In this paper, we propose a hybrid data hiding method to embed three secret bits to four cover pixels. In the proposed method, a Hamming code word consists of three parity check bits whose values are identical to three secret bits and four data bits whose values are derived by performing XOR Function on four cover pixels. In order to keep the Hamming code word satisfying the condition of (7, 4) Hamming Code, at most one cover pixel would be modified. If the modified bit is a data bit of the code word, it is directly modified, and three secret bits can be embedded to the cover pixels successfully. However, if the modified bit is a parity check bit, namely the secret bit, instead of modifying the parity check bit, two cover pixels are needed to be modified while the proposed method only requires one bit modification by adopting the XOR Function. Our hybrid method only need to modify one cover pixel by adding/subtracting its values to/from one, and two resultant bits of XOR Function are able to be adjusted to the desired bits. In this way, the number of modified pixels can be further reduced. The experimental results show that the number of pixels that undergo modification during the embedding phase is fewer by using the proposed method than using the other two related method in most cases.
[1]
Lee-Ming Cheng,et al.
Hiding data in images by simple LSB substitution
,
2004,
Pattern Recognit..
[2]
Ja-Chen Lin,et al.
Image hiding by optimal LSB substitution and genetic algorithm
,
2001,
Pattern Recognit..
[3]
Ching-Yun Chang,et al.
Hiding data in parity check bit
,
2010,
ICUIMC '10.
[4]
Andreas Westfeld,et al.
F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis
,
2001
.
[5]
Andrew D. Ker.
Improved Detection of LSB Steganography in Grayscale Images
,
2004,
Information Hiding.
[6]
Chi-Shiang Chan.
On Using LSB Matching Function for Data Hiding in Pixels
,
2009,
Fundam. Informaticae.
[7]
Chin-Chen Chang,et al.
Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy
,
2003,
Pattern Recognit..
[8]
Andreas Westfeld,et al.
F5-A Steganographic Algorithm
,
2001,
Information Hiding.
[9]
J. Mielikainen.
LSB matching revisited
,
2006,
IEEE Signal Processing Letters.