Exploring pixel-value differencing and base decomposition for low distortion data embedding

This paper presents a low distortion data embedding method using pixel-value differencing and base decomposition schemes. The pixel-value differencing scheme offers the advantage of conveying a large amount of payload, while still maintaining the consistency of an image characteristic after data embedding. We introduce the base decomposition scheme, which defines a base pair for each degree in order to construct a two-base notational system. This scheme provides the advantage of significantly reducing pixel variation encountered due to secret data embedding. We analyze the pixel variation and the expected mean square error caused by concealing with secret messages. The mathematical analysis shows that our scheme produces much smaller maximal pixel variations and expected mean square error while producing a higher PSNR. We evaluate the performance of our method using 6 categories of metrics which allow us to compare with seven other state-of-the-art algorithms. Experimental statistics verify that our algorithm outperforms existing counterparts in terms of lower image distortion and higher image quality. Finally, our scheme can survive from the RS steganalysis attack and the steganalytic histogram attack of pixel-value difference. We conclude that our proposed method is capable of embedding large amounts of a message, yet still produces the embedded image with very low distortion. To the best of our knowledge, in comparison with the current seven state-of-the-art data embedding algorithms, our scheme produces the lowest image distortion while embedding the same or slightly larger quantities of messages.

[1]  Jessica J. Fridrich,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..

[2]  Xinpeng Zhang,et al.  Steganography using multiple-base notational system and human vision sensitivity , 2005, IEEE Signal Process. Lett..

[3]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[4]  Rashid Ansari,et al.  Robust Data Hiding in Audio Using Allpass Filters , 2007, IEEE Transactions on Audio, Speech, and Language Processing.

[5]  M. Kendall,et al.  An Introduction to the Theory of Statistics. , 1911 .

[6]  J. Rodgers,et al.  Thirteen ways to look at the correlation coefficient , 1988 .

[7]  J. Wolfowitz,et al.  Introduction to the Theory of Statistics. , 1951 .

[8]  Nikolay N. Ponomarenko,et al.  A NEW FULL-REFERENCE QUALITY METRICS BASED ON HVS , 2006 .

[9]  Min-Shiang Hwang,et al.  A high quality steganographic method with pixel-value differencing and modulus function , 2008, J. Syst. Softw..

[10]  Chin-Chen Chang,et al.  An improvement of EMD embedding method for large payloads by pixel segmentation strategy , 2008, Image Vis. Comput..

[11]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[12]  Thierry Pun,et al.  A Stochastic Approach to Content Adaptive Digital Image Watermarking , 1999, Information Hiding.

[13]  Chung-Ming Wang,et al.  Toward Optimal Embedding Capacity for Permutation Steganography , 2009, IEEE Signal Processing Letters.

[14]  Cheng-Hsing Yang,et al.  Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.

[15]  Ebroul Izquierdo,et al.  Robust and Transparent Color Modulation for Text Data Hiding , 2008, IEEE Transactions on Multimedia.

[16]  James Hu,et al.  DVQ: A digital video quality metric based on human vision , 2001 .

[17]  Alex ChiChung Kot,et al.  Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving , 2007, IEEE Transactions on Multimedia.

[18]  Min-Shiang Hwang,et al.  Data Hiding: Current Status and Key Issues , 2007, Int. J. Netw. Secur..

[19]  Chao-Hung Lin,et al.  A High Capacity 3D Steganography Algorithm , 2009, IEEE Transactions on Visualization and Computer Graphics.

[20]  Tieyong Zeng,et al.  A Generalization of LSB Matching , 2009, IEEE Signal Processing Letters.

[21]  Cheng-Hsing Yang,et al.  Inverted pattern approach to improve image quality of information hiding by LSB substitution , 2008, Pattern Recognit..

[22]  Zhou Wang,et al.  Information Content Weighting for Perceptual Image Quality Assessment , 2011, IEEE Transactions on Image Processing.

[23]  J. Astola,et al.  ON BETWEEN-COEFFICIENT CONTRAST MASKING OF DCT BASIS FUNCTIONS , 2007 .

[24]  Chin-Chen Chang,et al.  A steganographic method for digital images using side match , 2004, Pattern Recognit. Lett..

[25]  Thierry Pun,et al.  Generalized watermarking attack based on watermark estimation and perceptual remodulation , 2000, Electronic Imaging.

[26]  Kiyoshi Tanaka,et al.  Complete Video Quality-Preserving Data Hiding , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[27]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[28]  Xinpeng Zhang,et al.  Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security , 2004, Pattern Recognit. Lett..

[29]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[30]  A. Bovik,et al.  A universal image quality index , 2002, IEEE Signal Processing Letters.

[31]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[32]  Ton Kalker,et al.  Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform , 2007, IEEE Transactions on Information Forensics and Security.

[33]  Thierry Pun,et al.  Attack modelling: towards a second generation watermarking benchmark , 2001, Signal Process..

[34]  Wen-Hsiang Tsai,et al.  Adaptive data hiding in palette images by color ordering and mapping with security protection , 2004, IEEE Trans. Commun..