HighCapacity Data Hiding Scheme for DCT-based Images

To enhance the hiding capacity of DCT-based images, in this paper we pro- pose a new data hiding scheme based on a notation transformation concept. Without considering the reversibility function, experimental results confirm that the hiding capac- ity provided by our designed data hiding strategy is not only higher than that provided by the Iwata et al.'s, Chang et al.'s and Lin et al.'s schemes but also Lin and Shiu's scheme. Moreover, the image quality of stego-images with our proposed scheme remains above 30 dB for most test images when the hiding capacity is above 90000 bits, which is better than the best image quality offered by existing DCT-based loss or lossless data hiding schemes. Our proposed scheme also inherits the advantage of DCT-based data hiding scheme; that is the security of the hidden data is guaranteed because the secret data is embedded into DCT coefficients of the cover image. Based on the results of our proposed scheme, our future work is to add the reversibility function back into the data hiding scheme to expand the applications of our proposed scheme.

[1]  Chin-Chen Chang,et al.  Reversible Steganographic Method with High Payload for JPEG Images , 2008, IEICE Trans. Inf. Syst..

[2]  Kuo-Liang Chung,et al.  A novel SVD- and VQ-based image hiding scheme , 2001, Pattern Recognit. Lett..

[3]  B. Dasarathy Image data compression - block truncation coding , 1995 .

[4]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[5]  Zhicheng Ni,et al.  Distortionless data hiding based on integer wavelet transform , 2002 .

[6]  Chin-Chen Chang,et al.  A Reversible Data Hiding Scheme Based on Side Match Vector Quantization , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[7]  Hitoshi Kiya,et al.  A Method of Embedding Binary Data into JPEG Bitstreams , 2002, Systems and Computers in Japan.

[8]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[9]  A. Murat Tekalp,et al.  Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.

[10]  Mohammed Ghanbari,et al.  Standard Codecs: Image Compression to Advanced Video Coding , 2003 .

[11]  Chin-Chen Chang,et al.  Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..

[12]  Chin-Chen Chang,et al.  A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding , 2008, Soft Comput..

[13]  Motoi Iwata,et al.  Digital Steganography Utilizing Features of JPEG Images , 2004 .

[14]  Chin-Chen Chang,et al.  Reversible hiding in DCT-based compressed images , 2007, Inf. Sci..

[15]  Rui Du,et al.  Invertible authentication watermark for JPEG images , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[16]  Chia-Chen Lin,et al.  DCT-based reversible data hiding scheme , 2009, ICUIMC '09.

[17]  A. Murat Tekalp,et al.  Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.

[18]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[19]  Yeuan-Kuen Lee,et al.  High capacity image steganographic model , 2000 .

[20]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..

[21]  Chin-Chen Chang,et al.  A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..