Multimedia Tools and Applications

, Volume 76, Issue 2, pp 1901–1919 | Cite as

Secure multi-group data hiding based on gemd map

  • Wen-Chung Kuo
  • Sheng-Yi Chang
  • Chun-Cheng Wang
  • Chin-Chen Chang
Article
  • 112 Downloads

Abstract

Numerous data hiding schemes have been recently proposed based on section-wise strategy. The purpose of these approaches is to enhance security by using a unique key to generate a table. But these approaches are not matched between the embedding secret data length for binary bits and the length of the notation system in the section-wise strategy. In order to enhance the security of secret data and increase embedding capacity, we will propose a secure multi-group data hiding scheme based on General Exploiting Modification Direction (GEMD) map in this paper. Three major advantages exist in our scheme. First is flexibility for the number and combination of elements. Second is the removal of spatial redundancy in our method while maintaining embedding capacity above 1 bpp. Lastly, this method avoids the overflow/underflow problem. Experimental results show that our method enhances embedding capacity and maintains good visual stego image quality. In terms of security, the proposed scheme is more secure than LSB replacement method in terms of resisting visual attack and RS testing.

Keywords

Data hiding General exploiting modification direction(GEMD) Embedding capacity Section-wise strategy 

References

  1. 1.
    Chan CS, Tsai YY, Liu CL (2012) An image hiding scheme by linking pixels in the circular Way. KSII Trans. Inter Inform Sys 6(6):1718–1734Google Scholar
  2. 2.
    Fridrich J, Golijan M, Du R (2001) Reliable detection of LSB steganography in grayscale and color images. Pro ACM Workshop Multi Sec:27–30Google Scholar
  3. 3.
    Kuo WC, Wang CC (2013) Data hiding based on generalized exploiting modification direction method. Imaging Sci J 61(6):484–490CrossRefGoogle Scholar
  4. 4.
    Kuo WC, Wuu LC, Kuo SH (2012) The high embedding steganographic method based on general multi-EMD. In: The 2012 International Conference on Information Security and Intelligent Control (ISIC’12), pp. 286–289Google Scholar
  5. 5.
    Kuo WC, Wuu LC, Shyi CN, Kuo SH (2009) A data hiding scheme with high embedding capacity based on general improving exploiting modification direction methodGoogle Scholar
  6. 6.
    Lee CF, Wang YR, Chang CC (2007) A. Steganographic Method with high embedding capacity by improving exploiting modification direction. In: Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP07), Kaohsiung, Taiwan, pp 497–500Google Scholar
  7. 7.
    Li B, Wang M, Li XL, Tan SQ, Huang JW (2015) A strategy of clustering modification directions in spatial image steganography. IEEE Trans Inf Forensics Secur 10(9):1905–1917CrossRefGoogle Scholar
  8. 8.
    Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13 (5):285–287CrossRefGoogle Scholar
  9. 9.
    Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Secur 5(2):215–224CrossRefGoogle Scholar
  10. 10.
    Qin C, Chang CC, Huang YH, Liao LT (2013) An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans Circuits Syst Video Technol 23 (7):1109–1118CrossRefGoogle Scholar
  11. 11.
    Qin C, Chang CC, Chiu YP (2014) A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans Image Process 23(3):969–978MathSciNetCrossRefGoogle Scholar
  12. 12.
    Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164CrossRefGoogle Scholar
  13. 13.
    Sharp T (2001) An implementation of key-based digital signal steganography. In: Proceedings of 4th international workshop on information hiding, LNCS-2137, pp.13-26, SpringerGoogle Scholar
  14. 14.
    Turner LF (1989) Digital data security system, Patent IPN, WO 89/08915Google Scholar
  15. 15.
    Wang J, Sun Y, Xu H, Chen K, Kim HJ, Joo SH (2010) An improved section-wise exploiting modification direction method. Signal Process 90(11):954–2964CrossRefMATHGoogle Scholar
  16. 16.
    Wang XT, Chang CC, Lin CC, Li MC (2012) A novel multi-group exploiting modification direction method based on switch map. Signal Process 92(6):1525–1535CrossRefGoogle Scholar
  17. 17.
    Westfeld A, Pfitzmann A (1999) Attacks on steganographic systems. In: 3th international workshop on information hiding, LNCS-1768, Springer, pp. 61–76Google Scholar
  18. 18.
    Zhang X, Wang S (2006) Efficient Steganographic Embedding by Exploiting Modification Direction. IEEE Commun Lett 10(11):1–3CrossRefGoogle Scholar
  19. 19.
    Zhang X, Zhang W, Wang S (2007) Efficient double-layered steganographic embedding. Electron Lett 43(8):482–483CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  • Wen-Chung Kuo
    • 1
  • Sheng-Yi Chang
    • 1
  • Chun-Cheng Wang
    • 2
  • Chin-Chen Chang
    • 3
    • 4
  1. 1.Department of Computer Science and Information EngineeringNational Yunlin University of Science, TechnologyYunlinChina
  2. 2.Graduate School of Engineering Science and Technology Doctoral ProgramNational Yunlin University of Science, TechnologyYunlinChina
  3. 3.Department of Information Engineering and Computer ScienceFeng Chia UniversityTaichungTaiwan
  4. 4.Department of Computer Science and Information EngineeringAsia UniversityYunlinChina

Personalised recommendations