Skip to main content

High-Payload Image-Hiding Scheme Based on Best-Block Matching and Multi-layered Syndrome-Trellis Codes

  • Conference paper
Web Information Systems Engineering – WISE 2014 (WISE 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8787))

Included in the following conference series:

Abstract

Image steganography has been widely used in the domain of privacy protection, such as the storage and transmission of the secret images. This paper presents a novel image-hiding scheme to embed the secret image into an innocent cover image. We use a block matching procedure to search for the best-matching block for each secret image block. Then the k-means clustering method is used to select k representative blocks for the not-well-matched secret image blocks. Moreover, the bases and indexes of the well-matched blocks together with the representative blocks are compressed by the Huffman coding. Finally, we use multi-layered syndrome-trellis codes (STC) to embed all the relevant data into multiple least significant bit (LSB) planes of the cover image. The results of experiments show that the proposed method outperforms some previous image-hiding methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Chan, C., Cheng, L.: Hiding data in images by simple LSB substitution. Pattern Recognition 37(3), 474–496 (2004)

    Article  Google Scholar 

  2. Chang, C., Hsiao, J., Chan, C.: Finding optimal least-significant-bits substitution in image hiding by dynamic programming strategy. Pattern Recognition 36(7), 1583–1595 (2003)

    Article  Google Scholar 

  3. Wang, R., Lin, C., Lin, J.: Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition 34(3), 671–683 (2001)

    Article  MATH  Google Scholar 

  4. Chang, C., Chan, C., Fan, Y.: Image hiding scheme with modulus function and dynamic programming. Pattern Recognition 39(6), 1155–1167 (2006)

    Article  MATH  Google Scholar 

  5. Thien, C., Lin, J.: A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition 36(12), 2875–2881 (2003)

    Article  MATH  Google Scholar 

  6. Wang, S.: Steganography of capacity required using modulo operator for embedding secret image. Applied Mathematics and Computation 164(1), 99–116 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  7. Fridrich, J., Goljan, M.: Practical steganalysis of digital images: state of the art. In: Proceedings of the SPIE 4675, Security and Watermarking of Multimedia Contents IV, pp. 1–13. SPIE (2002)

    Google Scholar 

  8. Chung, K., Shen, C., Chang, L.: A novel SVD- and VQ-based image hiding scheme. Pattern Recognition Letters 22(9), 1051–1058 (2001)

    Article  MATH  Google Scholar 

  9. Maniccam, S., Bourbakis, N.: Lossless compression and information hiding in images. Pattern Recognition 37(3), 475–486 (2004)

    Article  MATH  Google Scholar 

  10. Hu, Y.: High-capacity image hiding scheme based on vector quantization. Pattern Recognition 39(9), 1715–1724 (2006)

    Article  MATH  Google Scholar 

  11. Wang, R., Tsai, Y.: An image-hiding method with high hiding capacity based on best-block matching and k-means clustering. Pattern Recognition 40(2), 398–409 (2007)

    Article  MATH  Google Scholar 

  12. Wang, R., Chen, Y.: High-payload image steganography using two-way block matching. IEEE Signal Processing Letters 13(3), 161–164 (2006)

    Article  Google Scholar 

  13. Chen, S., Wang, R.: High-payload image hiding scheme using k-way block matching. In: Proceedings of the 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 70–73. IEEE (2010)

    Google Scholar 

  14. Hsieh, Y., Chang, C., Liu, L.: A two-codebook combination and three-phase block match-ing based image-hiding scheme with high embedding capacity. Pattern Recognition 41(10), 3104–3113 (2008)

    Article  MATH  Google Scholar 

  15. Lee, Y., Lee, J., Chen, W., Chang, K., Su, I., Chang, C.: High-payload image hiding with quality recovery using tri-way pixel-value differencing. Information Sciences 191, 214–225 (2012)

    Article  Google Scholar 

  16. Chang, K., Chang, C., Huang, P., Tu, T.: A novel image steganographic method using tri-way pixel-value differencing. Journal of Multimedia 3(2), 37–44 (2008)

    Google Scholar 

  17. Tomas, F., Jan, J., Jessica, F.: Minimizing additive distortion in steganography using syn-drome-trellis codes. IEEE Transactions on Information Forensics and Security 6(3), 920–935 (2011)

    Article  Google Scholar 

  18. Pevny, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly unde-tectable steganography. In: Proceedings of the 12th International Conference on Information Hiding, pp. 161–177. Springer, Berlin (2010)

    Google Scholar 

  19. Zhang, X., Zhang, W., Wang, S.: Efficient double-layered steganographic embedding. Electronics Letters 43(8), 482–483 (2007)

    Article  Google Scholar 

  20. Zhang, W., Zhang, X., Wang, S.: A double layered “plus-minus one” data embedding scheme. IEEE Signal Processing Letters 14(11), 848–851 (2007)

    Article  Google Scholar 

  21. Vojtěch, H., Jessica, F., Tomáš, D.: Universal distortion function for steganography in an arbitrary domain. EURASIP Journal on Information Security 2014(1), 1–13 (2014)

    Article  Google Scholar 

  22. Guo, L., Ni, J., Shi, Y.: Uniform Embedding for Efficient JPEG Steganography. IEEE Transactions on Information Forensics and Security 9(5), 814–825 (2014)

    Article  Google Scholar 

  23. Vojtěch, H., Jessica, F.: Designing steganographic distortion using directional filters. In: Proceedings of the 4th International Workshop on Information Forensics and Security, pp. 234–239. IEEE (2012)

    Google Scholar 

  24. Chen, J., Zhang, W., Hu, J., Zhu, Y., Guo, D.: An efficient (k, p) notational system trans-form algorithm. Journal of Applied Sciences 31(6), 569–578 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Han, T., Fei, J., Liu, S., Chen, X., Zhu, Y. (2014). High-Payload Image-Hiding Scheme Based on Best-Block Matching and Multi-layered Syndrome-Trellis Codes. In: Benatallah, B., Bestavros, A., Manolopoulos, Y., Vakali, A., Zhang, Y. (eds) Web Information Systems Engineering – WISE 2014. WISE 2014. Lecture Notes in Computer Science, vol 8787. Springer, Cham. https://doi.org/10.1007/978-3-319-11746-1_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11746-1_24

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11745-4

  • Online ISBN: 978-3-319-11746-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics