Skip to main content

Advertisement

Log in

High capacity image steganography on sparse message of scanned document image (SMSDI)

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper presents a novel algorithm for high capacity image steganography, whose aim is to hide a scanned document as a message into a host image. In this approach, halftoning algorithm is applied to convert the gray-scale scanned document into a binary image, which is a sparse matrix. In the next step, an algorithm is proposed to read the the halftone image, and to convert each bit-stream of the sparse matrix into some meaningful decimal numbers, which are then to be embedded in 3-LSB bits of concealable pixels. Standard deviation is used in order to filter the concealable pixels of stego image and to preserve the quality of stego image. As a result, the smoother area that is sensitive to human visual system will not be chosen for embedding. The experiment results on 20 standard image, indicate that the PSNR measure and the embedding rate are 36.86 dB and 5.25 bpp in average, respectively, which are great progresses in comparison to the state-of-the-art.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. AbdAllah MM, Al G (2011) New scrambling algorithm for hiding scanned documents. African J Math Comput Sci Res 4(9):286–93

    Google Scholar 

  2. Alasseur C, Constantinides AG, Husson L (2003) Colour quantisation through dithering techniques. In: Proceedings of 2003 international conference on image processing, 2003. ICIP 2003, vol 1. IEEE, pp I-469

  3. Balasubramanian C, Selvakumar S, Geetha S (2014) High payload image steganography with reduced distortion using octonary pixel pairing scheme. Multimedia Tools Appl 73(3):2223–45

    Article  Google Scholar 

  4. Borges PV, Mayer J, Izquierdo E (2008) Robust and transparent color modulation for text data hiding. IEEE Trans Multimedia 10(8):1479–89

    Article  Google Scholar 

  5. Chang CC, Nguyen TS, Lin CC (2013) A novel VQ-based reversible data hiding scheme by using hybrid encoding strategies. J Syst Softw 86(2):389–402

    Article  Google Scholar 

  6. Huo Y, He H, Chen F (2014 Sep 1) A semi-fragile image watermarking algorithm with two-stage detection. Multimedia Tools Appl 72(1):123–49

  7. Jana B (2016) High payload reversible data hiding scheme using weighted matrix. Optik-Int J Light Electron Opt 127(6):3347–58

    Article  Google Scholar 

  8. Jung KH, Yoo KY (2015) High-capacity index based data hiding method. Multimedia Tools Appl 74(6):2179–93

    Article  Google Scholar 

  9. Kim HY, Mayer J (2007) Data hiding for binary documents robust to print-scan, photocopy and geometric distortions. In: 10th Brazilian symposium on computer graphics and image processing, 2007. SIBGRAPI 2007. IEEE, pp 105–112

  10. Kumar R, Chand S (2015) A novel high capacity reversible data hiding scheme based on pixel intensity segmentation. Multimedia Tools Appl 1–8

  11. Kurilin IV, Safonov IV, Rychagov MN, Lee H, Kim SH, Choi DC (2011) Embedding positional-independent hidden data into hardcopy. Pattern Recogn Image Anal 21(3):511–4

    Article  Google Scholar 

  12. Laouamer L, Tayan O (2015) A semi-blind robust DCT watermarking approach for sensitive text images. Arab J Sci Eng 40(4):1097–109

    Article  Google Scholar 

  13. Li X (2006) Edge-directed error diffusion Halftoning. IEEE Signal Process Lett 13(11):688

    Article  Google Scholar 

  14. Li X (2011) Inverse Halftoning with nonlocal regularization. In: 18th IEEE international conference on image processing (ICIP), 2011. IEEE, pp 1717–1720

  15. Liu L, Chen W, Zheng W, Geng W (2014) Structure-aware error-diffusion approach using entropy-constrained threshold modulation. Vis Comput 30(10):1145–56

    Article  Google Scholar 

  16. Liu L, Chang CC, Wang A (2015) Reversible data hiding scheme based on histogram shifting of n-bit planes. Multimedia Tools Appl:1–6

  17. Lu TC, Chang CC, Huang YH (2014) High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting. Multimedia Tools Appl 72(1):417–35

    Article  Google Scholar 

  18. Ma X, Pan Z, Hu S, Wang L (2016) Large capacity and high quality reversible data hiding method based on enhanced side match vector quantization. Multimedia Tools Appl 75(1):71–91

    Article  Google Scholar 

  19. Nguyen TD, Arch-int S, Arch-int N (2015) An adaptive multi bit-plane image steganography using block data-hiding. Multimedia Tools Appl 1–27

  20. Preda RO (2013) Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain. Measurement 46(1):367–73

    Article  Google Scholar 

  21. Qazanfari K, Safabakhsh R (2014) A new steganography method which preserves histogram: generalization of LSB++. Inf Sci 277:90–101

    Article  MathSciNet  Google Scholar 

  22. Rosales-Roldan L, Cedillo-Hernandez M, Nakano-Miyatake M, Perez-Meana H, Kurkoski B (2013) Watermarking-based image authentication with recovery capability using Halftoning technique. Signal Process Image Commun 28(1):69–83

    Article  Google Scholar 

  23. Shi H, Li MC, Guo C, Tan R (2016) A region-adaptive semi-fragile dual watermarking scheme. Multimedia Tools Appl 75(1):465–95

    Article  Google Scholar 

  24. Singh YK (2015) Generalized error diffusion method for Halftoning. In: IEEE international conference on electrical, computer and communication technologies (ICECCT), 2015. IEEE, pp 1–6

  25. SIPI Image Database (2016) Sipi.usc.edu. N.p., 2016. Web. 25

  26. Soleymani SH, Taherinia AH (2015) Robust image watermarking based on ICA-DCT and noise augmentation technique. In: 5th international conference on computer and knowledge engineering (ICCKE), 2015. IEEE, pp 18–23

  27. Soleymani SH, Taherinia AH (2016) Double expanding robust image watermarking based on spread spectrum technique and BCH coding. Multimedia Tools Appl 12:1–9

    Google Scholar 

  28. Stevenson RL (1997 Apr) Inverse Halftoning via MAP estimation. IEEE Trans Image Process 6(4): 574–83

  29. Subhedar MS, Mankar VH (2014) Current status and key issues in image steganography: a survey. Comput Sci Rev 13:95–113

  30. Taherinia AH, Jamzad M (2010) A new spread spectrum watermarking method using two levels DCT. Int J Electron Secur Digit Forensics 3(1):1–26

    Article  Google Scholar 

  31. Tang M, Hu J, Song W (2014) A high capacity image steganography using multi-layer embedding. Optik-Int J Light Electron Opt 125(15):3972–6

    Article  Google Scholar 

  32. Tang M, Zeng S, Chen X, Hu J, Du Y (2016) An adaptive image steganography using AMBTC compression and interpolation technique. Optik-Int J Light Electron Opt 127(1):471–7

    Article  Google Scholar 

  33. Tsang PW, Tsang WH (1996) Preservation of interlaced patterns in encoding video signals using side match vector quantization. IEEE Trans Consum Electron 42 (1):112–20

    Article  Google Scholar 

  34. Villán R, Voloshynovskiy S, Koval O, Vila J, Topak E, Deguillaume F, Rytsar Y, Pun T (2006) Text data-hiding for digital and printed documents: theoretical and practical considerations. In: Electronic imaging 2006. International Society for Optics and Photonics, pp 607212–607212

  35. Yang J, Guo J, Chao H (2015) Inverse Halftoning with grouping singular value decomposition. In: IEEE international conference on image processing (ICIP), 2015. IEEE, pp 1463–1467

  36. Zhou Z, Arce GR, Di Crescenzo G (2006) Halftone visual cryptography. IEEE Trans Image Process 15(8):2441–53

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amir Hossein Taherinia.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Soleymani, S.H., Taherinia, A.H. High capacity image steganography on sparse message of scanned document image (SMSDI). Multimed Tools Appl 76, 20847–20867 (2017). https://doi.org/10.1007/s11042-016-4009-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-4009-7

Keywords

Navigation