Preview

Steganography: Interpolation and Image

Powerful Essays
Open Document
Open Document
6788 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Steganography: Interpolation and Image
Expert Systems with Applications 39 (2012) 6712–6719

Contents lists available at SciVerse ScienceDirect

Expert Systems with Applications journal homepage: www.elsevier.com/locate/eswa

An efficient image interpolation increasing payload in reversible data hiding
Chin-Feng Lee ⇑, Yu-Lin Huang
Department of Information Management, Chaoyang University of Technology, Taichung 41349, Taiwan

a r t i c l e

i n f o

a b s t r a c t
Image interpolation is a very important branch in image processing. It is widely used in imaging world, for example, image interpolation is often used in 3-D medical image to compensate for information insufficiency during image reconstruction by simulating additional images between two-dimensional images. Reversible data hiding has become significant branch in information hiding field. Reversibility allows the original media to be completely restored without any degradation after the embedded messages have been extracted. This study proposes a high-capacity image hiding scheme by exploiting an interpolating method called Interpolation by Neighboring Pixels (INP) on Maximum Difference Values to improve the performance of data hiding scheme proposed by Jung and Yoo. The proposed scheme offers the benefits of high embedding capacity with low computational complexity and good image quality. The experimental results showed that the proposed scheme has good performance for payload up to 2.28 bpp. Moreover, the INP yields higher PSNRs than other interpolating methods such as NMI, NNI and BI. Ó 2011 Elsevier Ltd. All rights reserved.

Keywords: Reversible data hiding Steganography Image interpolation

1. Introduction Data hiding is an information security technology used for protecting information not to be perceptible, where a sender can use the data hiding technique to hide information from being detected, stolen, or damaged by unauthorized users during transmission via public networks. Data hiding is able to avoid detection that



References: Alattar, A. M. (2004). Reversible watermark using the difference expansion of a generalized integer transform. IEEE Transactions on Image Processing, 13, 1147–1156. Allebach, J., & Wong, P.W. (1996). Edge-directed interpolation, In International conference on image processing (pp. 707–710). Celik, M. U., Sharma, G., Tekalp, A. M., & Saber, E. (2005). Lossless generalized-LSB data embedding. IEEE Transactions on Image Processing, 14, 253–266. Chan, C. K., & Cheng, L. M. (2004). Hiding data in images by simple LSB substitution. Pattern Recognition, 37, 469–474. Chen, W. J., Chang, C. C., & Le, T. H. N. (2010). High payload steganography mechanism using hybrid edge detector. Expert Systems with Applications, 37, 3292–3301. Jung, K. H., & Yoo, K. Y. (2009). Data hiding method using image interpolation. Computer Standards & Interfaces, 31, 465–470. Lee, C. F., & Chang, W. T. (2010). Recovery of color images by composed associative mining and edge detection. Journal of Information Hiding and Multimedia Signal Processing, 1, 310–324. Lee, C. F., Chang, C. C., Pai, P. Y., & Huang, W. H. (2010). An effective demosaicing method for CFA image. International Journal of Innovative Computing, Information and Control, 6, 5485–5499. Lee, C. F., & Chen, H. L. (2010). A novel data hiding scheme based on modulus function. Journal of Systems and Software, 83, 832–843. Lehmann, T. M., Gonner, C., & Spitzer, K. (1999). Survey: interpolation methods in medical image processing. IEEE Transactions on Medical Imaging, 18, 1049–1075. Ni, Z., Shi, Y. Q., Ansari, N., & Su, W. (2006). Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology, 16, 354–362. Sun, H. M., Weng, C. Y., Lee, C. F., & Yang, C. H. (2011). Anti-forensics with Steganographic Data Embedding in Digital Images. IEEE Journal on Selected Areas in Communications, 29, 1392–1403. Thévenaz, P., Blu, T., & Unser, M. (2000). Interpolation revisited. IEEE Transactions on Medical Imaging, 19, 739–758. Tian, J. (2003). Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology, 13, 890–896. Weng, S. W., Zhao, Y., & Pan, J. S. (2008). A novel reversible data hiding scheme. International Journal of Innovative Computing, Information and Control, 4, 351–358. Xin, L., & Orchard, M. T. (2001). New edge-directed interpolation. IEEE Transactions on Image Processing, 10, 1521–1527. Yang, C. H., Weng, C. Y., Wang, S. J., & Sun, H. M. (2008). Adaptive data hiding in edged areas of images with spatial LSB domain systems. IEEE Transactions on Information Forensics and Security, 3, 488–497.

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. digital watermark (Incorrect. A digital watermark is used to identify proprietary data, but it does not protect privacy.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Better Essays

    The advancement of technology has numerous benefits to society. Technology is reliable for communication, convenient for performing daily tasks and provides instantaneous access to information. While these statements hold true, there is one major con of technology: lack of privacy. Privacy can be invaded via the internet due to social media accounts, e-mails, browser cookies and caches. Besides the internet, smart cards and security tags are two other ways of collecting information.…

    • 1144 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Internet privacy can be considered as a subset of computer privacy. Computer privacy consists of the data privacy relating to the avoidance of the improper disclosure of the personally identifiable information collected and stored by websites. The effective sharing of data while protecting the private information is the real challenge.…

    • 884 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The most common methods of obfuscation are numeric variance, character scrambling, nulling, aggregating, encoding, artificial data generating, and repeating of the character masking process (Magnabosco, 2009). These methods rely on functions that exist in the SQL system server.…

    • 684 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Another way to determine whether an image has been manipulated or not relies on the fact that in a digital…

    • 1137 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Coding: Questions

    • 2042 Words
    • 18 Pages

    Data hiding, which means that critical data stored inside the object is protected from code outside the object is accomplished in Java by…

    • 2042 Words
    • 18 Pages
    Good Essays
  • Better Essays

    James Fallows explained in his essay, “Tinfoil Underwear,” how much previously viewed information is stored inside a computer, or elsewhere like an IP address. It is mind blowing how much personal information is saved or transferred to another…

    • 1379 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Greenberg wrote this article to talk about new technology and digital watermarks that help prevent identity theft. Greenberg states, “Reports on the use of biometrics technology and digital watermarks to secure important documents and prevent identity theft. Information on the biometric technology; Features of the digital watermarks; Responsibilities of individuals who are using these technologies.” This article relates to my topic because it explains, what can contribute to decreasing identity theft. This article is valid because it gives many examples on decreasing identity theft.…

    • 626 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Li, Yingjiu, Guo, Huiping, and Wang, Shuhong. (2008). A Multiple-Bits Watermark for Relational Data. Journal of Database Management, 19(3), 1-21. Retrieved from Computer Database (http://proxy.nss.udel.edu:2104/gtx/start.do?prodId=CDB&userGroupName=udel_main)…

    • 2529 Words
    • 11 Pages
    Best Essays
  • Powerful Essays

    Data Masking

    • 4525 Words
    • 19 Pages

    increases, more and more data gets shared, thus further increasing the risk of a data breach,…

    • 4525 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Photo Manipulation

    • 757 Words
    • 4 Pages

    With digital processing, there is almost no limit to what can be done to an image, and many things…

    • 757 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    the spatial locations and then define a data structure in the form of a hierarchical…

    • 2985 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    RRL S.I.P. draft

    • 594 Words
    • 3 Pages

    (David Jin and Sally Jin ,Advances in Multimedia, Software Engineering and Computing Vol. 1,2011, China, Springer-Verlag Berlin Hiedelberg,pg.227).…

    • 594 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Dream Place

    • 722 Words
    • 3 Pages

    Our research focuses on designing watermarking schemes that can resist collusion attacks. One branch of our work aims to construct code based on abstract assumptions about the embedding layer.1 Another is embedding-focused and does not explore code structures.2 Our study shows that the code-based strategy has the advantage of low computational complexity, but the embedding-based scheme holds the benefit of high collusion resistance, which is measured by the number of colluders that can be caught within a certain probability of detection. We describe a design that considers both coding and embedding layers to…

    • 722 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    information is critical for dealing with the storage and transmission of high resolution images and videos that dominate the…

    • 3325 Words
    • 13 Pages
    Powerful Essays