skip to main content
research-article

Data embedding in image-media using weight-function on modulo operations

Published: 22 February 2013 Publication History

Abstract

Multimedia hiding system is to embed message behind the specified media, but it is still kept normal in media representations via human sensitive organizations without causing imperceptibility. In this article, we propose a data hiding system by means of flexible exploiting modification directions to achieve safer message concealments in image-media. In our scheme, n cover-pixels are flexibly chosen on modulo operations to embed a secret s, where n = ⌈ log3(s) ⌉. The varied pixel values associated with the chosen n pixels are only changed among [-1, 1]. Because the numbers of adjustable pixels are much greater than the pixels in the past scheme, our scheme is able to obtain a higher embedded ratio in response to the capacity requirements of information hiding systems. In addition, we also applied the statistics-steganalyzers to demonstrate that our scheme has accomplishment not only higher capacity but also kept the robustness against the blind steganalyzers.

References

[1]
Artz, D. 2001. Digital steganographic: Hiding data within data. IEEE Internet Comput. 5, 75--80.
[2]
Chan, C. K. and Chen, L. M. 2004. Hiding data in images by simple LSB substitution. Pattern Recognition 37, 3, 469--474.
[3]
Fridrich, J., Golijan, M., and Du, R. 2001. Reliable detection of LSB steganography in grayscale and color images. In Proceedings of ACM Workshop on Multimedia and Security. 27--30.
[4]
Jung, K. H. and Yoo, K. Y. 2009. Improved exploiting modification direction method by modulus operation. Int. J. Sig. Proc. Image Proc. Patt. 2, 1, 79--87.
[5]
Kim, H. J., Kim, C., Choi, Y., Wang, S., and Zhang, X. 2010. Improved modification direction methods. Comput. Math. Appl. 60, 2, 319--325.
[6]
Mielikanine, J. 2006. LSB matching revisited. IEEE Signal Processing Letters 13, 5, 285--277.
[7]
Steganography: A Few Tools To Discover Hidden Data. http://www.guillermito2.net/stegano/tools/index.html, accessible by Aug. 1st, 2010.
[8]
Wang, J. J., Sun, Y. T., Xu, H. A., Chen, K. K., Kim, H. J., and Joo, S. H. 2010. An improved section-wise exploiting modification direction Method. Signal Proc. 90, 11, 2954--2964.
[9]
Zhang, W. and Zhang, X. 2009. Generalization of the ZZW Embedding construction for steganography. IEEE Trans. Inf. Foren. Security 4, 3, 564--569.
[10]
Zhang, W., Zhang, X., and Wang, S. 2008. Maximizing steganographic embedding efficient by combining hamming codes and wet paper codes. In Information Hiding. Lecture Notes in Computer Science, vol. 5284. Springer, 60--71.
[11]
Zhang, X. and Wang, S. 2006. Efficient steganography embedding by exploiting modification direcions. IEEE Commun. Lett. 10, 11, 781--783.

Cited By

View all
  • (2019)Semi-fragile watermarking for color image authentication in power internet of things2019 IEEE Innovative Smart Grid Technologies - Asia (ISGT Asia)10.1109/ISGT-Asia.2019.8881663(2865-2869)Online publication date: May-2019
  • (2018)Efficient Information Hiding Based on Theory of NumbersSymmetry10.3390/sym1001001910:1(19)Online publication date: 8-Jan-2018
  • (2017)A novel message embedding algorithm using the optimal weighted modulusInformation Sciences: an International Journal10.1016/j.ins.2016.12.049388:C(17-36)Online publication date: 1-May-2017
  • Show More Cited By

Index Terms

  1. Data embedding in image-media using weight-function on modulo operations

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Embedded Computing Systems
    ACM Transactions on Embedded Computing Systems  Volume 12, Issue 2
    Special issue on embedded systems for interactive multimedia services (ES-IMS)
    February 2013
    209 pages
    ISSN:1539-9087
    EISSN:1558-3465
    DOI:10.1145/2423636
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Journal Family

    Publication History

    Published: 22 February 2013
    Accepted: 01 March 2011
    Revised: 01 March 2011
    Received: 01 October 2010
    Published in TECS Volume 12, Issue 2

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Exploit modification direction
    2. data hiding
    3. flexibility

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 16 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)Semi-fragile watermarking for color image authentication in power internet of things2019 IEEE Innovative Smart Grid Technologies - Asia (ISGT Asia)10.1109/ISGT-Asia.2019.8881663(2865-2869)Online publication date: May-2019
    • (2018)Efficient Information Hiding Based on Theory of NumbersSymmetry10.3390/sym1001001910:1(19)Online publication date: 8-Jan-2018
    • (2017)A novel message embedding algorithm using the optimal weighted modulusInformation Sciences: an International Journal10.1016/j.ins.2016.12.049388:C(17-36)Online publication date: 1-May-2017
    • (2017)An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detectionMultimedia Tools and Applications10.1007/s11042-016-3591-z76:7(9993-10016)Online publication date: 1-Apr-2017
    • (2017)Self-embedding watermarking scheme against JPEG compression with superior imperceptibilityMultimedia Tools and Applications10.1007/s11042-016-3574-076:7(9681-9712)Online publication date: 1-Apr-2017
    • (2016)An Improvement Data Hiding Scheme Based on Formula Fully Exploiting Modification Directions and Pixel Value Differencing Method2016 11th Asia Joint Conference on Information Security (AsiaJCIS)10.1109/AsiaJCIS.2016.20(136-140)Online publication date: Aug-2016
    • (2016)Bi-stretch reversible data hiding algorithm for absolute moment block truncation coding compressed imagesMultimedia Tools and Applications10.1007/s11042-015-2924-775:23(16153-16171)Online publication date: 1-Dec-2016
    • (2015)A Lossless Data Hiding Strategy Based on Two-Dimensional Side-Match PredictionsInformation and Communication Technology10.1007/978-3-319-24315-3_24(235-242)Online publication date: 19-Nov-2015

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media