A Novel Data Hiding Method Using Sphere Encoding

  • Ching-Min Hu
  • Ran-Zan Wang
  • Shang-Kuan Chen
  • Wen-Pinn Fang
  • Yu-Jie Chang
  • Yeuan-Kuen Lee
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 238)

Abstract

In this paper a novel data hiding scheme using least square mapping is proposed. The method conceals a k-ary secret digit in n-pixel block in which the embedding function with minimum mean square error (MSE) between the cover block and the stego-block is searched. The constructions for the proposed method in three-pixel block (sphere encoding) under different k are demonstrated. Experiment results show that the proposed scheme achieves higher embedding efficiency than several reported steganographic schemes.

Keywords

Data Hiding Steganography Information Hiding Sphere Encoding 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal 35(3&4), 313–336 (1996)CrossRefGoogle Scholar
  2. 2.
    Johnson, N.F., Jajodia, S.: Exploring stegnography: seeing the unseen. IEEE Computer 31(2), 26–34 (1998)CrossRefGoogle Scholar
  3. 3.
    Thien, C.C., Lin, J.C.: A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition 36(12), 2875–2881 (2003)CrossRefMATHGoogle Scholar
  4. 4.
    Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recognition 37(3), 469–474 (2004)CrossRefMATHGoogle Scholar
  5. 5.
    Mielikainen, J.: LSB matching revisited. IEEE Signal Processing Letters 13(5), 285–287 (2006)CrossRefGoogle Scholar
  6. 6.
    Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction. IEEE Communication Letters 10(11), 782–783 (2006)Google Scholar
  7. 7.
    Chao, R.M., Wu, H.C., Lee, C.C., Chu, Y.P.: A novel image data hiding scheme with diamond encoding. EURASIP Journal on Information Security, Article ID 658047, 1–9 (2009)Google Scholar
  8. 8.
    Hong, W., Chen, T.S.: A novel data embedding method using adaptive pixel pair matching. IEEE Transactions on Information Forensics and Security 7(1), 176–184 (2012)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Ching-Min Hu
    • 1
  • Ran-Zan Wang
    • 1
  • Shang-Kuan Chen
    • 2
  • Wen-Pinn Fang
    • 2
  • Yu-Jie Chang
    • 3
  • Yeuan-Kuen Lee
    • 4
  1. 1.Department of Computer Science & EngineeringYuan Ze UniversityZhongliTaiwan
  2. 2.Department of Computer Science & Information EngineeringYuan Pei UniversityZhongliTaiwan
  3. 3.Department of Computer & Communication EngineeringNational Kaohsiung First University of Science and TechnologyKaohsiungTaiwan
  4. 4.Department of Computer Science & Information ScienceMing Chuan UniversityGuishanTaiwan

Personalised recommendations