Image and Vision Computing
Image and Vision Computing
Department of Information Management, Chaoyang University of Technology, 168 Jifong E. Road, Wufong Township, Taichung County 41349, Taiwan, ROC
Department of Information Engineering and Computer Science, Feng Chia University, 100 Wenhwa Rd., Seatwen, Taichung 40724, Taiwan, ROC
c
Department of Computer Science and Information Engineering, National Chung Cheng University, 160 San-Hsing, Ming-Hsiung, Chiayi 621, Taiwan, ROC
b
a r t i c l e
i n f o
Article history:
Received 22 November 2007
Received in revised form 1 April 2008
Accepted 5 May 2008
Keywords:
Covert communication
Digit steganography
Data hiding
Embedding capacity
a b s t r a c t
In this paper, a novel data hiding method by using pixel segmentation strategy is proposed. The proposed
paper keeps (16 pm) MSBs of a pixel-pair unchanged and alters pm LSBs to indicate the virtual modications on an m-dimensional pseudo-random vectors for carrying the secret data, where m 2pm 1 1.
The embedding rate of proposed method is R = (log2(2m + 1))/2, which is greater than that of the EMD
embedding method proposed by Zhang and Wang [X. Zhang, S. Wang, Efcient steganographic embedding by exploiting modication direction, IEEE Communication Letters 10 (2006) (113), pp.781783],
because the embedding rate of EMD embedding method is R = (log2(2n + 1))/n, when m > 2 and n = 2.
The experimental results show that the proposed method increases the number of embedded secret bits
more than 1.7 times compared with the EMD embedding method. Even with such high embedding capacity, the average PSNR of 44.3 dB shows that the visual quality does not decline to an unacceptable degree.
2008 Elsevier B.V. All rights reserved.
1. Introduction
Message transmission over the Internet is quite common in almost everywhere. Some problems may arise due to the security
aws of communication channel. Digital steganography, a kind of
data security technique, has been developed quickly and it receives
a great deal of attentions from both the academic and industrial
communities [111]. An original image, also called a cover image,
is used to embed the secret data. The stego-image is a version of
the cover image where secret messages are embedded. By means
of creating stego-images that are perceptually identical to the cover images with small embedding distortion, the imperceptibility
for protecting the sensitive and condential information can be
maintained without being detected or extracted. Two important issues for current data hiding techniques are to preserve the imperceptibility and the embedding capacity at the same time. However,
this is an irreconcilable conict: if we want to preserve high stegoimage quality, we usually have to scarify the embedding capacity,
and vice versa.
Nowadays, many steganographic methods have been proposed
to hide secret messages into an image. A commonly used method
is the least signicant bit (LSB) replacement, which is the simplest
hiding technique by using some least bits of cover pixels to embed
secret data [46,10]. Mielikainens LSB matching revisited method
* Corresponding author. Tel.: +886 4 23323000 4293; fax: +886 4 23742337.
E-mail addresses: [email protected] (C.-F. Lee), [email protected], m9503085@
fcu.edu.tw (C.-C. Chang).
0262-8856/$ - see front matter 2008 Elsevier B.V. All rights reserved.
doi:10.1016/j.imavis.2008.05.005
L bK log2 2n 1c:
In the EMD embedding method, the data hiders can choose one of
(2n + 1)-ary notational systems and determine the length K of segmented bits to convert the secret message into a sequence of secret
digits. This feature can increase the security if the attacker does not
know the value of K and n. Zhang and Wang dened an embedding
function f as weighted sum function modulo (2n + 1) for each pixelgroup:
f g 1 ; g 2 ; . . . ; g n g 1 1 g 2 2 . . . g n nmod2n 1:
1671
2
If a secret digit to be embedded into a given cover pixel-group
(g1, g2, . . . , gn) is not equal to the value calculated from the embedding function, only one of the cover pixels has to be modied by
either increasing or decreasing one; otherwise, no modication
needs to be done. That is why the EMD embedding methods distortion induced in the stego-image is not great.
In the extracting procedure, if the stego pixel-group is
g 01 ; g 02 ; . . . ; g 0n , then the secret digit can be extracted by the following extraction function.
f g 01 ; g 02 ; . . . ; g 0n g 01 1 g 02 2 . . . g 0n nmod2n 1:
3
The EMD embedding method provides a pretty high stego-image
quality with the PSNR value greater than 51 dB in average. This is
Fig. 1. Pixel-pair segmentation. (a) A grayscale pixel-pair; (b) VCA; (c) VMA.
1672
random function is a vector of coordinates with m positive integers, which can be denoted as (g1, g2, . . . , gm) and can be expressed
as a unit of hyper-cube in an m-dimensional space. Here, m is
determined by the value of pm such that m 2pm 1 1. The hyper-cube related to the vector of coordinates (g1, g2, . . . , gm) is inspired from the hyper-cube of a pixel-group introduced by Zhang
and Wang. The difference between the vector of coordinates (g1,
g2, . . . , gm) proposed here and the pixel-group proposed by Zhang
and Wang is that the vector of coordinates is projected from the
16 pm bits of VCA for imitating the embedding way proposed
by Zhang et al. That is, m integers of vector coordinates are not cover pixels. Therefore, no physical modication is performed on the
coordinate values. Also, no bits of VCA are modied during the
embedding procedure. The embedded secret message has to be
converted into a sequence of secret digits of the (2m + 1)-ary notational system, where each secret digit falls within [0, 2m]. We modify the pm bits of VMA to indicate which integer of g1, g2, . . . , and gm
will be logically increased/decreased one when a secret digit is
going to be embedded.
The embedding steps are presented as follows.
Step 1:
Step 2:
Step 3:
Step 4:
Step 5:
Step 6:
"
#
m
X
F f g 1 ; g 2 ; . . . ; g m
g i i mod2m 1:
Case 1:
Case 2:
Case 3:
Case 4:
Case 5:
Case 6:
Case 7:
i1
d s F mod 2m 1:
Fig. 2. the hyper-cube values of the vector of coordinates (7, 13, 9)10 and its six
neighbors.
1673
Case 1:
Case 2:
Case 3:
Case 4:
Case 5:
Case 6:
Case 7:
s f g 01 ; g 02 ; . . . ; g 0m
g 01 1 g 02 2 . . . g 0m m mod 2m 1:
4. Experimental results
For evaluating the embedding capacity as well as visual stegoimage quality, we implemented the most common LSB replacement, Zhan and Wangs method and the proposed method by using
C language on the Intel Core 2 Duo 5600 CPU computer with 1GB
RAM.
Table 1
The embedding rate (bpp) comparison between the EMD and the proposed methods
The number of cover pixels
for carrying one secret digit
EMD embedding
Proposed method with 2LSBs
Proposed method with 3LSBs
log2(5)/2
log2(15)/2
log2(63)/2
log2(7)/3
log2(63)/3
log2(511)/3
log2(9)4
log2(255)/4
log2(4095)/4
Table 2
Given a cover pixel-pair, the embedding secret bits per cover pixel (bpp) for
exploiting two and three LSB planes, respectively
The number of LSB planes used
to carry secret bits
2 LSB planes
3 LSB planes
LSB replacement
Proposed method (theoretical
results)
Proposed method (the average
secret bits actually
embedded in a cover pixel
according to the experimental
results)
2
log2(15)/2 = 1.953
3
log2(63)/2 = 2.9886
1.733
2.746
1674
60
50
40
Zheng et.al
R=(log5)/2
30
Proposed Scheme
R=(log15)/2
Proposed Scheme
R=(log31)/2
20
10
er
dh
Ba ill
rb
ar
a
Bo
at
Ze
ld
a
G
ol
6
F1
pp
Pe
ny
on
ffi
Ti
bo
Ba
Le
na
Fig. 4. The PSNR values of proposed methods and Zhang et al.s method by embedding secret data with 262,144 bits and full embedding.
1675
Fig. 5. The difference image histograms for the detection of LSB replacement and proposed methods.
1676
both the LSB replacement and the proposed methods; their stegoimage histograms are different from the original one and can be
noticeable when the data hiding are performed on three LSB
planes. However, the LSB replacement is less secure, because it is
easy to sequentially collect secret message in terms of pm LSB bits,
thereby easily leaving recognizable ngerprints. In contrast, the
proposed method uses a random generator fr to project an mdimensional pseudo-random vector onto a virtual hyperspace
rstly and then deals with the virtual modications to hide secret
messages by exploiting the EMD embedding. The random generator fr as well as the value of m act as secure keys. Without knowing
the keys, the attacker has no awareness of the secret message.
Therefore, the proposed method can achieve some degree of
security.
5. Conclusions
The embedding capacity and the quality of stego-image are two
important issues for data hiding methods. Our proposed method
has the embedding rate R = (log2(2m + 1))/2 which is greater than
that R = (log2 (2n + 1))/n of the EMD embedding method proposed
by Zhang et al., when m > 2 and n=_ 2. The experimental results
show that the proposed method is able to embed more information
than the EMD embedding method can do and still keeps good stego-image quality at an acceptable level.
References
[1] Hide and Seek. Available from: <http://www.jjtc.com/Security/stegtools.htm>.
[2] S. Katzenbeisser, F.A.P. Petitcolas, Information Hiding Techniques for
Steganography and Digital Watermarking, Artech House, Boston, 2000.
[3] H. Wang, S. Wang, Cyber warfare: steganography vs. steganalysis,
Communications of the ACM 47 (10) (2004) 7682.
[4] S. Dumitrescu, X. Wu, Z. Wang, Detection of LSB steganography via sample pair
analysis, IEEE Transactions on Signal Processing 51 (7) (2003) 19952007.
[5] A. Ker, Improved detection of LSB steganography in grayscale images, in: J.
Fridrich (Ed.), Proceedings of the Sixth International Workshop on Information
Hiding, vol. 3200, Springer, Toronto, Canada, May 2004, pp. 97115.
[6] A. Ker, Quantitative evaluation of pairs and RS steganalysis, in: Edward J. Delp
III, Ping W. Wong (Eds.), Proceedings of SPIE Security, Steganography, and
Watermarking of Multimedia Contents VI, SPIE, vol. 5306, California, USA,
January 2004, pp. 8397.
[7] J. Mielikainen, LSB matching revisited, IEEE Signal Processing Letters 13 (5)
(2006) 285287.
[8] C.C. Thien, J.C. Lin, A simple and high-hiding capacity method for hiding digitby-digit data in images based on modulus function, Pattern Recognition 36
(12) (2003) 28752881.
[9] X. Zhang, S. Wang, Efcient steganographic embedding by exploiting
modication direction, IEEE Communications Letters 10 (113) (2006) 781783.
[10] C.K. Chan, L.M. Cheng, Hiding data in images by simple LSB substitution,
Pattern Recognition 37 (3) (2004) 469474.
[11] T. Zhang, X. Ping, A new approach to reliable detection of LSB steganography in
natural images, Signal Processing 83 (10) (2003) 20852093.