Transforming LSB Substitution for Image-based Steganography in Matching Algorithms

Simple least-significant-bit (LSB) substitution is a method used to embed secret data in least significant bits of pixels in a host image. The LSB approaches typically achieve high capacity. A simple LSB substitution, which hides secret data directly into LSBs, is easily implemented but will result in bad quality of the stego-image. In order to reduce the degradation of the host image after embedding, an LSB substitution scheme was proposed by Wang et al. They proposed a genetic algorithm to search for approximate solutions. Also, Chang et al. proposed a dynamic programming strategy to efficiently obtain a solution. In this paper, we propose a more general model of Wang et al.'s LSB substitution scheme, called as transforming LSB substitution. In order to overcome the problem associated with the two previous approaches of a long running time, a more efficient approach, referred to as the matching approach, is proposed to find a better solution. Some experiments, demonstrations and analyses are shown in this paper to demonstrate our new scheme and approach.

[1]  W. Tsai,et al.  Spatial-domain image hiding using image differencing , 2000 .

[2]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[3]  Lee-Ming Cheng,et al.  Improved hiding data in images by optimal moderately-significant-bit replacement , 2001 .

[4]  Cheng-Hsing Yang,et al.  An O(n) Time Algorithm for Maximum Matching on Cographs , 1993, Inf. Process. Lett..

[5]  Chin-Chen Chang,et al.  A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..

[6]  Shinfeng D. Lin,et al.  A robust DCT-based watermarking for copyright protection , 2000, 2000 Digest of Technical Papers. International Conference on Consumer Electronics. Nineteenth in the Series (Cat. No.00CH37102).

[7]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..

[8]  Yeuan-Kuen Lee,et al.  High capacity image steganographic model , 2000 .

[9]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[10]  Cheng-Hsing Yang,et al.  Efficient routability check algorithms for segmented channel routing , 2000, TODE.

[11]  Ja-Chen Lin,et al.  Hiding data in images by optimal moderately-significant-bit replacement , 2000 .

[12]  Kenneth Steiglitz,et al.  Combinatorial Optimization: Algorithms and Complexity , 1981 .

[13]  Ja-Chen Lin,et al.  A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..

[14]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[15]  Chin-Chen Chang,et al.  Hiding secret data in images via predictive coding , 2005, Pattern Recognit..

[16]  Chin-Chen Chang,et al.  Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..