skip to main content
10.1145/2108616.2108678acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

A reversible and multiple-layer embedding strategy with high capacity

Authors Info & Claims
Published:14 January 2010Publication History

ABSTRACT

This paper proposes a reversible data-embedding scheme that improves on Kieu and Chang's method by increasing the embedding capacity measured by bits per pixel (bpp) while maintaining high image quality. The embedding procedure of the proposed method consists of two phases: "horizontal embedding" and "vertical embedding." Every overlapping pixel pair can carry one secret bit for enhancing the embedding capacity. The experimental results show that the PSNR value of one-layer embedding is greater than 52 dB, and the embedding capacity is more than 1 bpp for all 512x512 test images. Even after four-layer embedding, the experimental results show that the embedding capacity of test images is more than 4.8 bpp and the PSNR value is higher than 51 dB. The results show that the proposed method has superior measures in both image quality and embedding capacity.

References

  1. F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, "Information hiding-a survey," Proceedings of IEEE, vol. 87, no. 7, pp. 1062--1078, 1999.Google ScholarGoogle ScholarCross RefCross Ref
  2. X. P. Zhang and S. Z. Wang, "Efficient steganographic embedding by exploiting modification direction," IEEE Communications Letters, vol. 10, no. 11, pp. 1--3, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  3. J. S. Pan, M. T. Sung, H. C. Huang and B. Y. Liao, "Robust VQ-based digital watermarking for the memoryless binary symmetric channel," IEICE Transactions on Fundamentals, vol. E-87A, no. 7, pp. 1839--1841, 2004.Google ScholarGoogle Scholar
  4. L. Kamstra and H. J. A. M. Heijmans, "Reversible data embedding into images using wavelet techniques and sorting," IEEE Transactions on Image Processing, vol. 14, no. 12, pp. 2082--2090, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Y. T. Wu and Y. S. Frank, "Digital watermarking based on chaotic map and reference register," Pattern Recognition, vol. 40, no. 12, pp. 3753--3763, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. X. Zhou, D. Lai, S. Yuan, D. H. Li and J. P. Hu, "A method for hiding information utilizing double-random phase-encoding technique," Optics and Laser Technology, vol. 39, no. 7, pp. 1360--1363, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  7. J. M. Barton, "Method and apparatus for embedding authentication information within digital data," US Patent 5, pp. 646--997, 1997.Google ScholarGoogle Scholar
  8. B. Macq, "Lossless multiresolution transform for image authenticating watermarking," Proceedings of the EUSIPCO, Tampere, Finland, pp. 533--536, Sept. 2000.Google ScholarGoogle Scholar
  9. J. Tian, "Reversible data embedding using a difference expansion," IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 831--841, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. T. D. Kieu and C. C. Chang, "A high stego-image quality steganographic scheme with reversibility and high payload using multiple embedding strategy," Journal of Systems and Software, vol. 82, no. 10, pp. 1743--1752, Oct. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A reversible and multiple-layer embedding strategy with high capacity

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      ICUIMC '10: Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
      January 2010
      550 pages
      ISBN:9781605588933
      DOI:10.1145/2108616

      Copyright © 2010 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 14 January 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate251of941submissions,27%
    • Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader