Skip to main content

Study on Security Enhancing of Generalized Exploiting Modification Directions in Data Hiding

  • Conference paper
  • First Online:
Security with Intelligent Computing and Big-data Services (SICBS 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 895))

  • 1099 Accesses

Abstract

In 2017, Liu et al. proposed the high capacity GEMD scheme which increases the capacity of GEMD by divides n adjacent pixels into multiple groups. The dividing modes among the image are the same in their scheme. As a result, it is easy to be attacked by an attacker, In order to improve this shortcoming, we change the original embedding procedure, which makes secret message more secure after embedding. The concept is combining Liu’s scheme with the incremental sequence. We change each size of embedding secret message to increase security and maintain stable image quality.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color and grayscale images. IEEE Multimedia 8(4), 22–28 (2001)

    Article  Google Scholar 

  2. Gu, S.S., Hao, T.: A pointer network based deep learning algorithm for 0–1 knapsack problem. In: 2018 Tenth International Conference on Advanced Computational Intelligence (ICACI), pp. 473–477 (2018)

    Google Scholar 

  3. Jung, K.H., Yoo, K.Y.: Improved exploiting modification direction method by modulus operation. Int. J. Signal Process. Image Process. Pattern 2(1), 79–88 (2009)

    Google Scholar 

  4. Kuo, W.C., Kuo, S.H., Chang, H.Y., Wuu, L.C.: Authenticated secret sharing scheme based on GMEMD. In: International Workshop on Digital-Forensics and Watermarking 2015, 07–10 October 2015

    Google Scholar 

  5. Kuo, W.C., Wang, C.C.: Data hiding based on generalized exploiting modification direction method. Imaging Sci. J. 61(6), 484–490 (2013)

    Article  Google Scholar 

  6. Kuo, W.C., Wuu, L.C., Kuo, S.H.: The high embedding steganographic method based on general Multi-EMD. In: 2012 International Conference on Information Security and Intelligent Control (ISIC 2012), Yunlin, Taiwan, pp. 286–289, 14–16 August 2012

    Google Scholar 

  7. Liu, Y.X., Yang, C.G., Sun, Q.D.: Enhance embedding capacity of generalized exploiting modification directions in data hiding. IEEE Access, pp. 1–5 (2017)

    Google Scholar 

  8. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding – a survey. In: The proceedings of the IEEE, special issue on protection of multimedia content, pp. 1062–1078 (1999)

    Google Scholar 

  9. Wang, C.C., Kuo, W.C., Huang, Y.C., Wuu, L.C.: A high capacity data hiding scheme based on re-adjusted GEMD. Multimedia Tools Appl. pp. 1–15 (2017)

    Google Scholar 

  10. Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11), 781–783 (2006)

    Article  Google Scholar 

Download references

Acknowledgement

This work was supported in part by the Ministry of Science and Technology of the Republic of China under Contract No. MOST 107-2218-E-110-014- and MOST 107-2221-E-224-008-MY2.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Wen-Chung Kuo , Chun-Cheng Wang or Yu-Chih Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kuo, WC., Xiao, RJ., Wang, CC., Huang, YC. (2020). Study on Security Enhancing of Generalized Exploiting Modification Directions in Data Hiding. In: Yang, CN., Peng, SL., Jain, L. (eds) Security with Intelligent Computing and Big-data Services. SICBS 2018. Advances in Intelligent Systems and Computing, vol 895. Springer, Cham. https://doi.org/10.1007/978-3-030-16946-6_9

Download citation

Publish with us

Policies and ethics