Advertisement

An Efficient Method for Improving Hiding Capacity for JPEG2000 Images

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 216)

Abstract

Information hiding techniques have recently become important in a number of application areas. The redundancy of digital media, as well as the characteristic of human visual system, makes it possible to hide messages. In this paper, a detailed review on various information hiding techniques discussed both in spatial and wavelet domain and focused on the problem of how to enhance the hiding capacity for JPEG2000 images as it is really a challenging problem because of limited redundancy and bit stream truncation. Spatial domain techniques spanning from Least Significant Bit (LSB) method, Least Pixel Adjustment Process (LPAP), and wavelet-based techniques include, Discrete Cosine Transform (DCT) method, Discrete Wavelet Transform (DWT) based techniques and spread spectrum techniques. Finally, JPEG2000 Architecture and high capacity steganography scheme for JPEG2000 Baseline system are described. Hiding capacity is very important for efficient covert communications. Available redundancy is very limited in JPEG2000 compressed images. So it is necessary to enlarge the hiding capacity and also it is very difficult to hide the information because of the bit stream truncation. Here a high-capacity steganography scheme is proposed for JPEG2000 baseline system, which uses bit-plane encoding procedure multiple times to solve the problem due to bit stream truncation and redundancy evaluation method, is used to increase hiding capacity.

Keywords

Steganography JPEG2000 Bit-plane encoding 

References

  1. 1.
    Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recognit. 37(3), 469–474 (2004)CrossRefMATHGoogle Scholar
  2. 2.
    Wu, H.C., Wu, N.I., Tsai, C.S., Hwang, M.S.: Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proc. Vis., Image. Signal Process. 152(5), 611–615 (2005)Google Scholar
  3. 3.
    Zhang, L., Wang, H., Wu, R.: A high-capacity Steganography scheme for JPEG2000 baseline system. IEEE Trans. Image Process. 18(8), 1797–1803 (2009)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Grosbois, R., Ebrahimi, T.: Watermarking in the JPEG2000 domain. In Proceedings of IEEE 4th Workshop on Multimedia Signal, France, pp. s339–s344, 2001 Google Scholar
  5. 5.
    Ingemar, J.C., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673–1687 (1997)CrossRefGoogle Scholar
  6. 6.
    Christopoulos, C., Skodras, A., Ebrahimi, T.: The JPEG2000 still image coding system: an overview. IEEE Trans. Consum. Electron. 46(4), 1103–1127 (2000)CrossRefGoogle Scholar
  7. 7.
    Tolbal, F., Ghonemy, A., Taha, A., Khalifa, S.: Using integer wavelet transforms in colored image Steganography. Int. J. Intell. Cooper. Inform. Syst. 4(2), 230–235 (2004)Google Scholar
  8. 8.
    JPEG2000Part 1: Final Committee Draft Version 1.0, ISO/IEC. FCD information hiding.15444-1, 2000.Google Scholar
  9. 9.
    Su, P.C., Kuo, C.C.J.: Steganography in JPEG2000 compressed images. IEEE Trans. Consum. Electron. 49(4), 824–832 (2003) Google Scholar
  10. 10.
    Andersonand, R.J., Petitcolas, F.A.P.: On the limits of Steganography. IEEE J. Sel. Areas Commun. 16, 474–481 (1998)CrossRefGoogle Scholar
  11. 11.
    Cummins, J., Diskin, P., Lau, S., Parlett, R.: Steganography and Digital Watermarking. The University of Birmingham, School of Computer Science, London, UK (2004)Google Scholar
  12. 12.
    Cheddad, A., Condell, J., Curran, K., Kevitt, P.M.: Digital image Steganography: survey and analysis of current methods. IEEE Trans. Image Process. 6(12), 1673–1687 (1997)CrossRefGoogle Scholar
  13. 13.
    Abdelwahab, A.A., Hassaan, L.A.: A discrete wavelet transform based technique for image data hiding. Paper presented at radio science conference, NRSC 2008, Egypt, pp. 1–9, 2008 Google Scholar

Copyright information

© Springer India 2014

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringMES College of EngineeringMalappuramIndia

Personalised recommendations