An Adjustable Interpolation-based Data Hiding Algorithm Based on LSB Substitution and Histogram Shifting

نویسندگان

  • Yuan-Yu Tsai
  • Yao-Hsien Huang
  • Ruo-Jhu Lin
  • Chi-Shiang Chan
چکیده

Data hiding can be regarded as a type of image processing techniques. Other image processing operations are usually integrated to increase the embedding capacity or decrease the visual distortion. Interpolation is an example of this type of operation. However, previous interpolation-based data hiding algorithms suffered from low and fixed embedding capacity and high visual distortion. This study proposes a more effective two-stage data hiding algorithm based on interpolation, LSB substitution, and histogram shifting. First, the authors modify the formula for embedding capacity calculation and make some adjustments on the sample pixels determination. A threshold is used to obtain the block complexity and each embeddable pixel has a different amount of message embedded. Second, an LSB substitution method and an optimal pixel adjustment process are adopted to raise the image quality. Finally, the authors’ proposed algorithm can support adjustable embedding capacity. Compared to the previous algorithm, the experimental results demonstrate the feasibility of the proposed method. KeywoRDS Data Hiding, Histogram Shifting, Image Interpolation, LSB Substitution, Optimal Pixel Adjustment Process

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

LSB Steganography Based Reversible Data Hiding

-This paper introduces a new, principled approach to least significant bit (LSB) steganography in digital signals such as images. It is shown that privacy protection of medical images with information using histogram shifting based reversible data hiding.First of all, the patient’s privacies need to be preserved.Therefore, embedding secret data into the medical images would be one of the useful...

متن کامل

Optimizing image steganography by combining the GA and ICA

In this study, a novel approach which uses combination of steganography and cryptography for hiding information into digital images as host media is proposed. In the process, secret data is first encrypted using the mono-alphabetic substitution cipher method and then the encrypted secret data is embedded inside an image using an algorithm which combines the random patterns based on Space Fillin...

متن کامل

Exploring LSB Substitution and Pixel-value Differencing for Block-based Adaptive Data Hiding

Khodaei and Faez proposed a new adaptive data hiding technique based on LSB substitution and pixel-value differencing. Their algorithm can embed a large amount of secret data while maintaining acceptable image quality. However, their proposed algorithm only has fixed embedding capacity. In addition, the derivation for three consecutive pixels in the boundary region is poorly manipulated using r...

متن کامل

Grayscale Image Hiding Based on Modulus Function and Greedy Method

A novel LSB-based image-hiding scheme that embeds secret data into the grayscale cover image is proposed in this paper. Several LSB-based image hiding schemes such as simple LSB substitution technique, optimal LSB substitution technique, greedy LSB substitution technique, modulus LSB substitution technique had been proposed. To provide good image quality of the stego-image while requiring a low...

متن کامل

A Novel Approach for Secret Data Transfer using Interpolation and LSB Substitution with Watermarking: A Survey

Today’s large demand of internet applications requires data to be transmitted in a better manner. Data is transferred in public communication system is not secure because of interception and improper manipulation by eavesdropper. So the better solution for this issue is Steganography, which is the technique of writing hidden messages in such a way that no one, apart from the sender and main rec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJDCF

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2016