A magic cube based information hiding scheme of large payload

نویسندگان

  • Qiong Wu
  • Chen Zhu
  • Jianjun Li
  • Chin-Chen Chang
  • Zhi-Hui Wang
چکیده

Hiding information on grayscale images has been drawing much attention in recent years. In pervious techniques, many schemes like Zhang and Wang’s method or Sudoku method use magic matrix as a plane reference to modify the LSBs of cover images.To further improve the hiding capacity and visual quality, we propose the so-called magic cube based (MCB) information hiding scheme. MCB is an early attempt to use three-dimensional reference to achieve information hiding in grayscale image. Secret data are embedded in the cover pixel LSBs by utilizing spatial coordinates. MCB has a larger probability to modify fewer pixels in the whole image. The comparison experiments show that MCB achieves higher hiding capacity and better visual quality with impressive undetectability. Moreover, our method can easily avoid the overflow problem in the embedding process and the hiding capacity is flexible by operating on magic cubes with different scales. © 2015 Elsevier Ltd. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Steganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images

In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...

متن کامل

A Novel Image Encryption Using an Integration Technique of Blocks Rotation Based on the Magic Cube and the AES Algorithm

In recent years, several encryption algorithms have been proposed to protect digital images from cryptographic attacks. These encryption algorithms typically use a relatively small key space and therefore, provide safe, especially if they are of a dimension. In this paper proposes an encryption algorithm for a new image protection scheme based on the rotation of the faces of a Magic Cube. The o...

متن کامل

High Efficiency Reversible Data Hiding for Two-stage Vector Quantization Compressed Images

Data hiding is a booming technique aiming to embed secret data into digital media for content authentication, annotation or copyright protection. Reversible data hiding is a special type of data hiding technique that guarantees the host digital media can be losslessly recovered after the secret data are correctly extracted. In the past several years, some reversible data hiding schemes for Vect...

متن کامل

High payload data-hiding in audio signals based on a modified OFDM approach

This paper presents a high payload data-hiding scheme for audio signals following the OFDM concept. It is based on changing the phase component of the audio signal via a reduced-arc M -order Phase Shift Keying (MPSK) modulator on selected frequency samples of the audio signal. This approach allows the data-hiding payload and perceptual distortion to be controlled by the number of altered freque...

متن کامل

A Novel Reversible Data Hiding Technique with

In this paper, a new reversible image hiding scheme based on histogram shifting for grayscale images is proposed. As is known, the payload storage of histogram-based reversible data hiding is impacted by the overhead information of the pixel positions that have to be embedded in a cover image. To solve this problem, the cover image is divided into two parts, namely the Most Significant Part (MS...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Inf. Sec. Appl.

دوره 26  شماره 

صفحات  -

تاریخ انتشار 2016