Skip to main content
Log in

Adaptive local complexity controlled data hiding method considering the human visual sensitivity

  • Original papers
  • Published:
Opto-Electronics Review

Abstract

This paper proposes a human visual system based data hiding method with the consideration of the local complexity in images. It is known that human vision is more sensitive to the changes in smooth area than that of complex area, we embed less data into blocks with low complexity and embed more data into blocks with rich texture. We use the modified diamond encoding (MDE) as the embedding technique, and employ a sophisticated pixel pair adjustment process to maintain the complexity consistency of blocks before and after embedding data bits. Since the proposed method is robust to LSB-based steganalysis, it is more secure than other existing methods using the LSB replacement as their embedding technique. The experimental results revealed that the proposed method not only offers a better embedding performance, but is also secure under the attack of the LSB based steganalysis tools.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. N. Provos and P. Honeyman, “Hide and seek: an introduction to steganography”, IEEE Secur. Priv. 3, 32–44, 2003.

    Article  Google Scholar 

  2. W. Hong and T.S. Chen, “Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism,” J. Vis. Commun. Image R. 22, 131–140, 2011.

    Article  Google Scholar 

  3. C.K. Chan and L.M. Cheng, “Hiding data in images by simple LSB substitution”, Pattern Recogn. 37, 469–474, 2004.

    Article  MATH  Google Scholar 

  4. J. Mielikainen, “LSB matching revisited”, IEEE Signal Proc. Let. 13, 285–287, 2006.

    Article  ADS  Google Scholar 

  5. X. Zhang and S. Wang, “Efficient steganographic embedding by exploiting modification direction”, IEEE Commun. Lett. 10, 781–783, 2006.

    Article  Google Scholar 

  6. K.Y. Lin, W. Hong, J. Chen, T.S. Chen, and W.C. Chiang, “Data hiding by exploiting modification direction technique using optimal pixel grouping”, Proc. Int. Conf. on Education Technology and Computer 3, 121–123, 2010.

    Google Scholar 

  7. W. Hong, “An efficient prediction-and-shifting embedding technique for high quality reversible data hiding,” EURASIP J. Adv. Sig. Pr. Special Issue on Advanced Image Processing for Defense and Security Applications, 2010, article ID 104835, doi:10.1155/2010/104835, 2010.

  8. C.F. Lee, C.C. Chang, and K.H. Wang, “An improvement of EMD embedding method for large payloads by pixel segmentation strategy”, Image Vision Comput. 26, 1670–1676, 2008.

    Article  Google Scholar 

  9. R.M Chao, H.C. Wu, C.C. Lee, and Y.P. Chu, “A novel image data hiding scheme with diamond encoding”, EURASIP J. on Information Security 2009, Article ID 658047, 2009.

  10. H. Qi, D. Zheng, and J. Zhao. “Human visual system based adaptive digital image watermarking”, Signal Process. 88, 174–188, 2008.

    Article  MATH  Google Scholar 

  11. D.C. Wu and W.H. Tsai, “A Steganographic method for images by pixel-value differencing”, Pattern Recogn. Lett. 24, 1613–1626, 2003.

    Article  MATH  Google Scholar 

  12. C.M. Wang, N.I Wu, C.S. Tsai, and M.S. Hwang, “A high quality steganographic method with pixel-value differencing and modulus function”, J. Syst. Software 81, 150–158, 2008.

    Article  Google Scholar 

  13. W. Hong, T.S. Chen, and C.W. Luo, “Data embedding using pixel value differencing and diamond encoding with multiple-base notational system”, J. Syst. Software 85, 1166–1175, 2012.

    Article  Google Scholar 

  14. D.C. Lou, N.I. Wu, C.M. Wang, Z.H. Lin, and C.S. Tsai, “A novel adaptive steganography based on local complexity and human vision sensitivity”, J. Syst. Software 83, 1236–1248, 2010.

    Article  Google Scholar 

  15. J. Fridrich, M. Goljan, and R. Du, “Reliable detection of LSB steganography in color and grayscale images”, Proc. Int. Workshop on Multimedia and Security, 27–30, 2001.

  16. A.D. Ker, “Steganalysis of LSB matching in grayscale images”, IEEE Signal Proc. Let. 12, 441–444, 2005.

    Article  ADS  Google Scholar 

  17. W. Hong and T.S. Chen, “A novel data embedding method using adaptive pixel pair matching”, IEEE T. Inf. Foren. Sec. 7, 176–184, 2012.

    Article  Google Scholar 

  18. RSP image database. Available: http://dud.inf.tu-dresden.de/~westfeld/rsp/rsp.html

  19. USC-SIPI image database. Available: http://sipi.usc.edu/da-tabase.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. -L. Lai.

About this article

Cite this article

Ho, L.H., Lai, S.L. & Chung, Y.K. Adaptive local complexity controlled data hiding method considering the human visual sensitivity. Opto-Electron. Rev. 20, 367–374 (2012). https://doi.org/10.2478/s11772-012-0046-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.2478/s11772-012-0046-6

Keywords

Navigation