Adjustment Hiding Method Based on Exploiting Modification Direction

نویسندگان

  • Chin-Feng Lee
  • Chin-Chen Chang
  • Pei-Yan Pai
  • Chia-Ming Liu
چکیده

In the exploiting modification direction (EMD) method, a secret digit in (2n+1)-ary notational system is embedded into a group that is consisted of n pixels. Only one pixel in a group at most is being modified by either increasing or decreasing one. Therefore, the maximum embedding rate of EMD method is (log2(2n+1))/n when n≧2. In order to increase the embedding capacity of EMD method, a new adjustment data hiding method based on c n -ary notational system is proposed in this paper. In the proposed method, at most n pixels in a group can be modified and each pixel has c different ways of modification. As the result, the maximal embedding rate of the proposed method is log2c. The experimental results demonstrated that the proposed method provides a higher embedding capacity than the compared methods and a satisfied image quality of stegoimage. The proposed method provides an average 1~4.75 bits per pixel (bpp) and an average peak signal-to-noise rate (PSNR) of 51.14~30.30 dB with different c. In addition, the proposed method also inherits the advantageous properties of EMD method: the computation efficiency and the ability to resist steganographic attack.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data hiding schemes based on the formal improved exploiting modification direction method

Steganography is an important strategy in the field of data security. Its main purpose is to hide secret information by embedding it in a cover image. The quantity of data that can be hidden in a single cover image is also very important. Recently, a high capacity technique called Exploiting Modification Direction (EMD) data hiding was introduced by Zhang and Wang. In order to enhance embedding...

متن کامل

A Novel Information Concealing Method Based on Exploiting Modification Direction

A steganographic scheme with a very good visual quality of stego images was proposed by Zhang and Wang. However, the maximum hiding capacity of this method is 1 bit per pixel (bpp). To improve the hiding capacity of Zhang and Wang’s method, we propose a steganographic scheme. The proposed method embeds 2K secret digits in the 5-ary notational systems into each group of (2K + 1) cover pixels, wh...

متن کامل

High Capacity Data Embedding in Images by Pixel Triplets Matching

In this paper a data hiding method based on pixel pair matching (PPM) is presented. Pixel pair matching uses a pair of pixel intensity values as reference coordinates and searches the coordinate neighborhood according to the given message digit. The searched coordinate which encodes the message digit is put in place of the pixel pair. Exploiting modification direction (EMD), Diamond Encoding (D...

متن کامل

Efficient Information Hiding Based on Theory of Numbers

Data hiding is an efficient technique that conceals secret data into a digital medium. In 2006, Zhang and Wang proposed a data hiding scheme called exploiting modification direction (EMD) which has become a milestone in the field of data hiding. In recent years, many EMD-type data hiding schemes have been developed, but their embedding capacity remains restricted. In this paper, a novel data hi...

متن کامل

Secure Modulus Data Hiding Scheme

In 2006, Zhang and Wang proposed a data hiding scheme based on Exploiting Modification Direction (EMD) to increase data hiding capacity. The major benefit of EMD is providing embedding capacity greater than 1 bit per pixel. Since then, many EMD-type data hiding schemes have been proposed. However, a serious disadvantage common to these approaches is that the embedded data is compromised when th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 17  شماره 

صفحات  -

تاریخ انتشار 2015