Improved Exploiting Modification Direction Method by Modulus Operation

The EMD method proposed by Zhang and Wang fully exploited modification directions. Modifications in different directions were used to represent different secret data. According to the experimental results, the highest capacity was demonstrated in the 5-ary notational system, where only one secret digit is embedded for each two pixels. But this is an inefficient method because it can be hidden more secret data without revealing to the human visual system. To improve an embedding capacity, Chang et al. proposed two-stage EMD method, Lee et al. restricted to 8-ary embedding for the EMD method, and also Lee et al. segmented the pair of cover data into two parts to embed higher secret data. But still have a room for hiding more secret data. This paper proposes an improved method of the EMD method to hide more secret data while maintaining a high PSNR value. The proposed method can embed secret bit on every pixel of cover data. The experimental results demonstrate that the proposed method has a high capacity and good visual quality.

[1]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[2]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[3]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[4]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[5]  Andrew D. Ker Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.

[6]  Ki-Hyun Jung,et al.  The Hiding of Secret Data Using the Run Length Matching Method , 2007, KES-AMSTA.

[7]  Cheng-Hsing Yang,et al.  Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.

[8]  Sankar K. Pal,et al.  International Journal of Signal Processing , Image Processing and Pattern Recognition , 2008 .

[9]  Chin-Chen Chang,et al.  Reversible information hiding for VQ indices based on locally adaptive coding , 2009, J. Vis. Commun. Image Represent..

[10]  A. Bovik,et al.  A universal image quality index , 2002, IEEE Signal Processing Letters.

[11]  Hannes Federrath,et al.  Modeling the Security of Steganographic Systems , 1998, Information Hiding.

[12]  Chin-Chen Chang,et al.  Improvements of EMD Embedding for Large Payloads , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[13]  Te-Ming Tu,et al.  Adaptive image steganographic scheme based on Tri-way Pixel-Value Differencing , 2007, 2007 IEEE International Conference on Systems, Man and Cybernetics.

[14]  Chin-Chen Chang,et al.  A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[15]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[16]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[17]  Chin-Chen Chang,et al.  An improvement of EMD embedding method for large payloads by pixel segmentation strategy , 2008, Image Vis. Comput..

[18]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.