Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4681))

Included in the following conference series:

  • 1126 Accesses

Abstract

Data hiding strategy based on equivalence class is proposed. We transform information hiding problem into finding the representative element in specific equivalence class. Then minimizing the distortion in the equivalence class (MDEC) is proposed, and this is used in the LSB hiding scheme. The theoretic performance of LSB hiding based on MDEC is analyzed in detail. Then a variable LSB method based on MDEC is also proposed. It can solve efficiently the problem of selecting different LSB methods to fit message with different length. Similarly, the performance is also proposed. In fact, there exists a tradeoff between distortion and length of information. However, most spatial hiding scheme based on LSB will reach larger distortion in hiding less information. The proposed hiding strategy can resolve this issue efficiently and can meet such applications where the size of message is very unstable. In addition, proposed strategy not only improves the quality of steg image but also does not sacrifice its security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding – a Survey. Proceedings of the IEEE 87(7), 1062–1078 (1999)

    Article  Google Scholar 

  2. Tirkel, A.Z., Rankin, G.A., Schyndel, R.M.V.: Electronic Watermark. In: Proceedings of Int. Conf. Digital Image Computing, Technology and Applications, Technology and Applications, pp. 666–672 (1993)

    Google Scholar 

  3. Schyndel, R.G.V., Tirkel, A.Z., Osborne, C.F.: A Digital Watermark. Proceedings of IEEE Int. Conf. Image Processing 2, 86–90 (1994)

    Article  Google Scholar 

  4. Schyndel, R.G.V., Tirkel, A.Z., Osborne, C.F.: A Two Dimensional Watermark. In: Proceedings Int. Conf. Digital Image Computing, Technology and Applications, pp. 378–383 (1995)

    Google Scholar 

  5. Bender, W., Gruhl, D., Morimot, N., Lu, A.: Techniques for Data Hiding. IBM Systems Journal 35(3-4), 313–336 (1996)

    Article  Google Scholar 

  6. Nikolaidis, N., Pitas, I.: Copyright Protection of Images Using Robust Digital Signatures. In: Proceedings of IEEE Int. Conf. on Acoustics Speech and Signal Processing, pp. 2168–2717. IEEE Computer Society Press, Los Alamitos (1996)

    Chapter  Google Scholar 

  7. Wang, R.Z., Lin, C.F., Lin, J.C.: Hiding Data in Images By Optimal Moderately-Significant-Bit Replacement. IEE Electronics Letters 36(25), 2069–2070 (2000)

    Article  Google Scholar 

  8. Chan, C.K., Cheng, L.M.: Hiding Data in Images By Simple LSB Substitution. Pattern Recognition 37(3), 469–474 (2004)

    Article  MATH  Google Scholar 

  9. Mielikainen, J.: LSB Matching Revisited. IEEE Signal Processing Letters 13(5), 285–287 (2006)

    Article  Google Scholar 

  10. Wang, R.Z., Lin, C.F., Lin, J.C.: Image Hiding By Optimal LSB Substitution and Genetic Algorithm. Pattern Recognition 34(3), 671–683 (2001)

    Article  MATH  Google Scholar 

  11. Chang, C.C., Hsiao, J.Y., Chan, C.S.: Finding Optimal Least-Significant-Bit Substitution in Image Hiding By Dynamic Programming Strategy. Pattern Recognition 36(7), 1583–1595 (2003)

    Article  Google Scholar 

  12. Chan, C.K., Cheng, L.M.: Improved Hiding Data in Images By Optimal Moderately-Significant-Bit Replacement. IEE Electronics Letters 37(16), 1017–1018 (2001)

    Article  Google Scholar 

  13. Thien, C.C., Lin, J.C.: A Simple and High-hiding Capacity Method for Hiding Digit-by-digit Data in Images Based on Modulus Function. Pattern Recognition 36(12), 2875–2881 (2006)

    Article  Google Scholar 

  14. Wang, S.J.: Steganography of Capacity Required Using Modulo Operator for Embedding Secret Image. Applied Mathematics and Computation 164(1), 99–116 (2006)

    Article  Google Scholar 

  15. Chang, C.C., Chan, C.S., Fan, Y.H.: Image Hiding Scheme with Modulus Function and Dynamic Programming Strategy on Partitioned Pixels. Pattern Recognition 39(6), 1155–1167 (2006)

    Article  MATH  Google Scholar 

  16. Fridrich, J., Goljan, M.: Detecting LSB Steganography in Color and Grayscale Images. Magazine of IEEE Multimedia 8(4), 22–28 (2001)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

De-Shuang Huang Laurent Heutte Marco Loog

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Liu, S., Yao, H., Gao, W., Yang, D. (2007). Minimizing the Distortion Spatial Data Hiding Based on Equivalence Class. In: Huang, DS., Heutte, L., Loog, M. (eds) Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues. ICIC 2007. Lecture Notes in Computer Science, vol 4681. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74171-8_66

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74171-8_66

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74170-1

  • Online ISBN: 978-3-540-74171-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics