Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation

In this research of color image hidden scheme, we aim to conceal a secret image into the cover image of the same size without noticeable degradation. In our approach, discrete wavelet transform (DWT) and set partitioning in hierarchical trees (SPIHT) codec are used to obtain a low bit rate and high reconstructed quality image compression. In the embedding process, an adaptive phase modulation (APM) mechanism and discrete Fourier transform (DFT) were adopted for secret data embedding. Simultaneously, nearest phase modulations (NPM) was used to improve the imperceptibility and decrease degradation of cover image. Both the chaotic mechanism (CM) and frequency hopping (FH) structure were hired to enhance the security of the scheme. Comparing with other data-hiding techniques, our proposed method has three advantages. (A) The extracted secret image has high quality reconstruction by using SPIHT coder. (B) The stego-image possesses excellent imperceptibility without noticeable degradation because secret data was concealed in the phase by using APM and NPM. (C) Have very large embedding capacity, it allows the size of secret image to be the same as the cover image.

[1]  Shiuh-Jeng Wang,et al.  Steganography of capacity required using modulo operator for embedding secret image , 2005, Appl. Math. Comput..

[2]  Jessica J. Fridrich,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..

[3]  Hua Cai,et al.  A new SPIHT algorithm based on variable sorting thresholds , 2001, ISCAS 2001. The 2001 IEEE International Symposium on Circuits and Systems (Cat. No.01CH37196).

[4]  Ahmed Abu-Hajar,et al.  Region of interest coding using partial-SPIHT , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[5]  Chin-Hsing Chen,et al.  A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection , 2005, Pattern Recognit..

[6]  Gilbert L. Peterson,et al.  A new blind method for detecting novel steganography , 2005, Digit. Investig..

[7]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[8]  W. Tsai,et al.  Data hiding in images via multiple-based number conversion and lossy compression , 1998 .

[9]  Francis M. Boland,et al.  Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[10]  Qiuqi Ruan,et al.  Secure semi-blind watermarking based on iteration mapping and image features , 2005, Pattern Recognit..

[11]  Lai-Man Po,et al.  A novel ordered-SPIHT for embedded color image coding , 2003, International Conference on Neural Networks and Signal Processing, 2003. Proceedings of the 2003.

[12]  Thierry Pun,et al.  Rotation, scale and translation invariant digital image watermarking , 1997, Proceedings of International Conference on Image Processing.

[13]  Hideki Noda,et al.  BPCS steganography using EZW lossy compressed images , 2002, Pattern Recognit. Lett..

[14]  Giovanni Poggi,et al.  Compression of multispectral images by three-dimensional SPIHT algorithm , 2000, IEEE Trans. Geosci. Remote. Sens..

[15]  William A. Pearlman,et al.  A new, fast, and efficient image codec based on set partitioning in hierarchical trees , 1996, IEEE Trans. Circuits Syst. Video Technol..

[16]  Chi Chung Ko,et al.  A novel watermark embedding and detection scheme for images in DFT domain , 1999 .

[17]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[18]  Chin-Chen Chang,et al.  A virtual image cryptosystem based upon vector quantization , 1998, IEEE Trans. Image Process..

[19]  Ja-Chen Lin,et al.  Hiding data in images by optimal moderately-significant-bit replacement , 2000 .

[20]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[21]  J. O'Ruanaidh,et al.  Rotation, Translation and Scale Invariant Digital Image Watermarking , 1997 .

[22]  Jerome M. Shapiro,et al.  Embedded image coding using zerotrees of wavelet coefficients , 1993, IEEE Trans. Signal Process..

[23]  Chin-Hsing Chen,et al.  Public-key image steganography using discrete cosine transform and quadtree partition vector quantization coding , 2003 .

[24]  Ioannis Pitas,et al.  Circularly symmetric watermark embedding in 2-D DFT domain , 2001, IEEE Trans. Image Process..