Export file:

Format

  • RIS(for EndNote,Reference Manager,ProCite)
  • BibTex
  • Text

Content

  • Citation Only
  • Citation and Abstract

Enhance embedding capacity for switch map based multi-group EMD data hiding

1 Department of Computer Science and Engineering, XI’AN University of Technology, XI’AN, China
2 Department of CSIE, National Dong Hwa University, Hualien, Taiwan

Special Issues: Security and Privacy Protection for Multimedia Information Processing and communication

Exploiting Modification Direction (EMD) based data hiding achieves good stego-image quality and high security level. Recently, a section-wise EMD was proposed to enhance the embedding capacity of EMD. Later, Wang et al. introduced a switch map based multi-group EMD to further improve the embedding capacity. However, by a detail observation on the switch map in Wang et al.’s scheme, we find that more codewords with longer code-length can be put into the switch map. In this paper, we build a new switch map by Huffman code, and construct an enhanced multi-group EMD using Huffman code based switch map. Our scheme has higher embedding capacity than Wang et al.’s scheme and other EMD based data hiding methods.
  Figure/Table
  Supplementary
  Article Metrics

Keywords data Hiding; Exploiting Modification Direction; switch map; Huffman code

Citation: Yan-Xiao Liu , Ching-Nung Yang, Qin-Dong Sun. Enhance embedding capacity for switch map based multi-group EMD data hiding. Mathematical Biosciences and Engineering, 2019, 16(5): 3382-3392. doi: 10.3934/mbe.2019169

References

  • 1. C. K. Chan and L. M. Cheng, Hiding data in image by simple LSB substitution, Patt. Recogn., 37(2004), 469–474.
  • 2. R. Z. Wang, C. F. Lin and J. C. Lin, Image hiding by optimal LSB substitution and genetic algo- rithm, Patt. Recogn., 34(2001), 671–683.
  • 3. S. Dumitrescu, X. Wu and Z. Wang, Detection of LSB steganography via sample pair analysis, IEEE T. Signal Process., 51(2003), 1995–2007.
  • 4. J. Fridrich, M. Goljan and D. Rui, Detection steganography in color and grayscale images, IEEE Multimedia, 8(2004), 22–28.
  • 5. A. Westfeld, High capacity despite better steganalysis: F5-a steganographic algorithm, in 4th International Information Hiding Workshop, 2001.
  • 6. X. L. Li, S. R. Cai, W. M. Zhang, et al., Matrix embedding in finite abelian group, Signal Process., 113(2015), 250–258.
  • 7. C. Kim, D. Shin, C. N. Yang, et al., Improving capacity of Hamming (n,k)+1 stego-code by using optimized Hamming +k, Digit. Signal Process., 78(2018), 284–293.
  • 8. W. Zhang, S. Wang and X. Zhang, Improving embedding efficiency of covering codes for applica- tions in steganography, IEEE Commun. Lett., 11(2007), 680–682.
  • 9. C. Qin, C. C. Chang and Y. P. Chiu, A novel joint data-hiding and compression scheme based on SMVQ and image inpainting, IEEE T. Image Process., 23(2014), 969–978.
  • 10. X. Zhang and S. Wang, Efficient steganographic embedding by exploiting modification direction, IEEE Commun. Lett., 10(2006), 781–783.
  • 11. X. Zhang, W. Zhang and S. Wang, Efficient double-layered steganographic embedding, Electron. Lett., 43(2007), 482–483.
  • 12. X. Zhang, W. Zhang and S. Wang, A double layered "plus-minus one" data embedding scheme, IEEE Signal Proc. Lett., 14(2007), 848–851.
  • 13. K. H. Jung and K. Y. Yoo, Improved exploiting modification direction method by modulus opera- tion, Int. J. Signal Process. Image Process. Patt., 2(2009), 79–88.
  • 14. W. C. Kuo and C. C. Wang, Data hiding based on generalized exploiting modification direction method, Imaging Sci. J., 61(2013), 484–490.
  • 15. W. C. Kuo, C. C. Wang and H. C. Hou, Signed digit data hiding scheme, Inform. Process. Lett., 116(2016), 183–191.
  • 16. C. C. Wang, W. C. Kuo, Y. C. Huang, et al., A high capacity data hiding scheme based on re- adjusted GEMD, Multimed. Tools Appl., 8(2017), 1–15.
  • 17. J. Wang, Y. Sun, H. Xu, et al., An improved section-wise exploiting modification direction method, Signal Process., 90(2010), 2954–2964.
  • 18. X. T. Wang, C. C. Chang, C. C. Lin, et al., A novel multi-group exploiting direction method based on switch map, Signal Process., 92(2012), 1525–1535.

 

Reader Comments

your name: *   your email: *  

© 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution Licese (http://creativecommons.org/licenses/by/4.0)

Download full text in PDF

Export Citation

Copyright © AIMS Press All Rights Reserved