scholarly journals Block-Based Steganography Method Using Optimal Selection to Reach High Efficiency and Capacity for Palette Images

2020 ◽  
Vol 10 (21) ◽  
pp. 7820
Author(s):  
Han-Yan Wu ◽  
Ling-Hwei Chen ◽  
Yu-Tai Ching

The primary goal of steganographic methods is to develop statically undetectable methods with high steganographic capacity. The embedding efficiency is one kind of measure for undetectability. Block-based steganography methods have been proposed for achieving higher embedding efficiency under limited embedding capacity. However, in these methods, some blocks with larger embedding distortions are skipped, and a location map is usually incorporated into these methods to record the embedding status of each block. This reduces the embedding capacity for secret messages. In this study, we proposed a block-based steganography method without a location map for palette images. In this method, multiple secret bits can be embedded in a block by modifying at most one pixel with minimal embedding distortion; this enables each block to be used for data embedding; thus, our method provides higher embedding capacity. Furthermore, under the same capacity, the estimated and experimental embedding efficiencies of the proposed method are compared with those of Imaizumi et al. and Aryal et al.’s methods; the comparisons indicate that the proposed method has higher embedding efficiency than Imaizumi et al. and Aryal et al.’s methods.

2016 ◽  
Vol 2016 ◽  
pp. 1-10 ◽  
Author(s):  
Yuan-Yu Tsai

This study adopts a triangle subdivision scheme to achieve reversible data embedding. The secret message is embedded into the newly added vertices. The topology of added vertex is constructed by connecting it with the vertices of located triangle. For further raising the total embedding capacity, a recursive subdivision mechanism, terminated by a given criterion, is employed. Finally, a principal component analysis can make the stego model against similarity transformation and vertex/triangle reordering attacks. Our proposed algorithm can provide a high and adjustable embedding capacity with reversibility. The experimental results demonstrate the feasibility of our proposed algorithm.


2014 ◽  
Vol 2014 ◽  
pp. 1-7 ◽  
Author(s):  
Fei Wang ◽  
Zhaoxin Xie ◽  
Zuo Chen

Being reversible, the watermarking information embedded in audio signals can be extracted while the original audio data can achieve lossless recovery. Currently, the few reversible audio watermarking algorithms are confronted with following problems: relatively low SNR (signal-to-noise) of embedded audio; a large amount of auxiliary embedded location information; and the absence of accurate capacity control capability. In this paper, we present a novel reversible audio watermarking scheme based on improved prediction error expansion and histogram shifting. First, we use differential evolution algorithm to optimize prediction coefficients and then apply prediction error expansion to output stego data. Second, in order to reduce location map bits length, we introduced histogram shifting scheme. Meanwhile, the prediction error modification threshold according to a given embedding capacity can be computed by our proposed scheme. Experiments show that this algorithm improves the SNR of embedded audio signals and embedding capacity, drastically reduces location map bits length, and enhances capacity control capability.


Author(s):  
Suphiya P. Inamdar ◽  
Suhas B. Bhagate

A steganography is an art of hiding confidential data into digital media such as image, audio, video etc. The proposed of system using steganography using reversible texture synthesis. Texture synthesis uses the concept of patch which represents an image block of source texture where its size is user specified. A texture synthesis process resamples a smaller texture image, and provides a new image with arbitrary size and shape. Instead of using an existing cover image to hide messages, the algorithm conceals the source texture image and embeds secret messages using the process of texture synthesis. This allows extracting the secret messages and source texture from a stego synthetic texture. The approach offers some advantages. First, the scheme offers the embedding capacity that is proportional to the size of the stego texture image. Second, the reversible capability inherited from this scheme provides functionality, which allows recovery of the source texture. And third, there will be no image distortion since size of new texture image is user specified.


Author(s):  
Hui Tian ◽  
Jie Qin ◽  
Yongfeng Huang ◽  
Xu An Wang ◽  
Jin Liu ◽  
...  

Although steganographic transparency and embedding capacity are considered to be two conflicting objectives in the design of steganographic systems, it is possible and necessary to strike a good balance between them in Voice-over-IP steganography. In this paper, to improve steganographic transparency while maintaining relatively large embedding capacity, the authors present a (2n-1, 2n) covering code, which can hide 2n-1 bits of secret messages into 2n bits of cover messages with not more than n-bit changed. Specifically, each (2n-1)-bit secret message is first transformed into two 2n-bit candidate codewords. In embedding process, the cover message is replaced with the optimal codeword more similar with it. In this way, the embedding distortion can be largely reduced. The proposed method is evaluated by comparing with existing ones with a large number of ITU-T G.729a encoded speech samples. The experimental results show that the authors' scheme can provide good performance on both steganographic transparency and embedding capacity, and achieve better balance between the two objectives than the existing ones.


2021 ◽  
Vol 15 (2) ◽  
pp. 1-28
Author(s):  
Manisha Duevedi ◽  
Sunil Kumar Muttoo

Reversible data hiding in encrypted images (RDH-EI) has attracted various communities that deal with security. Xiao et al. presented RDH-EI that uses pixel value ordering (PVO) and additive homomorphism for encryption ensuring that the embedding capacity of plain and encrypted image remains relatively same. However, the size of location map required to manage over/under flow blocks increased drastically reducing the overall embedding capacity. In the paper, a new PVO-based separable RDH scheme is proposed using double encryption. The original image is encrypted using chaotic mapping in Phase 1, ensuring that the performance of PVO algorithm in an encrypted domain is similar to that in plain domain. Secret data is embedded in this encrypted image. The embedded image is re-encrypted using additive homomorphism to enhance security. The proposed scheme is more efficient as it improves the pure embedding rate and total embedding capacity of the image by reducing location map size, overcoming the drawback of Xiao et al.


2016 ◽  
Vol 25 (08) ◽  
pp. 1650091 ◽  
Author(s):  
Geeta Kasana ◽  
Kulbir Singh ◽  
Satvinder Singh Bhatia

This paper proposes a block-based high capacity steganography technique for digital images. The cover image is decomposed into blocks of equal size and the largest pixel of each block is found to embed the secret data bits and also the smallest pixel of each block is used for embedding to enhance the capacity. Embedding of secret data is performed using the concept that the pixel of a cover image has only two states — even and odd. Multilevel approach is also combined in the proposed technique to achieve high embedding capacity. In order to make the proposed technique more secure, a key is generated using embedding levels, block size, pixel embedding way, encryption parameters, and starting blocks of each embedding levels. Embedding capacity and visual quality of stego images generated by the proposed steganography technique are higher than the existing techniques. Steganalysis tests have been performed to show the un-detectability and imperceptibility of the proposed technique.


Sign in / Sign up

Export Citation Format

Share Document