi,et al.  A Large Capacity Steganography Using Color BMP Images , 1998, ACCV.

[14]  Anil K. Jain,et al.  Hiding a face in a fingerprint image , 2002, Object recognition supported by user interaction for service robots.

[15]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[16]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[17]  T. Rabie High-capacity steganography , 2013, 2013 6th International Congress on Image and Signal Processing (CISP).

[18]  N. Ahmed,et al.  Discrete Cosine Transform , 1996 .

[19]  P. Yip,et al.  Discrete Cosine Transform: Algorithms, Advantages, Applications , 1990 .

[20]  Chin-Chen Chang,et al.  Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..

[21]  Chin-Chen Chang,et al.  A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding , 2008, Soft Comput..

[22]  Lodevik Dyastotto Wardhana IMPLEMENTASI DAN ANALISIS VIDEO WATERMARKING DENGAN FORMAT VIDEO AVI BERBASIS LSB (LEAST SIGNIFICANT BIT) DAN SSB-4 (SYSTEM OF STEGANOGRAPHY USING BIT 4) , 2014 .

[23]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[24]  Chin-Chen Chang,et al.  Reversible hiding in DCT-based compressed images , 2007, Inf. Sci..

[25]  Chin-Chen Chang,et al.  A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..

[26]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[27]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[28]  Chang-Tsun Li,et al.  A palette-based image steganographic method using colour quantisation , 2005, IEEE International Conference on Image Processing 2005.

[29]  Yeuan-Kuen Lee,et al.  High capacity image steganographic model , 2000 .

[30]  Pierre-André Farine,et al.  Efficient Compressed Domain Target Image Search and Retrieval , 2005, CIVR.

[31]  Chin-Chen Chang,et al.  A Reversible Data Hiding Scheme Based on Side Match Vector Quantization , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[32]  Tamer F. Rabie,et al.  Digital Image Steganography: An FFT Approach , 2012, NDT.

[33]  Christoph Busch,et al.  Integer DCT-based reversible watermarking for images using companding technique , 2004, IS&T/SPIE Electronic Imaging.

[34]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[35]  Pierre-André Farine,et al.  Low Complexity Image Matching in the Compressed Domain by using the DCT-phase , 2004 .

[36]  Kevin Curran,et al.  An Evaluation of Steganography Methods , 2003 .

[37]  Chia-Chen Lin,et al.  HighCapacity Data Hiding Scheme for DCT-based Images , 2010, J. Inf. Hiding Multim. Signal Process..

[38]  Kuo-Liang Chung,et al.  A novel SVD- and VQ-based image hiding scheme , 2001, Pattern Recognit. Lett..

[39]  Tamer F. Rabie,et al.  Frequency-domain data hiding based on the Matryoshka principle , 2007, Int. J. Adv. Media Commun..