Abstract
Many steganography schemes were invented for the purpose of safe communication. Such previous schemes often show good and reasonable performance, however, few have been based on paletted images; it is not easy to invent good steganographic schemes with little evidence of data hiding. In this paper, we propose new hiding schemes (r, N, k) based on binary images. The proposed hiding scheme (r, N, k) applied to paletted images using the Optimal Parity Assignment (OPA) approach. Experimental results show that the proposed palette-scheme (3,18,9) exhibits good performance compared to that of previous schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bierbrauer, J., Fridrich, J.: Constructing Good Covering Codes for Applications in Steganography. In: Shi, Y.Q. (ed.) Transactions on Data Hiding and Multimedia Security III. LNCS, vol. 4920, pp. 1–22. Springer, Heidelberg (2008)
EZStego[EB/OL]: http://www.informatik.htw-dresden.de/~fritzsch/VWA/Source/ (since December 10, 2012)
Fridrich, J., Du, R.: Secure Steganographic Methods for Palette Images. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 47–60. Springer, Heidelberg (2000)
Phan, T.H., Nguyen, H.T.: On the Maximality of Secret Data Ratio in CPTE Schemes. In: Nguyen, N.T., Kim, C.-G., Janiak, A. (eds.) ACIIDS 2011, Part I. LNCS, vol. 6591, pp. 88–99. Springer, Heidelberg (2011)
Huy, P.T., Thanh, N.H., Thang, T.M., Dat, N.T.: On Fastest Optimal Parity Assignments in Palette Images. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ACIIDS 2012, Part II. LNCS, vol. 7197, pp. 234–244. Springer, Heidelberg (2012)
Zhang, X., Wang, S.: Vulnerability of Pixel-Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security. Pattern Recognition Letters 25, 331–339 (2004)
Zhang, X., Wang, S.: Analysis of Parity Assignment Steganography in Palette Images. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005, Part III. LNCS (LNAI), vol. 3683, pp. 1025–1031. Springer, Heidelberg (2005)
Tseng, Y.-C., Pan, H.-K.: Secure and Invisible Data Hiding in 2-Color Images. In: Proceedings of INFOCOM 2001, pp. 887–896 (2001)
Zhang, X., Wang, S., Zhou, Z.: Multibit Assignment Steganography in Palette Images. IEEE Signal Processing Letters 15, 553–556 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Huy, P.T., Kim, C., Anh, N.T., Hoa, L.Q., Yang, CN. (2013). Data Hiding Based on Palette Images Using Weak Bases of Z2-Modules. In: Park, J.J.(.H., Arabnia, H.R., Kim, C., Shi, W., Gil, JM. (eds) Grid and Pervasive Computing. GPC 2013. Lecture Notes in Computer Science, vol 7861. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38027-3_70
Download citation
DOI: https://doi.org/10.1007/978-3-642-38027-3_70
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38026-6
Online ISBN: 978-3-642-38027-3
eBook Packages: Computer ScienceComputer Science (R0)