Adaptive data hiding in palette images by color ordering and mapping with security protection

Palette images are widely used in multimedia and Internet applications. In this paper, a new method for data hiding in palette images with security protection by color ordering and mapping, as well as parameter randomization, is proposed. First, image pixels are classified as data embeddable or nonembeddable, and only the former ones are used to embed secret data. The proposed idea of data hiding is based on the use of a new type of color-ordering relationship, from which a color-mapping function is defined with binary values as output. When a secret data bit is to be embedded, a data-embeddable pixel is selected, and its color is adjusted to make the output of the color-mapping function equal to the secret bit value. The embedded secret data can be extracted correctly and quickly from the resulting stego-image by merely inspecting the outputs of the color-mapping function. Indetectability of the secret information embedded by the proposed method is also analyzed and confirmed. Furthermore, a number of possible security enhancement measures based on parameter randomization in the data-embedding process are proposed to protect the hidden data in the stego-image. The randomization effect is created by the use of a secret key and a number of random number-generating functions. The proposed data hiding method was tested with a variety of palette images. The experimental results show that secret data can be embedded and extracted successfully without producing visual artifacts in the cover image. A good balance between stego-image quality and data-embedding capacity can be achieved, which proves the efficiency and feasibility of the proposed method for practical applications.

[1]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[2]  Steven H. Low,et al.  Marking text documents , 1997, Proceedings of International Conference on Image Processing.

[3]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[4]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[5]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[6]  T. Scharping Hide-and-seek: China's elusive population data , 2001 .

[7]  Min Wu,et al.  Multi-level data hiding for digital image and video , 1999, Optics East.

[8]  Maurice Maes,et al.  Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks , 1998, Information Hiding.

[9]  Yu-Chee Tseng,et al.  A secure data hiding scheme for binary images , 2002, IEEE Trans. Commun..

[10]  Min Wu,et al.  Data hiding in digital binary image , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[11]  Paul Wintz,et al.  Digital image processing (2nd ed.) , 1987 .

[12]  Jiri Fridrich,et al.  Secure Steganographic Methods for Palette Images , 1999, Information Hiding.

[13]  Sushil Jajodia,et al.  Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.

[14]  W. Wells,et al.  Hide and seek , 2003, Nature Immunology.