Data Hiding Based on Palette Images Using Weak Bases of Z2-Modules

  • Phan Trung Huy
  • Cheonshik Kim
  • Nguyen Tuan Anh
  • Le Quang Hoa
  • Ching-Nung Yang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7861)

Abstract

Many steganography schemes were invented for the purpose of safe communication. Such previous schemes often show good and reasonable performance, however, few have been based on paletted images; it is not easy to invent good steganographic schemes with little evidence of data hiding. In this paper, we propose new hiding schemes (r, N, k) based on binary images. The proposed hiding scheme (r, N, k) applied to paletted images using the Optimal Parity Assignment (OPA) approach. Experimental results show that the proposed palette-scheme (3,18,9) exhibits good performance compared to that of previous schemes.

Keywords

data hiding paletted image Z2-modules r-weak base optimal parity assignment 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bierbrauer, J., Fridrich, J.: Constructing Good Covering Codes for Applications in Steganography. In: Shi, Y.Q. (ed.) Transactions on Data Hiding and Multimedia Security III. LNCS, vol. 4920, pp. 1–22. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  2. 2.
    EZStego[EB/OL]: http://www.informatik.htw-dresden.de/~fritzsch/VWA/Source/ (since December 10, 2012)
  3. 3.
    Fridrich, J., Du, R.: Secure Steganographic Methods for Palette Images. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 47–60. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  4. 4.
    Phan, T.H., Nguyen, H.T.: On the Maximality of Secret Data Ratio in CPTE Schemes. In: Nguyen, N.T., Kim, C.-G., Janiak, A. (eds.) ACIIDS 2011, Part I. LNCS, vol. 6591, pp. 88–99. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  5. 5.
    Huy, P.T., Thanh, N.H., Thang, T.M., Dat, N.T.: On Fastest Optimal Parity Assignments in Palette Images. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ACIIDS 2012, Part II. LNCS, vol. 7197, pp. 234–244. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  6. 6.
    Zhang, X., Wang, S.: Vulnerability of Pixel-Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security. Pattern Recognition Letters 25, 331–339 (2004)CrossRefGoogle Scholar
  7. 7.
    Zhang, X., Wang, S.: Analysis of Parity Assignment Steganography in Palette Images. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005, Part III. LNCS (LNAI), vol. 3683, pp. 1025–1031. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  8. 8.
    Tseng, Y.-C., Pan, H.-K.: Secure and Invisible Data Hiding in 2-Color Images. In: Proceedings of INFOCOM 2001, pp. 887–896 (2001)Google Scholar
  9. 9.
    Zhang, X., Wang, S., Zhou, Z.: Multibit Assignment Steganography in Palette Images. IEEE Signal Processing Letters 15, 553–556 (2008)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Phan Trung Huy
    • 1
  • Cheonshik Kim
    • 2
  • Nguyen Tuan Anh
    • 1
  • Le Quang Hoa
    • 1
  • Ching-Nung Yang
    • 3
  1. 1.Hanoi University of Science and TechnologyVietnam
  2. 2.Dept. of Digital Media EngineeringAnyang UniversityAnyang-siKorea
  3. 3.Department of Computer Science and Information EngineeringNational Dong Hwa UniversityHualienTaiwan

Personalised recommendations