skip to main content
10.1145/3177404.3177452acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicvipConference Proceedingsconference-collections
research-article

Extended Exploiting-Modification-Direction Data Hiding with High Capacity

Published: 27 December 2017 Publication History

Abstract

Data hiding is referred as a famous and effective technique for delivering secret message securely, in which the secret message is concealed in a cover medium during transmission. At present, reference matrix is extensively applied to data hiding, but the embedding capacity of existing reference matrix based data hiding schemes is limited. In this paper, we propose an extended exploiting-modification-direction (EMD) data hiding scheme to enhance the embedding capacity. An extended EMD reference matrix is established to guide the hiding procedure such that the embedding capacity can achieve as large as 2.5 bpp. Experimental results reveal that the proposed scheme maintains better embedding capacity than some state-of-the-art schemes while keeping great image quality.

References

[1]
Huang, F., Qu, X., Kim, H. J., and Huang, J. 2016. Reversible data hiding in JPEG images. IEEE Trans. Circuits Syst. Video Technol. 26, 9 (Sept. 2016), 1610--1621.
[2]
Mohapatra, C and Pandey, M. 2015. A review on current methods and application of digital image steganography. Int. J. Multidiscip. Approach Stud. 2, 2 (Mar. 2015), 163--178.
[3]
Zhang, X. and Wang, S. 2006. Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 10, 11 (Nov. 2006), 781--783.
[4]
Kim, H. J., Kim, C., Choi, Y., Wang, S., and Zhang, X. 2010. Improved modification direction schemes. Comput. Math. Appl. 60, 2 (Apr. 2010), 319--325.
[5]
Chang, C. C., Chou, Y. C., and Kieu, T. D. 2008. An information hiding scheme using Sudoku. In Proceedings of the Third International Conference on Innovative Computing, Information and Control (Dalian, China, June 18 - 20, 2008). ICICIC '08. IEEE, New York, NY, 17--22.
[6]
Hong, W., Chen, T. S., and Shiu, C. W. 2008. A minimal Euclidean distance searching technique for Sudoku steganography. In Proceedings of International Symposium on Information Science and Engineering (Shanghai, China, December 20 - 22, 2008). ISISE '08. IEEE, New York, NY, 515--518.
[7]
Chang, C. C., Liu Y., and Nguyen, T. S. 2014. A novel turtle shell based scheme for data hiding. In Proceedings of the Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (Kitakyushu, Japan, August 27 - 29, 2014). IIHMSP '14. IEEE, New York, NY, 89--93.
[8]
Liu, Y., Chang, C. C., and Nguyen, T. S. 2016. High capacity turtle shell-based data hiding. IET Image Process. 10, 2 (Feb. 2016), 130--137.
[9]
Rivest, R., Shamir, A., and Adlenan, L. 1978. A scheme for obtaining digital signature and public key cryptosystems. Commun. ACM. 21, 2 (Feb. 1978), 120--126.
[10]
Davis, R. M. 1978. The data encryption standard in perspective. IEEE Commun. Soc. Mag.16, 6 (Nov. 1978), 5--9.

Cited By

View all
  • (2023)Forensic multi-dimensional Ary exploited modified direction data embedding approach to increase imperceptibility and robustness of secured dataMultimedia Tools and Applications10.1007/s11042-023-14500-382:23(35091-35120)Online publication date: 9-Mar-2023
  • (2022)Analysis of Spatial Domain Image Steganography Technique for high-capacity2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)10.1109/ACCAI53970.2022.9752614(1-7)Online publication date: 28-Jan-2022
  • (2022)Application of Forensic Audio-Video Steganography Technique to Improve Security, Robustness, and Authentication of Secret DataComputing Science, Communication and Security10.1007/978-3-031-10551-7_2(11-25)Online publication date: 2-Jul-2022
  • Show More Cited By

Index Terms

  1. Extended Exploiting-Modification-Direction Data Hiding with High Capacity

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICVIP '17: Proceedings of the International Conference on Video and Image Processing
    December 2017
    272 pages
    ISBN:9781450353830
    DOI:10.1145/3177404
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • Nanyang Technological University

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 27 December 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Data hiding
    2. exploiting-modification-direction (EMD)
    3. extended EMD reference matrix
    4. high capacity

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICVIP 2017

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 25 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Forensic multi-dimensional Ary exploited modified direction data embedding approach to increase imperceptibility and robustness of secured dataMultimedia Tools and Applications10.1007/s11042-023-14500-382:23(35091-35120)Online publication date: 9-Mar-2023
    • (2022)Analysis of Spatial Domain Image Steganography Technique for high-capacity2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)10.1109/ACCAI53970.2022.9752614(1-7)Online publication date: 28-Jan-2022
    • (2022)Application of Forensic Audio-Video Steganography Technique to Improve Security, Robustness, and Authentication of Secret DataComputing Science, Communication and Security10.1007/978-3-031-10551-7_2(11-25)Online publication date: 2-Jul-2022
    • (2021)An efficient image tamper detection and self-recovery scheme using rehashing model based digital watermarkingThirteenth International Conference on Digital Image Processing (ICDIP 2021)10.1117/12.2600985(51)Online publication date: 30-Jun-2021
    • (2021)Retracing extended sudoku matrix for high-capacity image steganographyMultimedia Tools and Applications10.1007/s11042-021-10675-980:12(18627-18651)Online publication date: 1-May-2021
    • (2020)An EMD-based data hiding scheme for JPEG imagesConnection Science10.1080/09540091.2020.185305533:3(515-531)Online publication date: 10-Dec-2020
    • (2019)Generalized Scheme Based on Octagon-Shaped Shell for Data Hiding in Steganographic ApplicationsSymmetry10.3390/sym1106076011:6(760)Online publication date: 4-Jun-2019
    • (2019)Extended squared magic matrix for embedding secret information with large payloadMultimedia Tools and Applications10.1007/s11042-019-7252-x78:14(19045-19059)Online publication date: 1-Jul-2019
    • (2019)Generalize the EMD scheme on an n-dimensional hypercube with maximum payloadMultimedia Tools and Applications10.1007/s11042-019-7228-x78:13(18363-18377)Online publication date: 1-Jul-2019

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media