Skip to main content
Log in

An efficient high payload ±1 data embedding scheme

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Embedding of confidential data in the least significant bit of an image is still an attractive method of steganography. Utilizing the full capacity of cover images by embedding one bit of data per pixel, using methods such as LSB flipping or LSB matching, usually decreases the security, making the algorithm vulnerable to steganalytic attacks. In this paper, we propose a novel efficient high payload ±1 steganographic method based on a special two variable binary function. This function uses the information of the least two significant bit planes of the cover image for the embedding and extraction purposes. Embedding efficiency, defined as the number of embeddable bits per one change in the cover medium, is a good criterion for concurrent evaluation of the capacity and security. Rather than randomly selecting +1 or −1, we achieve higher embedding efficiencies by choosing the correct modification component. In the generalized form of the proposed method, n bits of data are embedded in n pixels of the cover medium, by causing one unit change in only one third of these pixels. Analytical and experimental results demonstrated that the proposed method provides higher embedding efficiency than the other LSB embedding schemes. The proposed method is also applicable to other digital cover media.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Anderson RJ, Petitcolas FAP (1998) On the limits of steganography. IEEE J Sel Areas Commun 16(4):474–481

    Article  Google Scholar 

  2. Available: http://decsai.ugr.es/cvg/CG/base.htm

  3. Bierbrauer J (1998) Crandall’s problem. Available: http://www.ws.binghamton.edu/fridrich/covcodes.pdf

  4. Bierbrauer J, Fridrich J (2008) Constructing good covering codes for applications in steganography. LNCS Transactions on Data Hiding and Multimedia Security, Springer-Verlag 4920:1–22

    Google Scholar 

  5. Crandall R (1998) Some notes on steganography. Available: http://os.inf.tu-dresden.de/∼westfeld/crandall.pdf

  6. Dijk M, Willems F (2001) Embedding information in gray-scale images. in Proc. 22nd Symp. Information Theory Benelux pp 147–154

  7. Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB steganography via sample pair analysis. IEEE Trans Signal Process 51(7):1995–2007

    Article  Google Scholar 

  8. Fridrich J, Goljan M (2002) Practical steganalysis of digital images-state of the art. in Proc. SPIE Security Watermarking Multimedia Contents, 4675:1–13

  9. Fridrich J, Goljan M, Dui R (2001) Reliable detection of LSB steganography in color and gray-scale images. Proc. of the ACM Workshop on Multimedia and Security, Ottawa, CA, October 5, pp 27–30

  10. Fridrich J, Lisonek P, Soukal D (2008) On steganographic embedding efficiency. in Proc. Information Hiding Workshop, vol. 4437, Springer LNCS, pp 282–296

  11. Fridrich J, Soukal D (2006) Matrix embedding for large payloads. IEEE Transaction on Information Forensics and Security 1(3):390–395

    Article  Google Scholar 

  12. Harmsen JJ (2003) Steganalysis of additive noise modelable information hiding. MS Thesis, Rensselaer Polytechnic Institute, Troy, New York, April

  13. Ker A (2004) Improved detection of LSB steganography in gray-scale images. in Proc. Information Hiding Workshop, vol. 3200, Springer LNCS, pp 97–115

  14. Ker A (2005) Steganalysis of LSB matching in gray-scale images. IEEE Signal Process Lett 12(6):441–444

    Article  Google Scholar 

  15. Khatirinejad M, P Lisonˇek (2008) Linear codes for high payload steganography. Discrete Appl Math. doi:10.1016/j.dam.2008.02.004

    Google Scholar 

  16. Lin WH, Horng SJ, Kao TW, Chen RJ, Chen YH, Lee CL, Terano T (2009) Image copyright protection with forward error correction. Expert Systems Appl 36(9):11888–11894

    Article  Google Scholar 

  17. Lin WH, Horng SJ, Kao TW, Fan P, Lee CL, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimedia 10(5):746–757

    Article  Google Scholar 

  18. Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287

    Article  Google Scholar 

  19. NRCS Photo Gallery Home, United State Department of Agriculture, available: http://photogallery.nrcs.usda.gov

  20. Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding—a survey. Proc IEEE, special issue on protection of multimedia content 87(7):1062–1078

    Google Scholar 

  21. Westfeld A (2001) F5__ A steganographic algorithm: high capacity despite better steganalysis. in Proc. Information Hiding Workshop, vol. 2137, Springer LNCS, pp 289–302

  22. Westfeld A, Pfitzman A (1999) Attacks on steganographic systems. in Proc. Information Hiding Workshop, Springer-Verlag, pp 61–76

  23. Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783

    Article  Google Scholar 

  24. Zhang W, Wang S, Zhang X (2007) Improving embedding efficiency of covering codes for applications in steganography. IEEE Commun Lett 11(8):680–682

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shadrokh Samavi.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Omoomi, M., Samavi, S. & Dumitrescu, S. An efficient high payload ±1 data embedding scheme. Multimed Tools Appl 54, 201–218 (2011). https://doi.org/10.1007/s11042-010-0517-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-010-0517-z

Keywords

Navigation