Hiding data in spatial domain images with distortion tolerance

Data hiding is a technique that is used to embed secret information into a cover media. It has been widely used in protecting copyright and transmitting sensitive data over an insecure channel. Conventional data hiding schemes only focus on how to reduce the distortion when sensitive data is embedded into the cover image. However, the transmitted images may be compressed or occur transmitting errors. If such errors occur, the receiver cannot extract the correct information from the stego-image. In this paper, we proposed a novel hiding data scheme with distortion tolerance. The proposed scheme not only can prevent the quality of the processed image from being seriously degraded, but also can simultaneously achieve distortion tolerance. Experimental results show that the proposed scheme indeed can obtain a good image quality and is superior to the other schemes in terms of its distortion tolerance.

[1]  Chin-Chen Chang,et al.  A virtual image cryptosystem based upon vector quantization , 1998, IEEE Trans. Image Process..

[2]  Der-Chyuan Lou,et al.  A steganographic scheme for secure communications based on the chaos and euler Theorem , 2004, IEEE Transactions on Multimedia.

[3]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[4]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[5]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[6]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..

[7]  Steve McLaughlin IEE Proceedings on Vision Image and Signal Processing , 1996 .

[8]  Nikolaos G. Bourbakis,et al.  Picture data encryption using scan patterns , 1992, Pattern Recognit..

[9]  Oscar C. Au,et al.  Data hiding watermarking for halftone images , 2002, IEEE Trans. Image Process..

[10]  Nikolaos G. Bourbakis,et al.  Lossless compression and information hiding in images , 2004, Pattern Recognit..

[11]  Ja-Chen Lin,et al.  Hiding data in images by optimal moderately-significant-bit replacement , 2000 .

[12]  Chin-Chen Chang,et al.  A new encryption algorithm for image cryptosystems , 2001, J. Syst. Softw..

[13]  A. Miyazaki,et al.  Wavelet-based watermarking for tamper proofing of still images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[14]  Shiuh-Jeng Wang,et al.  Steganography of capacity required using modulo operator for embedding secret image , 2005, Appl. Math. Comput..

[15]  Xiamu Niu,et al.  Print-and-scan model and the watermarking countermeasure , 2005, Image Vis. Comput..

[16]  Soo-Chang Pei,et al.  Novel robust watermarking technique in dithering halftone images , 2005, IEEE Signal Processing Letters.

[17]  Ja-Ling Wu,et al.  Hidden digital watermarks in images , 1999, IEEE Trans. Image Process..

[18]  W. Tsai,et al.  Spatial-domain image hiding using image differencing , 2000 .

[19]  Xinpeng Zhang,et al.  Steganography using multiple-base notational system and human vision sensitivity , 2005, IEEE Signal Process. Lett..

[20]  Ja-Chen Lin,et al.  Sharing and hiding secret images with size constraint , 2004, Pattern Recognit..

[21]  Chun-Shien Lu,et al.  Multipurpose watermarking for image authentication and protection , 2001, IEEE Trans. Image Process..

[22]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[23]  Steve McLaughlin,et al.  Comparative study of textural analysis techniques to characterise tissue from intravascular ultrasound , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[24]  Chin-Chen Chang,et al.  A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..

[25]  Po-Whei Huang,et al.  A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..

[26]  Hae Yong Kim,et al.  A secure authentication watermarking for halftone and binary images , 2004, Int. J. Imaging Syst. Technol..

[27]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[28]  Ja-Chen Lin,et al.  A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..