Advertisement

An improved high capacity data hiding scheme using pixel value adjustment and modulus operation

  • T. D. SairamEmail author
  • K. Boopathybagan
Article
  • 14 Downloads

Abstract

High data hiding capacity, stego image quality and security are the measures of steganography. Of these three measures, number of bits that can be hidden in a single cover pixel, bits per pixel (bpp), is very important and many researchers are working to improve the bpp. Recently, to enhance the embedding capacity, some of the schemes were proposed which are based on the fixed equation that is used as an extraction function of secret data from the stego image. We propose an improved high capacity data hiding method that maintain the acceptable image quality that is more than 30 dB and improves the embedding capacity higher than that of the methods proposed in recent years. The method proposed in this paper uses n2 − ary notational system and achieves higher embedding rate of 4 bpp and also maintain the good visual quality.

Keywords

Cover image Data hiding Stego image Exploiting modification metod Pixel value adjustment 

Notes

References

  1. 1.
    Chan C-K, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474CrossRefGoogle Scholar
  2. 2.
    Datta B, K. Bandyopadhyay S, Kedia A (2014) High Imperceptible Data Hiding using Remainder Method. Int J Comput Appl 95:12–19Google Scholar
  3. 3.
    Fua D-S, Jinga Z-J, Zhaoa S-G, Fana J (2014) International Journal of Electronics and Communications 68(10):933–943Google Scholar
  4. 4.
    Jung K-H (2009) Improved Exploiting Modification Direction method by modulus operation. International Journal of Signal processing, Image processing and pattern 2(1):79–87Google Scholar
  5. 5.
    Khan A, Siddiqa A, Munib S, Malik SA (2014) A recent survey of reversible watermarking techniques. Inf Sci 279:251–272CrossRefGoogle Scholar
  6. 6.
    Kim C Data hiding by an improved exploiting modification direction. Multimed Tools Appl 69(3):569–584CrossRefGoogle Scholar
  7. 7.
    Kuo W-C, Kuo S-H, Huang Y-C (2013) Data hiding schemes based on the formal improved exploiting modification direction method. Applied mathematics and information sciences letters 1(3):81–88Google Scholar
  8. 8.
    Kuo W-C, Kuob S-H, Wangb C-C, Wuua L-C (2016) High capacity data hiding scheme based on multi-bit encoding function. International Journal for Light and Electron Optics 127(4):1762–1769CrossRefGoogle Scholar
  9. 9.
    Kuo W-C, Wangb C-C (2013) Data hiding based on generalised exploiting modification direction method. The Imaging Science Journal 61(6):484–490CrossRefGoogle Scholar
  10. 10.
    Kuo WC, Wuv LC, Kuo SH (2012) The High embedding steganographic Method based on General Multi - EMD", IEEE International Conference on Information Security and Intelligence Control (ISIC), pp 286–289Google Scholar
  11. 11.
    Lee CF, Wang YR, Chang CC (2007) A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction. Intelligent Information Hiding and Multimedia Signal Processing, Third International Conference, 01: 497-500Google Scholar
  12. 12.
    Qiu Y, Qian Z, Yu L (2015) Adaptive Reversible Data Hiding by Extending the Generalized Integer Transformation. IEEE Signal Processing Letters 23(1):130–134Google Scholar
  13. 13.
    Shen S-Y, Huang L-H (2015) A data hiding scheme using pixel value differencing and improving exploiting modification directions. Computers & Security 48:131–141CrossRefGoogle Scholar
  14. 14.
    Tseng HW, Leng HS (2014) High-payload block-based data hiding scheme using hybrid edge detector with minimal distortion. IET Image Process 8(11):647–654CrossRefGoogle Scholar
  15. 15.
    Wu HT, Dugelay YQ (2014) Shi. IEEE Signal Processing Letters 22(1):81–85CrossRefGoogle Scholar
  16. 16.
    Zhang X, Wang S (2006) Efficient Steganographic Embedding by Exploiting Modification direction. IEE Communications Letter 10(11):781–783CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Electronics and Communication EngineeringSKR Engineering CollegeChennaiIndia
  2. 2.Department of Electronics EngineeringAnna UniversityChennaiIndia

Personalised recommendations