Preview

Steganography: Interpolation and Image

Powerful Essays
Open Document
Open Document
6788 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Steganography: Interpolation and Image
Expert Systems with Applications 39 (2012) 6712–6719

Contents lists available at SciVerse ScienceDirect

Expert Systems with Applications journal homepage: www.elsevier.com/locate/eswa

An efficient image interpolation increasing payload in reversible data hiding
Chin-Feng Lee ⇑, Yu-Lin Huang
Department of Information Management, Chaoyang University of Technology, Taichung 41349, Taiwan

a r t i c l e

i n f o

a b s t r a c t
Image interpolation is a very important branch in image processing. It is widely used in imaging world, for example, image interpolation is often used in 3-D medical image to compensate for information insufficiency during image reconstruction by simulating additional images between two-dimensional images. Reversible data hiding has become significant branch in information hiding field. Reversibility allows the original media to be completely restored without any degradation after the embedded messages have been extracted. This study proposes a high-capacity image hiding scheme by exploiting an interpolating method called Interpolation by Neighboring Pixels (INP) on Maximum Difference Values to improve the performance of data hiding scheme proposed by Jung and Yoo. The proposed scheme offers the benefits of high embedding capacity with low computational complexity and good image quality. The experimental results showed that the proposed scheme has good performance for payload up to 2.28 bpp. Moreover, the INP yields higher PSNRs than other interpolating methods such as NMI, NNI and BI. Ó 2011 Elsevier Ltd. All rights reserved.

Keywords: Reversible data hiding Steganography Image interpolation

1. Introduction Data hiding is an information security technology used for protecting information not to be perceptible, where a sender can use the data hiding technique to hide information from being detected, stolen, or damaged by unauthorized users during transmission via public networks. Data hiding is able to avoid detection that



References: Alattar, A. M. (2004). Reversible watermark using the difference expansion of a generalized integer transform. IEEE Transactions on Image Processing, 13, 1147–1156. Allebach, J., & Wong, P.W. (1996). Edge-directed interpolation, In International conference on image processing (pp. 707–710). Celik, M. U., Sharma, G., Tekalp, A. M., & Saber, E. (2005). Lossless generalized-LSB data embedding. IEEE Transactions on Image Processing, 14, 253–266. Chan, C. K., & Cheng, L. M. (2004). Hiding data in images by simple LSB substitution. Pattern Recognition, 37, 469–474. Chen, W. J., Chang, C. C., & Le, T. H. N. (2010). High payload steganography mechanism using hybrid edge detector. Expert Systems with Applications, 37, 3292–3301. Jung, K. H., & Yoo, K. Y. (2009). Data hiding method using image interpolation. Computer Standards & Interfaces, 31, 465–470. Lee, C. F., & Chang, W. T. (2010). Recovery of color images by composed associative mining and edge detection. Journal of Information Hiding and Multimedia Signal Processing, 1, 310–324. Lee, C. F., Chang, C. C., Pai, P. Y., & Huang, W. H. (2010). An effective demosaicing method for CFA image. International Journal of Innovative Computing, Information and Control, 6, 5485–5499. Lee, C. F., & Chen, H. L. (2010). A novel data hiding scheme based on modulus function. Journal of Systems and Software, 83, 832–843. Lehmann, T. M., Gonner, C., & Spitzer, K. (1999). Survey: interpolation methods in medical image processing. IEEE Transactions on Medical Imaging, 18, 1049–1075. Ni, Z., Shi, Y. Q., Ansari, N., & Su, W. (2006). Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology, 16, 354–362. Sun, H. M., Weng, C. Y., Lee, C. F., & Yang, C. H. (2011). Anti-forensics with Steganographic Data Embedding in Digital Images. IEEE Journal on Selected Areas in Communications, 29, 1392–1403. Thévenaz, P., Blu, T., & Unser, M. (2000). Interpolation revisited. IEEE Transactions on Medical Imaging, 19, 739–758. Tian, J. (2003). Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology, 13, 890–896. Weng, S. W., Zhao, Y., & Pan, J. S. (2008). A novel reversible data hiding scheme. International Journal of Innovative Computing, Information and Control, 4, 351–358. Xin, L., & Orchard, M. T. (2001). New edge-directed interpolation. IEEE Transactions on Image Processing, 10, 1521–1527. Yang, C. H., Weng, C. Y., Wang, S. J., & Sun, H. M. (2008). Adaptive data hiding in edged areas of images with spatial LSB domain systems. IEEE Transactions on Information Forensics and Security, 3, 488–497.

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. digital watermark (Incorrect. A digital watermark is used to identify proprietary data, but it does not protect privacy.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Better Essays

    Another way to determine whether an image has been manipulated or not relies on the fact that in a digital…

    • 1137 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Steganalysis is the art of detecting and breaking steganography (Kessler, 2001). One such program is StegDetect, created by Niels Provos. This program will only detect data in JPG files, making it extremely limited (Steganography, 2001). There is also a website that can help detect isolated examples at www.guillermito2.net. With so many programs available to use to hide data, it makes it extremely difficult to detect the hidden data. The first step in steganography detection is to have suspicion that there is even a hidden message in the data at all. Next you need to find the right software to find the hidden message. And finally knowing the encryption algorithm used in the first place. As you can see, steganalysis is not an easy task.…

    • 789 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Coding: Questions

    • 2042 Words
    • 18 Pages

    Data hiding, which means that critical data stored inside the object is protected from code outside the object is accomplished in Java by…

    • 2042 Words
    • 18 Pages
    Good Essays
  • Good Essays

    Photo Manipulation

    • 757 Words
    • 4 Pages

    With digital processing, there is almost no limit to what can be done to an image, and many things…

    • 757 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Li, Yingjiu, Guo, Huiping, and Wang, Shuhong. (2008). A Multiple-Bits Watermark for Relational Data. Journal of Database Management, 19(3), 1-21. Retrieved from Computer Database (http://proxy.nss.udel.edu:2104/gtx/start.do?prodId=CDB&userGroupName=udel_main)…

    • 2529 Words
    • 11 Pages
    Best Essays
  • Best Essays

    Nag, A. et al. (2010). A Novel Technique For Image Steganography Based On Block-DCT And Huffman Encoding. [online] Retrieved from: http://arxiv.org/ftp/arxiv/papers/1006/1006.1186.pdf [Accessed: 21 Feb 2013].…

    • 2772 Words
    • 10 Pages
    Best Essays
  • Good Essays

    Digital image manipulation refers to the process of digitally doctoring a photograph, to alter the original image, often generating a new meaning. Re-arranging and changing photographs has been around almost as long as photograph has itself, but as digital imaging hardware and software has both advance and have decreased in price, the practice of digital image manipulation has been put into practice more, and is harder to spot out fake photos. After all these procedures have been done it then producers a new image with hidden truths and false messages. This often affects people emotionally or may change the reality of life.…

    • 716 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    People have desired to keep certain sensitive communications secret for thousands of years. In our new age of digital media and internet communications, this need often seems even more pressing. This paper presents general information about steganography, the art of data hiding. The paper provides an overview of steganography, general forms of steganography, specific steganographic methods, and recent developments in the field. The information presented in this paper is also applied to a program developed by the author, and some sample runs of the program are presented.…

    • 10575 Words
    • 43 Pages
    Powerful Essays
  • Powerful Essays

    Data Masking

    • 4525 Words
    • 19 Pages

    increases, more and more data gets shared, thus further increasing the risk of a data breach,…

    • 4525 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Dream Place

    • 722 Words
    • 3 Pages

    Our research focuses on designing watermarking schemes that can resist collusion attacks. One branch of our work aims to construct code based on abstract assumptions about the embedding layer.1 Another is embedding-focused and does not explore code structures.2 Our study shows that the code-based strategy has the advantage of low computational complexity, but the embedding-based scheme holds the benefit of high collusion resistance, which is measured by the number of colluders that can be caught within a certain probability of detection. We describe a design that considers both coding and embedding layers to…

    • 722 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    information is critical for dealing with the storage and transmission of high resolution images and videos that dominate the…

    • 3325 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    the spatial locations and then define a data structure in the form of a hierarchical…

    • 2985 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    The most common methods of obfuscation are numeric variance, character scrambling, nulling, aggregating, encoding, artificial data generating, and repeating of the character masking process (Magnabosco, 2009). These methods rely on functions that exist in the SQL system server.…

    • 684 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    RRL S.I.P. draft

    • 594 Words
    • 3 Pages

    (David Jin and Sally Jin ,Advances in Multimedia, Software Engineering and Computing Vol. 1,2011, China, Springer-Verlag Berlin Hiedelberg,pg.227).…

    • 594 Words
    • 3 Pages
    Satisfactory Essays