Advertisement

A Data Hiding Approach Based on Reference-Affected Matrix

  • Trong-The NguyenEmail author
  • Jeng-Shyang Pan
  • Truong-Giang Ngo
  • Thi-Kien Dao
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 156)

Abstract

Data security has got many remarkable achievements. However, the issues of the lower distortion and the higher embedding capacity in the embedded secret data in media have not much been considered by scholars. This paper proposes a new data hiding approach to the embedded secrets based on the guidance of the x-cross-shaped reference-affected matrix to solve these issues. Adjacent pixels would be found out large area with similar values which can utilize for manipulating data embedding and extracting on a difference–coordinate plan instead of the traditional pixel–coordinate plan. Three parts: petal matrix, calyx matrix, and stamen matrix are combined for data embedding by using the x-cross-shaped reference matrix. The experimental results compared with the previous methods in the literature shows that the proposed approach brings outstanding payload with the cover visual quality.

Keywords

Steganography Data hiding Data embedding and extracting 

References

  1. 1.
    Jayaram, P., Ranganatha, H.R., Anupama, H.S.: Information hiding using audio steganography—a survey. Int. J. Multimed. Appl. 3, 86–96 (2011)CrossRefGoogle Scholar
  2. 2.
    Li, B., He, J., Huang, J., Qing Shi, Y.: A survey on image steganography and steganalysis. J. Inf. Hiding Multimed. Signal Process. 2, 142–172 (2011)Google Scholar
  3. 3.
    Ngo, T.-G., Nguyen, T.-T., Ngo, Q.-T., Nguyen, D.-D., Chu, S.-C.: Similarity shape based on skeleton graph matching. J. Inf. Hiding Multimed. Signal Process. 7, 1254–1264 (2016)Google Scholar
  4. 4.
    Hu, Y.-C., Tsou, C.-C., Su, B.-H.: Grayscale image hiding based on modulus function and greedy method. Fundam. Inform. 86 (2008)Google Scholar
  5. 5.
    Yang, C.H.: Inverted pattern approach to improve image quality of information hiding by LSB substitution. Pattern Recognit. 41, 2674–2683 (2008)CrossRefGoogle Scholar
  6. 6.
    Boopathy, R., Ramakrishnan, M., Victor, S.P.: Modified LSB method using new cryptographic algorithm for steganography. In: Advances in Intelligent Systems and Computing, pp. 591–600 (2014).  https://doi.org/10.1007/978-81-322-1602-5_63Google Scholar
  7. 7.
    Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 10, 781–783 (2006)CrossRefGoogle Scholar
  8. 8.
    Liu, L., Chang, C.C., Wang, A.: Data hiding based on extended turtle shell matrix construction method. Multimed. Tools Appl. 76, 12233–12250 (2017).  https://doi.org/10.1007/s11042-016-3624-7CrossRefGoogle Scholar
  9. 9.
    Jin, Q., Li, Z., Chang, C.C., Wang, A., Liu, L.: Minimizing turtle-shell matrix based stego image distortion using particle swarm optimization. Int. J. Netw. Secur. 19, 154–162 (2017).  https://doi.org/10.6633/IJNS.201701.19(1).16
  10. 10.
    Kurup, S., Rodrigues, A., Bhise, A.: Data hiding scheme based on octagon shaped shell. In: 2015 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2015, pp. 1982–1986 (2015).  https://doi.org/10.1109/ICACCI.2015.7275908
  11. 11.
    Lin, L., Hongbing, J.: Signal feature extraction based on an improved EMD method. Meas. J. Int. Meas. Confed. 42, 796–803 (2009)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Trong-The Nguyen
    • 1
    • 2
    Email author
  • Jeng-Shyang Pan
    • 1
  • Truong-Giang Ngo
    • 2
  • Thi-Kien Dao
    • 1
  1. 1.Fujian Provincial Key Lab of Big Data Mining and ApplicationsFujian University of TechnologyFuzhouChina
  2. 2.Department of Information TechnologyHaiphong Private UniversityHaiphongVietnam

Personalised recommendations