Abstract
Image steganography has been widely used in the domain of privacy protection, such as the storage and transmission of the secret images. This paper presents a novel image-hiding scheme to embed the secret image into an innocent cover image. We use a block matching procedure to search for the best-matching block for each secret image block. Then the k-means clustering method is used to select k representative blocks for the not-well-matched secret image blocks. Moreover, the bases and indexes of the well-matched blocks together with the representative blocks are compressed by the Huffman coding. Finally, we use multi-layered syndrome-trellis codes (STC) to embed all the relevant data into multiple least significant bit (LSB) planes of the cover image. The results of experiments show that the proposed method outperforms some previous image-hiding methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Chan, C., Cheng, L.: Hiding data in images by simple LSB substitution. Pattern Recognition 37(3), 474–496 (2004)
Chang, C., Hsiao, J., Chan, C.: Finding optimal least-significant-bits substitution in image hiding by dynamic programming strategy. Pattern Recognition 36(7), 1583–1595 (2003)
Wang, R., Lin, C., Lin, J.: Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition 34(3), 671–683 (2001)
Chang, C., Chan, C., Fan, Y.: Image hiding scheme with modulus function and dynamic programming. Pattern Recognition 39(6), 1155–1167 (2006)
Thien, C., Lin, J.: A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition 36(12), 2875–2881 (2003)
Wang, S.: Steganography of capacity required using modulo operator for embedding secret image. Applied Mathematics and Computation 164(1), 99–116 (2005)
Fridrich, J., Goljan, M.: Practical steganalysis of digital images: state of the art. In: Proceedings of the SPIE 4675, Security and Watermarking of Multimedia Contents IV, pp. 1–13. SPIE (2002)
Chung, K., Shen, C., Chang, L.: A novel SVD- and VQ-based image hiding scheme. Pattern Recognition Letters 22(9), 1051–1058 (2001)
Maniccam, S., Bourbakis, N.: Lossless compression and information hiding in images. Pattern Recognition 37(3), 475–486 (2004)
Hu, Y.: High-capacity image hiding scheme based on vector quantization. Pattern Recognition 39(9), 1715–1724 (2006)
Wang, R., Tsai, Y.: An image-hiding method with high hiding capacity based on best-block matching and k-means clustering. Pattern Recognition 40(2), 398–409 (2007)
Wang, R., Chen, Y.: High-payload image steganography using two-way block matching. IEEE Signal Processing Letters 13(3), 161–164 (2006)
Chen, S., Wang, R.: High-payload image hiding scheme using k-way block matching. In: Proceedings of the 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 70–73. IEEE (2010)
Hsieh, Y., Chang, C., Liu, L.: A two-codebook combination and three-phase block match-ing based image-hiding scheme with high embedding capacity. Pattern Recognition 41(10), 3104–3113 (2008)
Lee, Y., Lee, J., Chen, W., Chang, K., Su, I., Chang, C.: High-payload image hiding with quality recovery using tri-way pixel-value differencing. Information Sciences 191, 214–225 (2012)
Chang, K., Chang, C., Huang, P., Tu, T.: A novel image steganographic method using tri-way pixel-value differencing. Journal of Multimedia 3(2), 37–44 (2008)
Tomas, F., Jan, J., Jessica, F.: Minimizing additive distortion in steganography using syn-drome-trellis codes. IEEE Transactions on Information Forensics and Security 6(3), 920–935 (2011)
Pevny, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly unde-tectable steganography. In: Proceedings of the 12th International Conference on Information Hiding, pp. 161–177. Springer, Berlin (2010)
Zhang, X., Zhang, W., Wang, S.: Efficient double-layered steganographic embedding. Electronics Letters 43(8), 482–483 (2007)
Zhang, W., Zhang, X., Wang, S.: A double layered “plus-minus one” data embedding scheme. IEEE Signal Processing Letters 14(11), 848–851 (2007)
Vojtěch, H., Jessica, F., Tomáš, D.: Universal distortion function for steganography in an arbitrary domain. EURASIP Journal on Information Security 2014(1), 1–13 (2014)
Guo, L., Ni, J., Shi, Y.: Uniform Embedding for Efficient JPEG Steganography. IEEE Transactions on Information Forensics and Security 9(5), 814–825 (2014)
Vojtěch, H., Jessica, F.: Designing steganographic distortion using directional filters. In: Proceedings of the 4th International Workshop on Information Forensics and Security, pp. 234–239. IEEE (2012)
Chen, J., Zhang, W., Hu, J., Zhu, Y., Guo, D.: An efficient (k, p) notational system trans-form algorithm. Journal of Applied Sciences 31(6), 569–578 (2013)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Han, T., Fei, J., Liu, S., Chen, X., Zhu, Y. (2014). High-Payload Image-Hiding Scheme Based on Best-Block Matching and Multi-layered Syndrome-Trellis Codes. In: Benatallah, B., Bestavros, A., Manolopoulos, Y., Vakali, A., Zhang, Y. (eds) Web Information Systems Engineering – WISE 2014. WISE 2014. Lecture Notes in Computer Science, vol 8787. Springer, Cham. https://doi.org/10.1007/978-3-319-11746-1_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-11746-1_24
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11745-4
Online ISBN: 978-3-319-11746-1
eBook Packages: Computer ScienceComputer Science (R0)