Abstract
Numerous steganography algorithms have been proposed to protect messages put into images. LSB, which is an exceedingly prominent means in this field, has been proven to work if the least significant bit of the cover image is replaced with the binary secrets stream. Inspired by LSB, a series of simple but effective methods were proposed, such as LSB-MR, EMD (exploiting modification direction), Sudoku, EMD-2, Turtle Shell, and so on. Nonetheless, an image steganography with larger payload is tremendously needed nowadays. A novel high capacity image data hiding algorithm based on extended EMD-2 and Sudoku hybrid reference matrix is proposed in this study. In this method, each cover pixel pair carries two secret 9-ary notational system numbers. The experiment result shows the embedding rate of the method is up to 3.16 bpp, which is higher than the related schemes and the visual quality desired.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35, 313–336 (1996)
Zielinska, E., Mazurczyk, W., Szczypiorski, K.: Trends in steganography. Commun. ACM 57(3), 86–95 (2014)
Ker, A.D.: Improved detection of LSB steganography in grayscale images. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 97–115. Springer, Heidelberg (2004)
Fridrich, J., Soukal, D.: Matrix embedding for large payloads. IEEE Trans. Inf. Forensics Secur. 1(3), 390–394 (2006)
Chao, R.M., Wu, H.C., Lee, C.C.: A novel image data hiding scheme with diamond encoding. EURASIP J. Inf. Secur. 2009, 1–9 (2009)
Hong, W., Chen, T.S.: A novel data embedding method using adaptive pixel pair matching. IEEE Trans. Inf. Forensics Secur. 7(1), 176–184 (2012)
Hong, W.: Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique. Inf. Sci. 221(1), 473–489 (2013)
Turner, L.F.: Digital data security system. Patent IPN, WO89/08915 (1989)
Mielikainen, J.: LSB matching revisited. IEEE Sig. Process. Lett. 13(5), 285–287 (2006)
Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11), 781–783 (2006)
Chang, C.C., Liu, Y., Nguyen, T.: A novel turtle shell based scheme for data hiding. In: 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2014), Kitakyushu, Japan, pp. 89–93 (2014)
Chang, C.C., Chou, Y.C., Kieu., T.D.: An information hiding scheme using Sudoku. In: Proceedings of 3rd International Conference on Innovative Computing, Information and Control, pp. 17–21 (2008)
Kim, H.J., Kim, C., Choi, Y., Wang, S., Zhang, X.: Improved modification direction methods. Comput. Math Appl. 60(2), 319–325 (2010)
Acknowledgements
This research work is supported by Provincial Training Projects of Innovation and Entrepreneurship for Undergraduates of Anhui University, which is under Grant No. J1018515315. The corresponding experiment results is with the help of key laboratory of intelligent computing and signal processing of ministry of education.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Li, XJ., Feng, YQ., Lyu, WL. (2016). A High-Capacity Image Data Hiding Based on Extended EMD-2 Reference Matrix. In: Tan, T., et al. Advances in Image and Graphics Technologies. IGTA 2016. Communications in Computer and Information Science, vol 634. Springer, Singapore. https://doi.org/10.1007/978-981-10-2260-9_7
Download citation
DOI: https://doi.org/10.1007/978-981-10-2260-9_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-2259-3
Online ISBN: 978-981-10-2260-9
eBook Packages: Computer ScienceComputer Science (R0)