Inverted pattern approach to improve image quality of information hiding by LSB substitution

Capacity and invisibility are two targets of the methods for information hiding. Because these two targets contradict each other, to hide large messages into the cover image and remain invisible is an interesting challenge. The simple least-significant-bit (LSB) substitution approach, which embeds secret messages into the LSB of pixels in cover images, usually embeds huge secret messages. After a large message is embedded, the quality of the stego-image will be significantly degraded. In this paper, a new LSB-based method, called the inverted pattern (IP) LSB substitution approach, is proposed to improve the quality of the stego-image. Each section of secret images is determined to be inverted or not inverted before it is embedded. The decisions are recorded by an IP for the purpose of extracting data and the pattern can be seen as a secret key or an extra data to be re-embedded. The experimental results show that our proposed method runs fast and has better results than that of previous works.

[1]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[2]  Der-Chyuan Lou,et al.  Steganographic Method for Secure Communications , 2002, Comput. Secur..

[3]  Chin-Chen Chang,et al.  New image steganographic methods using run-length approach , 2006, Inf. Sci..

[4]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[5]  Chin-Chen Chang,et al.  High Capacity Data Hiding for Grayscale Images , 2008, Fundam. Informaticae.

[6]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..

[7]  Masaaki Fujiyoshi,et al.  Lossless Data Hiding in the Spatial Domain for High Quality Images , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[8]  A. Murat Tekalp,et al.  Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.

[9]  Yuan-Pei Lin,et al.  Wavelet tree quantization for copyright protection watermarking , 2004, IEEE Transactions on Image Processing.

[10]  Cheng-Hsing Yang,et al.  Weighted bipartite graph for locating optimal LSB substitution for secret embedding , 2006 .

[11]  Chin-Chen Chang,et al.  A steganographic method for digital images using side match , 2004, Pattern Recognit. Lett..

[12]  Shiuh-Jeng Wang,et al.  Steganography of capacity required using modulo operator for embedding secret image , 2005, Appl. Math. Comput..

[13]  Shih-Kun Huang,et al.  Cocktail Watermarking for Digital Image Protection , 2000, IEEE Trans. Multim..

[14]  Lee-Ming Cheng,et al.  Improved hiding data in images by optimal moderately-significant-bit replacement , 2001 .

[15]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[16]  Ja-Chen Lin,et al.  A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..

[17]  M. Hwang,et al.  Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .

[18]  Harold Joseph Highland,et al.  Data encryption: A non-mathematical approach , 1997, Comput. Secur..

[19]  Andrew D. Ker Improved Detection of LSB Steganography in Grayscale Images , 2004, Information Hiding.

[20]  A. Murat Tekalp,et al.  Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..

[21]  Tadanori Mizuno,et al.  A User Authentication System Using Schema of Visual Memory , 2006, BioADIT.

[22]  Chin-Chen Chang,et al.  Hiding data in multitone images for data communications , 2004 .

[23]  Yeuan-Kuen Lee,et al.  High capacity image steganographic model , 2000 .

[24]  Chin-Chen Chang,et al.  Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..

[25]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[26]  Po-Whei Huang,et al.  A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..

[27]  Min-Shiang Hwang,et al.  A high quality steganographic method with pixel-value differencing and modulus function , 2008, J. Syst. Softw..