Effective Data Hiding Method Through Pixel Pair Matching

N. Arjun, Ch. Sridevi, V.Dhana Raj, A. Praveen

Abstract


This work proposes a new data-hiding method based on pixel pair matching , which is to use the values of pixel pair as a reference coordinate, and find a coordinate in the neighborhood set of this pixel pair based on the given message. Further the pixel pair is replaced by the searched coordinate to cover the digit. Two methods has been proposed to overcome this problem one is Exploiting modification direction (EMD) and another is diamond encoding (DE). The proposed methods offer lower distortion as compared to the existing methods by providing more compact neighborhood sets and allowing embedded digits in any notational system.


References


J. Fridrich, Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge, U.K.: Cambridge Univ. Press, 2009.

N. Provos and P. Honeyman, “Hide and seek: An introduction to steganography,” IEEE Security Privacy, vol. 3, no. 3, pp. 32–44, May/Jun. 2003.

A. Cheddad, J. Condell, K. Curran, and P. McKevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Process., vol. 90, pp. 727–752, 2010.

T. Filler, J. Judas, and J. Fridrich, “Minimizing embedding impact in steganography using trellis-coded quantization,” in Proc. SPIE, Media Forensics and Security, 2010, vol. 7541, DOI: 10.1117/12.838002.

S. Lyu and H. Farid, “Steganalysis using higher-order image statistics,” IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 111–119, Mar. 2006.

J. Fridrich, M.Goljan, and R.Du, “Reliable detection of LSB steganography in color and grayscale images,” in Proc. Int. Workshop on Multimedia and Security, 2001, pp. 27–30.

A. D. Ker, “Steganalysis of LSB matching in grayscale images,” IEEE Signal Process. Lett., vol. 12, no. 6, pp. 441–444, Jun. 2005.

C. K. Chan and L. M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognit., vol. 37, no. 3, pp. 469–474, 2004.

J. Mielikainen, “LSB matching revisited,” IEEE Signal Process. Lett., vol. 13, no. 5, pp. 285–287, May 2006.

X. Zhang and S. Wang, “Efficient steganographic embedding by exploiting modification direction,” IEEE Commun. Lett., vol. 10, no. 11, pp. 781–783, Nov. 2006.

W. Hong, T. S. Chen, and C. W. Shiu, “A minimal Euclidean distance searching technique for Sudoku steganography,” in Proc. Int. Symp. Information Science and Engineering, 2008, vol. 1, pp. 515–518.

R.M. Chao, H. C. Wu, C. C. Lee, and Y. P. Chu, “A novel image data hiding scheme with diamond encoding,” EURASIP J. Inf. Security, vol. 2009, 2009, DOI: 10.1155/2009/658047, Article ID 658047.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.