Abstract
Steganography with high payload is the needs of the real application in the context of large data. Nowadays, the published steganography have the significant achievements on the embedding quality, but the embedding capacity usually is not enough. In this paper, a new image data embedding with large payload based on reference matrix method is proposed. The reference matrix is generated by a base-9 numeral system, which guides cover pixel pairs’ modifications. Compared to the recent methods, the experimental results show the proposed method not only ensures the accepted image quality, but has the larger embedding capacity which is up to 3.169 bpp.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Johnson, N.F., Jajodia, S.: Exploring Steganography-seeing the Unseen. IEEE Computer 31(2), 26–34 (1998)
Hong, W., Chen, T.S.: A Novel Data Embedding Method Using Adaptive Pixel Pair Matching. IEEE Transactions on Information Forensics and Security 7(1), 176–184 (2012)
Tian, H., Liu, J., Li, S.: Improving Security of Quantization-Index-Modulation Steganography in Low Bit-rate Speech Streams. Multimedia Systems 20(2), 143–154 (2014)
Cetin, O., Ozcerit, T.: A New Steganography Algorithm based on Color Histograms for Data Embedding into Raw Video. Computers & Security 28(1), 670–682 (2009)
Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, Cambridge (2009)
Turner, L.F.: Digital Data Security System. PatentIPN, WO89/08915 (1989)
Ker, A.D.: Improved detection of LSB steganography in grayscale images. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 97–115. Springer, Heidelberg (2004)
Mielikainen, J.: LSB Matching Revisited. IEEE Signal Processing Letters 13(5), 285–287 (2006)
Zhang, X., Wang, S.: Efficient Steganographic Embedding by Exploiting Modification Direction. IEEE Communications Letters 10(11), 781–783 (2006)
Chang, C.C., Chou, Y.C., Kieu, T.D.: An information hiding scheme using Sudoku. In: Proceedings of the Third International Conference on Innovative Computing, Information and Control, pp. 17–21(2008)
Hong, W., Chen, T.S., Shiu, C.W.: A minimal euclidean distance searching technique for Sudoku steganography. In: Proceedings of International Symposium on Information Science and Engineering, vol. 1, pp. 515–518 (2008)
Chao, R.M., Wu, H.C., Lee, C.C.: A Novel Image Data Hiding Scheme with Diamond Encoding. EURASIP Journal on Information Security, 1–9 (2009)
Chen, J., Shiu, C.W., Wu, M.C.: An Improvement of Diamond Encoding Using Characteristic Value Positioning and Modulus Function. Journal of Systems and Software 86(5), 1377–1383 (2013)
Chang, C.C., Liu, Y., Nguyen, T.: A novel turtle shell based scheme for data hiding. In: The Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2014), Kitakyushu, Japan, pp. 89–93 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Xia, Y., Yin, Z., Wang, L. (2015). Image Data Embedding with Large Payload Based on Reference-Matrix. In: Tan, T., Ruan, Q., Wang, S., Ma, H., Di, K. (eds) Advances in Image and Graphics Technologies. IGTA 2015. Communications in Computer and Information Science, vol 525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47791-5_7
Download citation
DOI: https://doi.org/10.1007/978-3-662-47791-5_7
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-47790-8
Online ISBN: 978-3-662-47791-5
eBook Packages: Computer ScienceComputer Science (R0)