Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications

Steganography provides secure communications over the Internet with a cover image. However, it is difficult to transfer many messages with small-sized images. We have improved EMD (Exploiting Modification Direction), proposed by Zhang and Wang, to solve this problem. In this paper, we have developed a (2 n + 2-1)-ary scheme. Our scheme shows a higher embedding rate, R=log2(2 n + 2-1)/n, which is greater than that of the EMD scheme, because the EMD scheme embedding rate is R=log2(2n+1)/n, for n>=2. The experimental results show that our scheme is able to embed twice as many secret bits in multimedia communications compared to the existing EMD embedding method. Our method has low complexity and achieves higher embedding performance with good perceptual quality against the earlier arts. An experiment verified our proposed data hiding method in multimedia communications.

[1]  Chin-Chen Chang,et al.  Hiding secret data in images via predictive coding , 2005, Pattern Recognit..

[2]  Jessica J. Fridrich,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..

[3]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[4]  Jessica J. Fridrich,et al.  Quantitative steganalysis of digital images: estimating the secret message length , 2003, Multimedia Systems.

[5]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[6]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[7]  Hideki Noda,et al.  BPCS steganography using EZW lossy compressed images , 2002, Pattern Recognit. Lett..

[8]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[9]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[10]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[11]  Chin-Chen Chang,et al.  A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..

[12]  Huaiqing Wang,et al.  Cyber warfare: steganography vs. steganalysis , 2004, CACM.

[13]  Iuon-Chang Lin,et al.  Hiding data in spatial domain images with distortion tolerance , 2009, Comput. Stand. Interfaces.

[14]  Chin-Chen Chang,et al.  An improvement of EMD embedding method for large payloads by pixel segmentation strategy , 2008, Image Vis. Comput..

[15]  Jessica J. Fridrich,et al.  Higher-order statistical steganalysis of palette images , 2003, IS&T/SPIE Electronic Imaging.

[16]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..