Advertisement

Minimizing the Distortion Spatial Data Hiding Based on Equivalence Class

  • Shaohui Liu
  • Hongxun Yao
  • Wen Gao
  • Dingguo Yang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4681)

Abstract

Data hiding strategy based on equivalence class is proposed. We transform information hiding problem into finding the representative element in specific equivalence class. Then minimizing the distortion in the equivalence class (MDEC) is proposed, and this is used in the LSB hiding scheme. The theoretic performance of LSB hiding based on MDEC is analyzed in detail. Then a variable LSB method based on MDEC is also proposed. It can solve efficiently the problem of selecting different LSB methods to fit message with different length. Similarly, the performance is also proposed. In fact, there exists a tradeoff between distortion and length of information. However, most spatial hiding scheme based on LSB will reach larger distortion in hiding less information. The proposed hiding strategy can resolve this issue efficiently and can meet such applications where the size of message is very unstable. In addition, proposed strategy not only improves the quality of steg image but also does not sacrifice its security.

Keywords

Data hiding Equivalence class LSB 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding – a Survey. Proceedings of the IEEE 87(7), 1062–1078 (1999)CrossRefGoogle Scholar
  2. 2.
    Tirkel, A.Z., Rankin, G.A., Schyndel, R.M.V.: Electronic Watermark. In: Proceedings of Int. Conf. Digital Image Computing, Technology and Applications, Technology and Applications, pp. 666–672 (1993)Google Scholar
  3. 3.
    Schyndel, R.G.V., Tirkel, A.Z., Osborne, C.F.: A Digital Watermark. Proceedings of IEEE Int. Conf. Image Processing 2, 86–90 (1994)CrossRefGoogle Scholar
  4. 4.
    Schyndel, R.G.V., Tirkel, A.Z., Osborne, C.F.: A Two Dimensional Watermark. In: Proceedings Int. Conf. Digital Image Computing, Technology and Applications, pp. 378–383 (1995)Google Scholar
  5. 5.
    Bender, W., Gruhl, D., Morimot, N., Lu, A.: Techniques for Data Hiding. IBM Systems Journal 35(3-4), 313–336 (1996)CrossRefGoogle Scholar
  6. 6.
    Nikolaidis, N., Pitas, I.: Copyright Protection of Images Using Robust Digital Signatures. In: Proceedings of IEEE Int. Conf. on Acoustics Speech and Signal Processing, pp. 2168–2717. IEEE Computer Society Press, Los Alamitos (1996)CrossRefGoogle Scholar
  7. 7.
    Wang, R.Z., Lin, C.F., Lin, J.C.: Hiding Data in Images By Optimal Moderately-Significant-Bit Replacement. IEE Electronics Letters 36(25), 2069–2070 (2000)CrossRefGoogle Scholar
  8. 8.
    Chan, C.K., Cheng, L.M.: Hiding Data in Images By Simple LSB Substitution. Pattern Recognition 37(3), 469–474 (2004)zbMATHCrossRefGoogle Scholar
  9. 9.
    Mielikainen, J.: LSB Matching Revisited. IEEE Signal Processing Letters 13(5), 285–287 (2006)CrossRefGoogle Scholar
  10. 10.
    Wang, R.Z., Lin, C.F., Lin, J.C.: Image Hiding By Optimal LSB Substitution and Genetic Algorithm. Pattern Recognition 34(3), 671–683 (2001)zbMATHCrossRefGoogle Scholar
  11. 11.
    Chang, C.C., Hsiao, J.Y., Chan, C.S.: Finding Optimal Least-Significant-Bit Substitution in Image Hiding By Dynamic Programming Strategy. Pattern Recognition 36(7), 1583–1595 (2003)CrossRefGoogle Scholar
  12. 12.
    Chan, C.K., Cheng, L.M.: Improved Hiding Data in Images By Optimal Moderately-Significant-Bit Replacement. IEE Electronics Letters 37(16), 1017–1018 (2001)CrossRefGoogle Scholar
  13. 13.
    Thien, C.C., Lin, J.C.: A Simple and High-hiding Capacity Method for Hiding Digit-by-digit Data in Images Based on Modulus Function. Pattern Recognition 36(12), 2875–2881 (2006)CrossRefGoogle Scholar
  14. 14.
    Wang, S.J.: Steganography of Capacity Required Using Modulo Operator for Embedding Secret Image. Applied Mathematics and Computation 164(1), 99–116 (2006)CrossRefGoogle Scholar
  15. 15.
    Chang, C.C., Chan, C.S., Fan, Y.H.: Image Hiding Scheme with Modulus Function and Dynamic Programming Strategy on Partitioned Pixels. Pattern Recognition 39(6), 1155–1167 (2006)zbMATHCrossRefGoogle Scholar
  16. 16.
    Fridrich, J., Goljan, M.: Detecting LSB Steganography in Color and Grayscale Images. Magazine of IEEE Multimedia 8(4), 22–28 (2001)CrossRefGoogle Scholar

Copyright information

© Springer Berlin Heidelberg 2007

Authors and Affiliations

  • Shaohui Liu
    • 1
  • Hongxun Yao
    • 1
  • Wen Gao
    • 1
  • Dingguo Yang
    • 1
  1. 1.VILAB, School of Computer Science and Techonolgy, Harbin Instititue of Technology, 150001 HarbinP.R. China

Personalised recommendations