Skip to main content

Image Data Embedding with Large Payload Based on Reference-Matrix

  • Conference paper
  • First Online:
Advances in Image and Graphics Technologies (IGTA 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 525))

Included in the following conference series:

  • 1234 Accesses

Abstract

Steganography with high payload is the needs of the real application in the context of large data. Nowadays, the published steganography have the significant achievements on the embedding quality, but the embedding capacity usually is not enough. In this paper, a new image data embedding with large payload based on reference matrix method is proposed. The reference matrix is generated by a base-9 numeral system, which guides cover pixel pairs’ modifications. Compared to the recent methods, the experimental results show the proposed method not only ensures the accepted image quality, but has the larger embedding capacity which is up to 3.169 bpp.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Johnson, N.F., Jajodia, S.: Exploring Steganography-seeing the Unseen. IEEE Computer 31(2), 26–34 (1998)

    Article  Google Scholar 

  2. Hong, W., Chen, T.S.: A Novel Data Embedding Method Using Adaptive Pixel Pair Matching. IEEE Transactions on Information Forensics and Security 7(1), 176–184 (2012)

    Article  Google Scholar 

  3. Tian, H., Liu, J., Li, S.: Improving Security of Quantization-Index-Modulation Steganography in Low Bit-rate Speech Streams. Multimedia Systems 20(2), 143–154 (2014)

    Article  MathSciNet  Google Scholar 

  4. Cetin, O., Ozcerit, T.: A New Steganography Algorithm based on Color Histograms for Data Embedding into Raw Video. Computers & Security 28(1), 670–682 (2009)

    Article  Google Scholar 

  5. Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, Cambridge (2009)

    Book  Google Scholar 

  6. Turner, L.F.: Digital Data Security System. PatentIPN, WO89/08915 (1989)

    Google Scholar 

  7. Ker, A.D.: Improved detection of LSB steganography in grayscale images. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 97–115. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  8. Mielikainen, J.: LSB Matching Revisited. IEEE Signal Processing Letters 13(5), 285–287 (2006)

    Article  Google Scholar 

  9. Zhang, X., Wang, S.: Efficient Steganographic Embedding by Exploiting Modification Direction. IEEE Communications Letters 10(11), 781–783 (2006)

    Article  Google Scholar 

  10. Chang, C.C., Chou, Y.C., Kieu, T.D.: An information hiding scheme using Sudoku. In: Proceedings of the Third International Conference on Innovative Computing, Information and Control, pp. 17–21(2008)

    Google Scholar 

  11. Hong, W., Chen, T.S., Shiu, C.W.: A minimal euclidean distance searching technique for Sudoku steganography. In: Proceedings of International Symposium on Information Science and Engineering, vol. 1, pp. 515–518 (2008)

    Google Scholar 

  12. Chao, R.M., Wu, H.C., Lee, C.C.: A Novel Image Data Hiding Scheme with Diamond Encoding. EURASIP Journal on Information Security, 1–9 (2009)

    Google Scholar 

  13. Chen, J., Shiu, C.W., Wu, M.C.: An Improvement of Diamond Encoding Using Characteristic Value Positioning and Modulus Function. Journal of Systems and Software 86(5), 1377–1383 (2013)

    Article  Google Scholar 

  14. Chang, C.C., Liu, Y., Nguyen, T.: A novel turtle shell based scheme for data hiding. In: The Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2014), Kitakyushu, Japan, pp. 89–93 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhaoxia Yin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Xia, Y., Yin, Z., Wang, L. (2015). Image Data Embedding with Large Payload Based on Reference-Matrix. In: Tan, T., Ruan, Q., Wang, S., Ma, H., Di, K. (eds) Advances in Image and Graphics Technologies. IGTA 2015. Communications in Computer and Information Science, vol 525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47791-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-47791-5_7

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-47790-8

  • Online ISBN: 978-3-662-47791-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics