Preview

Steganography: Interpolation and Image

Powerful Essays
Open Document
Open Document
6788 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Steganography: Interpolation and Image
Expert Systems with Applications 39 (2012) 6712–6719

Contents lists available at SciVerse ScienceDirect

Expert Systems with Applications journal homepage: www.elsevier.com/locate/eswa

An efficient image interpolation increasing payload in reversible data hiding
Chin-Feng Lee ⇑, Yu-Lin Huang
Department of Information Management, Chaoyang University of Technology, Taichung 41349, Taiwan

a r t i c l e

i n f o

a b s t r a c t
Image interpolation is a very important branch in image processing. It is widely used in imaging world, for example, image interpolation is often used in 3-D medical image to compensate for information insufficiency during image reconstruction by simulating additional images between two-dimensional images. Reversible data hiding has become significant branch in information hiding field. Reversibility allows the original media to be completely restored without any degradation after the embedded messages have been extracted. This study proposes a high-capacity image hiding scheme by exploiting an interpolating method called Interpolation by Neighboring Pixels (INP) on Maximum Difference Values to improve the performance of data hiding scheme proposed by Jung and Yoo. The proposed scheme offers the benefits of high embedding capacity with low computational complexity and good image quality. The experimental results showed that the proposed scheme has good performance for payload up to 2.28 bpp. Moreover, the INP yields higher PSNRs than other interpolating methods such as NMI, NNI and BI. Ó 2011 Elsevier Ltd. All rights reserved.

Keywords: Reversible data hiding Steganography Image interpolation

1. Introduction Data hiding is an information security technology used for protecting information not to be perceptible, where a sender can use the data hiding technique to hide information from being detected, stolen, or damaged by unauthorized users during transmission via public networks. Data hiding is able to avoid detection that



References: Alattar, A. M. (2004). Reversible watermark using the difference expansion of a generalized integer transform. IEEE Transactions on Image Processing, 13, 1147–1156. Allebach, J., & Wong, P.W. (1996). Edge-directed interpolation, In International conference on image processing (pp. 707–710). Celik, M. U., Sharma, G., Tekalp, A. M., & Saber, E. (2005). Lossless generalized-LSB data embedding. IEEE Transactions on Image Processing, 14, 253–266. Chan, C. K., & Cheng, L. M. (2004). Hiding data in images by simple LSB substitution. Pattern Recognition, 37, 469–474. Chen, W. J., Chang, C. C., & Le, T. H. N. (2010). High payload steganography mechanism using hybrid edge detector. Expert Systems with Applications, 37, 3292–3301. Jung, K. H., & Yoo, K. Y. (2009). Data hiding method using image interpolation. Computer Standards & Interfaces, 31, 465–470. Lee, C. F., & Chang, W. T. (2010). Recovery of color images by composed associative mining and edge detection. Journal of Information Hiding and Multimedia Signal Processing, 1, 310–324. Lee, C. F., Chang, C. C., Pai, P. Y., & Huang, W. H. (2010). An effective demosaicing method for CFA image. International Journal of Innovative Computing, Information and Control, 6, 5485–5499. Lee, C. F., & Chen, H. L. (2010). A novel data hiding scheme based on modulus function. Journal of Systems and Software, 83, 832–843. Lehmann, T. M., Gonner, C., & Spitzer, K. (1999). Survey: interpolation methods in medical image processing. IEEE Transactions on Medical Imaging, 18, 1049–1075. Ni, Z., Shi, Y. Q., Ansari, N., & Su, W. (2006). Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology, 16, 354–362. Sun, H. M., Weng, C. Y., Lee, C. F., & Yang, C. H. (2011). Anti-forensics with Steganographic Data Embedding in Digital Images. IEEE Journal on Selected Areas in Communications, 29, 1392–1403. Thévenaz, P., Blu, T., & Unser, M. (2000). Interpolation revisited. IEEE Transactions on Medical Imaging, 19, 739–758. Tian, J. (2003). Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology, 13, 890–896. Weng, S. W., Zhao, Y., & Pan, J. S. (2008). A novel reversible data hiding scheme. International Journal of Innovative Computing, Information and Control, 4, 351–358. Xin, L., & Orchard, M. T. (2001). New edge-directed interpolation. IEEE Transactions on Image Processing, 10, 1521–1527. Yang, C. H., Weng, C. Y., Wang, S. J., & Sun, H. M. (2008). Adaptive data hiding in edged areas of images with spatial LSB domain systems. IEEE Transactions on Information Forensics and Security, 3, 488–497.

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. digital watermark (Incorrect. A digital watermark is used to identify proprietary data, but it does not protect privacy.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Powerful Essays

    Western Civ Ii Notes

    • 3811 Words
    • 16 Pages

    * Louis Napoleon Bonaparte: nephew of Napoleon, he comes to France and promises to restore stability and make France great again, becomes president of the 2nd French Republic…

    • 3811 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    Dbq 2003 Form B Apush

    • 670 Words
    • 3 Pages

    The Progressive Era was a thirty year period in which the United States was completely reformed. Actions were taken to improve working conditions for laborers, create a sexually unbiased work system and regulate the economy. President Theodore Roosevelt and Woodrow Wilson both helped create a more direct democracy in which the people would have a voice. During those thirty years, amendments 16 to 19 were ratified to regulate and reform the country. Muckrakers were writers who worked for the printing companies exposed the public to all of the corruption that was occurring both openly and behind closed doors. By exposing the public to the corruption, American society was enlightened and inspired to reform itself.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Compare and contrast the two trials of Tom Robinson in To Kill a Mockingbird and Twelve Angry Men.…

    • 310 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    James Fallows explained in his essay, “Tinfoil Underwear,” how much previously viewed information is stored inside a computer, or elsewhere like an IP address. It is mind blowing how much personal information is saved or transferred to another…

    • 1379 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Greenberg wrote this article to talk about new technology and digital watermarks that help prevent identity theft. Greenberg states, “Reports on the use of biometrics technology and digital watermarks to secure important documents and prevent identity theft. Information on the biometric technology; Features of the digital watermarks; Responsibilities of individuals who are using these technologies.” This article relates to my topic because it explains, what can contribute to decreasing identity theft. This article is valid because it gives many examples on decreasing identity theft.…

    • 626 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Internet privacy can be considered as a subset of computer privacy. Computer privacy consists of the data privacy relating to the avoidance of the improper disclosure of the personally identifiable information collected and stored by websites. The effective sharing of data while protecting the private information is the real challenge.…

    • 884 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The most common methods of obfuscation are numeric variance, character scrambling, nulling, aggregating, encoding, artificial data generating, and repeating of the character masking process (Magnabosco, 2009). These methods rely on functions that exist in the SQL system server.…

    • 684 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The advancement of technology has numerous benefits to society. Technology is reliable for communication, convenient for performing daily tasks and provides instantaneous access to information. While these statements hold true, there is one major con of technology: lack of privacy. Privacy can be invaded via the internet due to social media accounts, e-mails, browser cookies and caches. Besides the internet, smart cards and security tags are two other ways of collecting information.…

    • 1144 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Coding: Questions

    • 2042 Words
    • 18 Pages

    Data hiding, which means that critical data stored inside the object is protected from code outside the object is accomplished in Java by…

    • 2042 Words
    • 18 Pages
    Good Essays
  • Better Essays

    Another way to determine whether an image has been manipulated or not relies on the fact that in a digital…

    • 1137 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Photo Manipulation

    • 757 Words
    • 4 Pages

    With digital processing, there is almost no limit to what can be done to an image, and many things…

    • 757 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Data Masking

    • 4525 Words
    • 19 Pages

    increases, more and more data gets shared, thus further increasing the risk of a data breach,…

    • 4525 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    RRL S.I.P. draft

    • 594 Words
    • 3 Pages

    (David Jin and Sally Jin ,Advances in Multimedia, Software Engineering and Computing Vol. 1,2011, China, Springer-Verlag Berlin Hiedelberg,pg.227).…

    • 594 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    information is critical for dealing with the storage and transmission of high resolution images and videos that dominate the…

    • 3325 Words
    • 13 Pages
    Powerful Essays