Skip to main content
Top

2014 | OriginalPaper | Chapter

Efficient Self-Adaptive Image Steganography Scheme Based on Iterative Blending and Integer Wavelet Transform

Authors : Peipei Liu, Chuan Chen, Liangquan Ge, Yaoyao Luo

Published in: Unifying Electrical Engineering and Electronics Engineering

Publisher: Springer New York

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In order to improve the capacity of image steganography scheme, a novel self-adaptive image steganography scheme, taking advantages of iterative blending and integer wavelet transform (IWT), is proposed in this chapter. The employment of IWT resolves the problems of boundary difference and rounding difference of image steganography scheme based on traditional wavelet transform. Moreover, human visual model (HVS) is adopted to effectively make a trade-off between imperceptibility and robustness. Experimental results demonstrate that the proposed scheme has excellent properties of invisibility and robustness, furthermore, the adoption of iterative blending technique highly improves the hiding capacity of the proposed scheme.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Fridrich J (1999) Application of data hiding in digital image. Signal Processing and its Applications (ISSPA ’99). Proceedings of the Fifth International Symposium on 1 Fridrich J (1999) Application of data hiding in digital image. Signal Processing and its Applications (ISSPA ’99). Proceedings of the Fifth International Symposium on 1
2.
go back to reference Tang XC (2006) Wavelet analysis and its applications. Chongqing University Press (in Chinese) Tang XC (2006) Wavelet analysis and its applications. Chongqing University Press (in Chinese)
3.
go back to reference Sweldens W (1995) The lifting scheme: a construction of second generation wavelets. University of South Carolina, USA Sweldens W (1995) The lifting scheme: a construction of second generation wavelets. University of South Carolina, USA
4.
go back to reference Calderbank AR, Daubechies I, Sweldens W (1998) Wavelet transforms that map integers to integers. Appl Comput Harmonic Anal 5:332–369MathSciNetMATHCrossRef Calderbank AR, Daubechies I, Sweldens W (1998) Wavelet transforms that map integers to integers. Appl Comput Harmonic Anal 5:332–369MathSciNetMATHCrossRef
5.
go back to reference Cox IJ, Kilian J, Leighton N et al (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 16(12):1673–1686CrossRef Cox IJ, Kilian J, Leighton N et al (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 16(12):1673–1686CrossRef
6.
go back to reference Lewis S, Knowles G (1992) Image compression using 2-D wavelet transform. IEEE Trans Image Process 1(2):244–250CrossRef Lewis S, Knowles G (1992) Image compression using 2-D wavelet transform. IEEE Trans Image Process 1(2):244–250CrossRef
7.
go back to reference Barni M, Bartolini F, Piva A (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10(5):783–791MATHCrossRef Barni M, Bartolini F, Piva A (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10(5):783–791MATHCrossRef
8.
go back to reference Wang XY, Yang HY, Chen LK (2005) A new semi-fragile image watermarking based on visual masking. J Image Grap (in Chinese) 10(12):1548–1553 Wang XY, Yang HY, Chen LK (2005) A new semi-fragile image watermarking based on visual masking. J Image Grap (in Chinese) 10(12):1548–1553
9.
go back to reference Zhang GC, Wan RD (2003) Digital image information hiding technology based on iterative blending. J Comput (in Chinese) 26(5):569–574MathSciNet Zhang GC, Wan RD (2003) Digital image information hiding technology based on iterative blending. J Comput (in Chinese) 26(5):569–574MathSciNet
10.
go back to reference Qian SJ, Zhang H, He DQ (2010) Image library building in information hiding research. J PLA Univ Sci Technol (in Chinese) 11(1):26–30 Qian SJ, Zhang H, He DQ (2010) Image library building in information hiding research. J PLA Univ Sci Technol (in Chinese) 11(1):26–30
Metadata
Title
Efficient Self-Adaptive Image Steganography Scheme Based on Iterative Blending and Integer Wavelet Transform
Authors
Peipei Liu
Chuan Chen
Liangquan Ge
Yaoyao Luo
Copyright Year
2014
Publisher
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-4981-2_126