Skip to main content
Log in

Secure multi-group data hiding based on gemd map

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Numerous data hiding schemes have been recently proposed based on section-wise strategy. The purpose of these approaches is to enhance security by using a unique key to generate a table. But these approaches are not matched between the embedding secret data length for binary bits and the length of the notation system in the section-wise strategy. In order to enhance the security of secret data and increase embedding capacity, we will propose a secure multi-group data hiding scheme based on General Exploiting Modification Direction (GEMD) map in this paper. Three major advantages exist in our scheme. First is flexibility for the number and combination of elements. Second is the removal of spatial redundancy in our method while maintaining embedding capacity above 1 bpp. Lastly, this method avoids the overflow/underflow problem. Experimental results show that our method enhances embedding capacity and maintains good visual stego image quality. In terms of security, the proposed scheme is more secure than LSB replacement method in terms of resisting visual attack and RS testing.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Chan CS, Tsai YY, Liu CL (2012) An image hiding scheme by linking pixels in the circular Way. KSII Trans. Inter Inform Sys 6(6):1718–1734

    Google Scholar 

  2. Fridrich J, Golijan M, Du R (2001) Reliable detection of LSB steganography in grayscale and color images. Pro ACM Workshop Multi Sec:27–30

  3. Kuo WC, Wang CC (2013) Data hiding based on generalized exploiting modification direction method. Imaging Sci J 61(6):484–490

    Article  Google Scholar 

  4. Kuo WC, Wuu LC, Kuo SH (2012) The high embedding steganographic method based on general multi-EMD. In: The 2012 International Conference on Information Security and Intelligent Control (ISIC’12), pp. 286–289

  5. Kuo WC, Wuu LC, Shyi CN, Kuo SH (2009) A data hiding scheme with high embedding capacity based on general improving exploiting modification direction method

  6. Lee CF, Wang YR, Chang CC (2007) A. Steganographic Method with high embedding capacity by improving exploiting modification direction. In: Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP07), Kaohsiung, Taiwan, pp 497–500

  7. Li B, Wang M, Li XL, Tan SQ, Huang JW (2015) A strategy of clustering modification directions in spatial image steganography. IEEE Trans Inf Forensics Secur 10(9):1905–1917

    Article  Google Scholar 

  8. Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13 (5):285–287

    Article  Google Scholar 

  9. Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Secur 5(2):215–224

    Article  Google Scholar 

  10. Qin C, Chang CC, Huang YH, Liao LT (2013) An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans Circuits Syst Video Technol 23 (7):1109–1118

    Article  Google Scholar 

  11. Qin C, Chang CC, Chiu YP (2014) A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans Image Process 23(3):969–978

    Article  MathSciNet  MATH  Google Scholar 

  12. Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164

    Article  Google Scholar 

  13. Sharp T (2001) An implementation of key-based digital signal steganography. In: Proceedings of 4th international workshop on information hiding, LNCS-2137, pp.13-26, Springer

  14. Turner LF (1989) Digital data security system, Patent IPN, WO 89/08915

  15. Wang J, Sun Y, Xu H, Chen K, Kim HJ, Joo SH (2010) An improved section-wise exploiting modification direction method. Signal Process 90(11):954–2964

    Article  MATH  Google Scholar 

  16. Wang XT, Chang CC, Lin CC, Li MC (2012) A novel multi-group exploiting modification direction method based on switch map. Signal Process 92(6):1525–1535

    Article  Google Scholar 

  17. Westfeld A, Pfitzmann A (1999) Attacks on steganographic systems. In: 3th international workshop on information hiding, LNCS-1768, Springer, pp. 61–76

  18. Zhang X, Wang S (2006) Efficient Steganographic Embedding by Exploiting Modification Direction. IEEE Commun Lett 10(11):1–3

    Article  MathSciNet  Google Scholar 

  19. Zhang X, Zhang W, Wang S (2007) Efficient double-layered steganographic embedding. Electron Lett 43(8):482–483

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wen-Chung Kuo.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kuo, WC., Chang, SY., Wang, CC. et al. Secure multi-group data hiding based on gemd map. Multimed Tools Appl 76, 1901–1919 (2017). https://doi.org/10.1007/s11042-015-3165-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-3165-5

Keywords

Navigation