Skip to main content

2018 | OriginalPaper | Buchkapitel

Capacity on Demand Steganography Through Adaptive Threshold Strategy

verfasst von : Sheng-Chih Ho, Chung-Yi Lin, Chao-Lung Chou

Erschienen in: Security with Intelligent Computing and Big-data Services

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the process of secret communication, in fact, the length of each transmission of ciphertext will never be the same. In order to meet dynamic length of ciphertext and provide a good image quality, a novel adaptive threshold strategy is presented. Firstly, a threshold pixel value and a k value are decided dynamically based on the length of ciphertext and the cumulative statistics of cover-image’s pixel value. Then if a pixel value is more than threshold value, more than k bits secret data can be embedded by using modified Least Significant Bit (LSB) substitution method, or the data of equal or less than k bits can be embedded. This dynamic strategy can adjust hiding capacity consistent with the length of secret message, and the secret data can be embedded in stego-image as evenly as possible. Quality of stego-image would be improved by this way. The experimental results, the proposed method not only achieves a larger embedding capacity, but also has higher visual quality of stego-image than most of proposed LSB based methods.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Highland, H.J.: Data encryption: a non-mathematical approach. Comput. Secur. 16(5), 369–386 (1997)CrossRef Highland, H.J.: Data encryption: a non-mathematical approach. Comput. Secur. 16(5), 369–386 (1997)CrossRef
2.
Zurück zum Zitat Wang, H., Wang, S.: Cyber warfare: steganography vs. steganalysis. Commun. ACM 47(10), 76–82 (2004)CrossRef Wang, H., Wang, S.: Cyber warfare: steganography vs. steganalysis. Commun. ACM 47(10), 76–82 (2004)CrossRef
3.
Zurück zum Zitat Katzenbeisser, S., Petitcolas, F.A.: Information Hiding Techniques for Steganography and Digital Watermarking, hardcover edn. Artech House (2000) Katzenbeisser, S., Petitcolas, F.A.: Information Hiding Techniques for Steganography and Digital Watermarking, hardcover edn. Artech House (2000)
4.
Zurück zum Zitat Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3), 313–336 (1996)CrossRef Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3), 313–336 (1996)CrossRef
5.
Zurück zum Zitat Chan, C.-K., Cheng, L.-M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004)CrossRefMATH Chan, C.-K., Cheng, L.-M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004)CrossRefMATH
6.
Zurück zum Zitat Thien, C.-C., Lin, J.-C.: A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recogn. 36(12), 2875–2881 (2003)CrossRefMATH Thien, C.-C., Lin, J.-C.: A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recogn. 36(12), 2875–2881 (2003)CrossRefMATH
7.
Zurück zum Zitat Wu, D.-C., Tsai, W.-H.: A steganographic method for images by pixel-value differencing. Pattern Recogn. Lett. 24(9–10), 1613–1626 (2003)CrossRefMATH Wu, D.-C., Tsai, W.-H.: A steganographic method for images by pixel-value differencing. Pattern Recogn. Lett. 24(9–10), 1613–1626 (2003)CrossRefMATH
8.
Zurück zum Zitat Yang, C.-H.: Inverted pattern approach to improve image quality of information hiding by LSB substitution. Pattern Recogn. 41(8), 2674–2683 (2008)CrossRefMATH Yang, C.-H.: Inverted pattern approach to improve image quality of information hiding by LSB substitution. Pattern Recogn. 41(8), 2674–2683 (2008)CrossRefMATH
9.
Zurück zum Zitat Wu, H.-C., Wu, N.-I., Tsai, C.-S., Hwang, M.-S.: Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proc. Vis. Image Sig. Process. 152(5), 611–615 (2005)CrossRef Wu, H.-C., Wu, N.-I., Tsai, C.-S., Hwang, M.-S.: Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proc. Vis. Image Sig. Process. 152(5), 611–615 (2005)CrossRef
10.
Zurück zum Zitat Wang, C.-M., Wu, N.-I., Tsai, C.-S., Hwang, M.-S.: A high quality steganographic method with pixel-value differencing and modulus function. J. Syst. Softw. 81(1), 150–158 (2008)CrossRef Wang, C.-M., Wu, N.-I., Tsai, C.-S., Hwang, M.-S.: A high quality steganographic method with pixel-value differencing and modulus function. J. Syst. Softw. 81(1), 150–158 (2008)CrossRef
11.
Zurück zum Zitat Yang, C.-H., Weng, C.-Y., Wang, S.-J., Sun, H.-M.: Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans. Inf. Forensics Secur. 3(3), 488–497 (2008)CrossRef Yang, C.-H., Weng, C.-Y., Wang, S.-J., Sun, H.-M.: Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans. Inf. Forensics Secur. 3(3), 488–497 (2008)CrossRef
12.
Zurück zum Zitat Lou, D.-C., Ho, S.-C., Chiu, C.-C.: Hybrid high-capacity data hiding by pixel-value differencing and modulus function. J. Internet Technol. 12(3), 303–312 (2011) Lou, D.-C., Ho, S.-C., Chiu, C.-C.: Hybrid high-capacity data hiding by pixel-value differencing and modulus function. J. Internet Technol. 12(3), 303–312 (2011)
13.
Zurück zum Zitat Lee, Y.-P., Lee, J.-C., Chen, W.-K., Chang, K.-C., Su, I.-J., Chang, C.-P.: High-payload image hiding with quality recovery using tri-way pixel-value differencing. Inf. Sci. 191, 214–225 (2012)CrossRef Lee, Y.-P., Lee, J.-C., Chen, W.-K., Chang, K.-C., Su, I.-J., Chang, C.-P.: High-payload image hiding with quality recovery using tri-way pixel-value differencing. Inf. Sci. 191, 214–225 (2012)CrossRef
14.
Zurück zum Zitat Yang, C.-H., Weng, C.-Y., Tso, H.-K., Wang, S.-J.: A data hiding scheme using the varieties of pixel-value differencing in multimedia images. J. Syst. Softw. 84(4), 669–678 (2011)CrossRef Yang, C.-H., Weng, C.-Y., Tso, H.-K., Wang, S.-J.: A data hiding scheme using the varieties of pixel-value differencing in multimedia images. J. Syst. Softw. 84(4), 669–678 (2011)CrossRef
15.
Zurück zum Zitat Yang, C.-N., Hsu, S.-C., Kim, C.: Improving stego image quality in image interpolation based data hiding. Comput. Stand. Interfaces 50, 209–215 (2017)CrossRef Yang, C.-N., Hsu, S.-C., Kim, C.: Improving stego image quality in image interpolation based data hiding. Comput. Stand. Interfaces 50, 209–215 (2017)CrossRef
16.
Zurück zum Zitat Hussain, M., Wahab, A.W.A., Ho, A.T.S., Javed, N., Jung, K.-H.: A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Sig. Process. Image Commun. 50, 44–57 (2017)CrossRef Hussain, M., Wahab, A.W.A., Ho, A.T.S., Javed, N., Jung, K.-H.: A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Sig. Process. Image Commun. 50, 44–57 (2017)CrossRef
17.
Zurück zum Zitat Hong, W.: Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique. Inf. Sci. 221, 473–489 (2013)CrossRef Hong, W.: Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique. Inf. Sci. 221, 473–489 (2013)CrossRef
18.
Zurück zum Zitat Xu, W.-L., Chang, C.-C., Chen, T.-S., Wang, L.-M.: An improved least-significant-bit substitution method using the modulo three strategy. Displays 42, 36–42 (2016)CrossRef Xu, W.-L., Chang, C.-C., Chen, T.-S., Wang, L.-M.: An improved least-significant-bit substitution method using the modulo three strategy. Displays 42, 36–42 (2016)CrossRef
19.
Zurück zum Zitat Lu, T.-C.: Interpolation-based hiding scheme using the modulus function and re-encoding strategy. Sig. Process. 142, 244–259 (2018)CrossRef Lu, T.-C.: Interpolation-based hiding scheme using the modulus function and re-encoding strategy. Sig. Process. 142, 244–259 (2018)CrossRef
20.
Zurück zum Zitat Swain, G.: A steganographic method combining LSB substitution and PVD in a block. Procedia Comput. Sci. 85, 39–44 (2016)CrossRef Swain, G.: A steganographic method combining LSB substitution and PVD in a block. Procedia Comput. Sci. 85, 39–44 (2016)CrossRef
Metadaten
Titel
Capacity on Demand Steganography Through Adaptive Threshold Strategy
verfasst von
Sheng-Chih Ho
Chung-Yi Lin
Chao-Lung Chou
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-76451-1_19

Premium Partner