Abstract
Numerous data hiding schemes have been recently proposed based on section-wise strategy. The purpose of these approaches is to enhance security by using a unique key to generate a table. But these approaches are not matched between the embedding secret data length for binary bits and the length of the notation system in the section-wise strategy. In order to enhance the security of secret data and increase embedding capacity, we will propose a secure multi-group data hiding scheme based on General Exploiting Modification Direction (GEMD) map in this paper. Three major advantages exist in our scheme. First is flexibility for the number and combination of elements. Second is the removal of spatial redundancy in our method while maintaining embedding capacity above 1 bpp. Lastly, this method avoids the overflow/underflow problem. Experimental results show that our method enhances embedding capacity and maintains good visual stego image quality. In terms of security, the proposed scheme is more secure than LSB replacement method in terms of resisting visual attack and RS testing.
Similar content being viewed by others
References
Chan CS, Tsai YY, Liu CL (2012) An image hiding scheme by linking pixels in the circular Way. KSII Trans. Inter Inform Sys 6(6):1718–1734
Fridrich J, Golijan M, Du R (2001) Reliable detection of LSB steganography in grayscale and color images. Pro ACM Workshop Multi Sec:27–30
Kuo WC, Wang CC (2013) Data hiding based on generalized exploiting modification direction method. Imaging Sci J 61(6):484–490
Kuo WC, Wuu LC, Kuo SH (2012) The high embedding steganographic method based on general multi-EMD. In: The 2012 International Conference on Information Security and Intelligent Control (ISIC’12), pp. 286–289
Kuo WC, Wuu LC, Shyi CN, Kuo SH (2009) A data hiding scheme with high embedding capacity based on general improving exploiting modification direction method
Lee CF, Wang YR, Chang CC (2007) A. Steganographic Method with high embedding capacity by improving exploiting modification direction. In: Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP07), Kaohsiung, Taiwan, pp 497–500
Li B, Wang M, Li XL, Tan SQ, Huang JW (2015) A strategy of clustering modification directions in spatial image steganography. IEEE Trans Inf Forensics Secur 10(9):1905–1917
Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13 (5):285–287
Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Secur 5(2):215–224
Qin C, Chang CC, Huang YH, Liao LT (2013) An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans Circuits Syst Video Technol 23 (7):1109–1118
Qin C, Chang CC, Chiu YP (2014) A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans Image Process 23(3):969–978
Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164
Sharp T (2001) An implementation of key-based digital signal steganography. In: Proceedings of 4th international workshop on information hiding, LNCS-2137, pp.13-26, Springer
Turner LF (1989) Digital data security system, Patent IPN, WO 89/08915
Wang J, Sun Y, Xu H, Chen K, Kim HJ, Joo SH (2010) An improved section-wise exploiting modification direction method. Signal Process 90(11):954–2964
Wang XT, Chang CC, Lin CC, Li MC (2012) A novel multi-group exploiting modification direction method based on switch map. Signal Process 92(6):1525–1535
Westfeld A, Pfitzmann A (1999) Attacks on steganographic systems. In: 3th international workshop on information hiding, LNCS-1768, Springer, pp. 61–76
Zhang X, Wang S (2006) Efficient Steganographic Embedding by Exploiting Modification Direction. IEEE Commun Lett 10(11):1–3
Zhang X, Zhang W, Wang S (2007) Efficient double-layered steganographic embedding. Electron Lett 43(8):482–483
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kuo, WC., Chang, SY., Wang, CC. et al. Secure multi-group data hiding based on gemd map. Multimed Tools Appl 76, 1901–1919 (2017). https://doi.org/10.1007/s11042-015-3165-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-3165-5