An adaptive multi bit-plane image steganography using block data-hiding
- 491 Downloads
Embedding a secret message into the pixels of a cover image yields a visual distortion if these pixels belong to smooth regions. Thus, this prompted the development of some edge-based approaches in which only the edge pixels are used to hide secret bits. As a result, the visual quality of stego images is improved. However, the capacity is limited due to some unused regions in cover images. In this paper, an adaptive multi bit-planes image steganography using block data-hiding (MPBDH) is proposed. This method employs more than one bit-plane and applies an adaptive complexity threshold computation to select the complex regions of a cover image used in data hiding. Consequently, the embedding capacity and security performance are significantly improved in comparison with previous approaches based on pixel and block complexity. The results, which are obtained from experiments performed on 10,000 natural gray-images, indicate that the embedding capacity and security introduced in the proposed approach overcome the problems of previous approaches. The proposed approach is hence suitable for secure communications.
KeywordsMuli bit-plane Adaptive Block data-hiding Steganography
We gratefully acknowledge Department of Computer Science for financial support and Khon Kaen University for their assistance.
- 1.(1997) SIPI Image Database. http://sipi.usc.edu/database/. Accessed 24 Jan 2015
- 4.Chang K-C, Huang PS, Te-Ming Tu, Chien-Ping Chang (2007) Adaptive image steganographic scheme based on Tri-way Pixel-Value Differencing. IEEE, 1165–1170Google Scholar
- 6.Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in color and grayscale images. ACM Press, 27Google Scholar
- 8.Hirohisa H (2002) A data embedding method using BPCS principle with new complexity measures. Proc Pac. Rim Workshop Digit. Steganography. 30–47Google Scholar
- 11.Kawaguchi E, Eason RO (1998) Principle and applications of BPCS-steganographyGoogle Scholar
- 12.Ker AD (2005) Steganalysis of LSB matching in grayscale images. IEEE Signal Process Lett 441–444. doi: 10.1109/LSP.2005.847889
- 16.Muñoz A (2007) StegSecret. A simple steganalysis tool. http://stegsecret.sourceforge.net/. Accessed 24 Jan 2015
- 20.Rivest RL, Shamir A, Adleman LM (1983) Cryptographic communications system and method. Google PatentsGoogle Scholar
- 21.Rose NJ (2001) Hilbert-type space-filling curvesGoogle Scholar
- 24.Tomáš Pevný, Tomáš Filler, Patrick Bas (2013) Break Our Steganography System. s. Accessed 24 Jan 2015Google Scholar