skip to main content
10.1145/2108616.2108634acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

Reversible data hiding scheme with high payload for JPEG images

Published: 14 January 2010 Publication History

Abstract

In 2008 Lin et al. proposed a reversible steganographic method with a high payload for JPEG images. Because modifying the quantized DCT coefficients may lead to serious image distortion, Lin et al. embedded the secrets into the middle frequency of the quantized DCT coefficients. Moreover, they limited the number of nonzero values of the quantized DCT coefficients involved in the data hiding procedure. To improve on Lin et al.'s hiding capacity while improving the image quality of the stego-image, this paper proposes a new hiding strategy based on clustering. Experimental results confirm our proposed scheme not only provides a higher payload than either Chang et al.'s or Lin et al.'s scheme but also offers better image quality of the stego-image.

References

[1]
M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, "Lossless Generalized-LSB Data Embedding," IEEE Transactions on Image Processing, Vol. 14, No. 2, Feb. 2005, pp. 253--266.
[2]
Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai, "Reversible hiding in DCT-based compressed images," Information Sciences, Vol. 177, Issue 13, July 2007, pp. 2768--2786.
[3]
C. C. Chang, T. S. Chen and L. Z. Chung, "A Steganographic Method Based upon JPEG and Quantization Table Modification," Information Sciences, Vol. 141, 2002, pp.123--138.
[4]
C. C. Chang, J. Y. Hsiao, and C. S. Chan. "Finding Optimal Least-Significant-Bit Substitution in Image Hiding by Dynamic Programming Strategy," Pattern Recognition, Vol. 36, No. 7, July 2003, pp. 1595--1683.
[5]
C. C. Chang, W. L. Tai, and C. C. Lin, "A Reversible Data Hiding Scheme Based on Side Match Vector Quantization," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, No. 10, pp. 1301--1308, 2006.
[6]
K. L. Chung, C. H. Shen and L. C. Chang, "A Novel SVD- and VQ-based Image Hiding Scheme," Pattern Recognition Letters, Vol. 22, No. 9, 2001, pp.1051--1058.
[7]
B. V. Dasarathy, "Image Data Compression: Block Truncation Coding," IEEE Computer Society Press, Los Alamitos, CA, 1995, pp. 164--173.
[8]
W. Diffie and M. E. Hellman, "Exhaustive Cryptanalysis of the NBS Data Encryption Standard," IEEE Computer, Vol. 10, 1977, pp. 74--84.
[9]
J. Fridrich, M. Goljanb, R. Du, "Invertible Authentication Watermark for JPEG Images," IEEE Int. Conf. Information Technology: Coding and Computing, Las Vegas, Nevada, April 2--4, 2001, pp. 223--227.
[10]
Guillermito, Chi-square Steganography Test Program, http://www.guillermito2.net/stegano/tools/index.html.
[11]
M. Iwata, K Miyake, and A. Shiozaki, "Digital Steganography Utilizing Features of JPEG Images," IEICE Transactions on Fundamentals, Vol. E87-A, No. 4, April 2004, pp.929--936.
[12]
H. Kobayashi, Y. Noguchi and H. Kiya, "A Method of Embedding Binary Data into JPEG Bitstreams," IEICE Transactions on Fundamentals, J83--D2, Vol. 6, 2000, pp. 1469--1476.
[13]
Lin, C. Y., Chang, C. C. and Wang, Y. C., "Reversible Steganographic Method with High Payload for JPEG Images," IEICE Transactions on Information and Systems, Vol. E91-D, No. 3, Mar. 2008, pp. 836--845.
[14]
Y. K. Lee and L. H. Chen, "High Capacity Image Steganographic Model," Proc. of IEE International Conference on Vision, Image and Signal Processing, Vol. 147, No. 3, 2000, pp. 288--294.
[15]
Z. Ni, Y. Q. Shi, N. Ansari, W. Su, "Reversible Data Hiding," Proc. of the 2003 International Symposium on Circuits and Systems (ISCAS '03), Vol. 2, May 2003, pp. II-912-II-915.
[16]
R. L. Rivest, A. Shamir, L. Adelman, "A Method for Obtaining Digital Signatures and Public-key Cryptosystem," Communications of the ACM, Vol. 21, No. 2, Feb. 1978, pp. 120--126.
[17]
J. Tian, "Reversible Data Embedding Using a Difference Expansion," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 8, Aug. 2003 pp. 890--896.
[18]
P. Tsai, Y. C. Hu and C. C. Chang, "An Image Hiding Technique Using Block Truncation Coding," Proc. of Pacific Rim Workshop on Digital Steganography, Kitakyushu, Japan, July 2002, pp. 54--64.
[19]
R. Z. Wang, C. F. Lin and J. C. Lin, "Image Hiding by Optimal LSB Substitution and Genetic Algorithm," Pattern Recognition, Vol. 34, No. 3, 2001, pp.671--683.
[20]
G. Xuan, J. Zhu, J. Chen, Y.-Q. Shi, Z. Ni, and W. Su, "Distortionless Data Hiding Based on Integer Wavelet Transform," IEE Electronics Letters, Vol. 38, No. 25, December 2002, pp. 1646--1648.

Index Terms

  1. Reversible data hiding scheme with high payload for JPEG images

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ICUIMC '10: Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
    January 2010
    550 pages
    ISBN:9781605588933
    DOI:10.1145/2108616
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 January 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. JPEG images
    2. clustering
    3. reversible data hiding

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    ICUIMC '10
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 251 of 941 submissions, 27%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 184
      Total Downloads
    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 14 Sep 2024

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media