Abstract
This paper presents a novel algorithm for high capacity image steganography, whose aim is to hide a scanned document as a message into a host image. In this approach, halftoning algorithm is applied to convert the gray-scale scanned document into a binary image, which is a sparse matrix. In the next step, an algorithm is proposed to read the the halftone image, and to convert each bit-stream of the sparse matrix into some meaningful decimal numbers, which are then to be embedded in 3-LSB bits of concealable pixels. Standard deviation is used in order to filter the concealable pixels of stego image and to preserve the quality of stego image. As a result, the smoother area that is sensitive to human visual system will not be chosen for embedding. The experiment results on 20 standard image, indicate that the PSNR measure and the embedding rate are 36.86 dB and 5.25 bpp in average, respectively, which are great progresses in comparison to the state-of-the-art.
Similar content being viewed by others
References
AbdAllah MM, Al G (2011) New scrambling algorithm for hiding scanned documents. African J Math Comput Sci Res 4(9):286–93
Alasseur C, Constantinides AG, Husson L (2003) Colour quantisation through dithering techniques. In: Proceedings of 2003 international conference on image processing, 2003. ICIP 2003, vol 1. IEEE, pp I-469
Balasubramanian C, Selvakumar S, Geetha S (2014) High payload image steganography with reduced distortion using octonary pixel pairing scheme. Multimedia Tools Appl 73(3):2223–45
Borges PV, Mayer J, Izquierdo E (2008) Robust and transparent color modulation for text data hiding. IEEE Trans Multimedia 10(8):1479–89
Chang CC, Nguyen TS, Lin CC (2013) A novel VQ-based reversible data hiding scheme by using hybrid encoding strategies. J Syst Softw 86(2):389–402
Huo Y, He H, Chen F (2014 Sep 1) A semi-fragile image watermarking algorithm with two-stage detection. Multimedia Tools Appl 72(1):123–49
Jana B (2016) High payload reversible data hiding scheme using weighted matrix. Optik-Int J Light Electron Opt 127(6):3347–58
Jung KH, Yoo KY (2015) High-capacity index based data hiding method. Multimedia Tools Appl 74(6):2179–93
Kim HY, Mayer J (2007) Data hiding for binary documents robust to print-scan, photocopy and geometric distortions. In: 10th Brazilian symposium on computer graphics and image processing, 2007. SIBGRAPI 2007. IEEE, pp 105–112
Kumar R, Chand S (2015) A novel high capacity reversible data hiding scheme based on pixel intensity segmentation. Multimedia Tools Appl 1–8
Kurilin IV, Safonov IV, Rychagov MN, Lee H, Kim SH, Choi DC (2011) Embedding positional-independent hidden data into hardcopy. Pattern Recogn Image Anal 21(3):511–4
Laouamer L, Tayan O (2015) A semi-blind robust DCT watermarking approach for sensitive text images. Arab J Sci Eng 40(4):1097–109
Li X (2006) Edge-directed error diffusion Halftoning. IEEE Signal Process Lett 13(11):688
Li X (2011) Inverse Halftoning with nonlocal regularization. In: 18th IEEE international conference on image processing (ICIP), 2011. IEEE, pp 1717–1720
Liu L, Chen W, Zheng W, Geng W (2014) Structure-aware error-diffusion approach using entropy-constrained threshold modulation. Vis Comput 30(10):1145–56
Liu L, Chang CC, Wang A (2015) Reversible data hiding scheme based on histogram shifting of n-bit planes. Multimedia Tools Appl:1–6
Lu TC, Chang CC, Huang YH (2014) High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting. Multimedia Tools Appl 72(1):417–35
Ma X, Pan Z, Hu S, Wang L (2016) Large capacity and high quality reversible data hiding method based on enhanced side match vector quantization. Multimedia Tools Appl 75(1):71–91
Nguyen TD, Arch-int S, Arch-int N (2015) An adaptive multi bit-plane image steganography using block data-hiding. Multimedia Tools Appl 1–27
Preda RO (2013) Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain. Measurement 46(1):367–73
Qazanfari K, Safabakhsh R (2014) A new steganography method which preserves histogram: generalization of LSB++. Inf Sci 277:90–101
Rosales-Roldan L, Cedillo-Hernandez M, Nakano-Miyatake M, Perez-Meana H, Kurkoski B (2013) Watermarking-based image authentication with recovery capability using Halftoning technique. Signal Process Image Commun 28(1):69–83
Shi H, Li MC, Guo C, Tan R (2016) A region-adaptive semi-fragile dual watermarking scheme. Multimedia Tools Appl 75(1):465–95
Singh YK (2015) Generalized error diffusion method for Halftoning. In: IEEE international conference on electrical, computer and communication technologies (ICECCT), 2015. IEEE, pp 1–6
SIPI Image Database (2016) Sipi.usc.edu. N.p., 2016. Web. 25
Soleymani SH, Taherinia AH (2015) Robust image watermarking based on ICA-DCT and noise augmentation technique. In: 5th international conference on computer and knowledge engineering (ICCKE), 2015. IEEE, pp 18–23
Soleymani SH, Taherinia AH (2016) Double expanding robust image watermarking based on spread spectrum technique and BCH coding. Multimedia Tools Appl 12:1–9
Stevenson RL (1997 Apr) Inverse Halftoning via MAP estimation. IEEE Trans Image Process 6(4): 574–83
Subhedar MS, Mankar VH (2014) Current status and key issues in image steganography: a survey. Comput Sci Rev 13:95–113
Taherinia AH, Jamzad M (2010) A new spread spectrum watermarking method using two levels DCT. Int J Electron Secur Digit Forensics 3(1):1–26
Tang M, Hu J, Song W (2014) A high capacity image steganography using multi-layer embedding. Optik-Int J Light Electron Opt 125(15):3972–6
Tang M, Zeng S, Chen X, Hu J, Du Y (2016) An adaptive image steganography using AMBTC compression and interpolation technique. Optik-Int J Light Electron Opt 127(1):471–7
Tsang PW, Tsang WH (1996) Preservation of interlaced patterns in encoding video signals using side match vector quantization. IEEE Trans Consum Electron 42 (1):112–20
Villán R, Voloshynovskiy S, Koval O, Vila J, Topak E, Deguillaume F, Rytsar Y, Pun T (2006) Text data-hiding for digital and printed documents: theoretical and practical considerations. In: Electronic imaging 2006. International Society for Optics and Photonics, pp 607212–607212
Yang J, Guo J, Chao H (2015) Inverse Halftoning with grouping singular value decomposition. In: IEEE international conference on image processing (ICIP), 2015. IEEE, pp 1463–1467
Zhou Z, Arce GR, Di Crescenzo G (2006) Halftone visual cryptography. IEEE Trans Image Process 15(8):2441–53
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Soleymani, S.H., Taherinia, A.H. High capacity image steganography on sparse message of scanned document image (SMSDI). Multimed Tools Appl 76, 20847–20867 (2017). https://doi.org/10.1007/s11042-016-4009-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-4009-7