On a low complexity steganographic system for digital images based on interpolation-error expansion

The main purpose of steganography is to hide the presence of communication process. Transparency is referred to the ability to avoid suspicion about the existence of a secret message. Several steganographic systems using digital images as host signals have been proposed. However, some of them such as frequency transform-based are computationally expensive. In this paper, a low complexity steganographic system for digital images is proposed. The core of the proposed system is an adaptation of the interpolation-error expansion technique. From experimental results the high perceptual and statistical transparency of the proposed scheme are shown. Moreover, the proposed system embedding rate is similar and some times outperforms the frequency transform-based embedding rate with lower computational complexity.

[1]  L. DoraM.Ballesteros,et al.  Highly transparent steganography model of speech signals using Efficient Wavelet Masking , 2012, Expert Syst. Appl..

[2]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[3]  Imran Usman,et al.  Lossless Data Hiding Using Optimized Interpolation Error Expansion , 2011, 2011 Frontiers of Information Technology.

[4]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[5]  Kumar Parasuraman,et al.  Reversible image watermarking using interpolation technique , 2014, 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE).

[6]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[7]  José Juan García-Hernández Exploring Reversible Digital Watermarking in Audio Signals Using Additive Interpolation-error Expansion , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[8]  Jie Zhu,et al.  Steganography for MP3 audio by exploiting the rule of window switching , 2012, Comput. Secur..

[9]  Dinesh Kumar,et al.  Digital Image Steganography Based on Combination of DCT and DWT , 2010, ICT.