A Data Hiding Scheme based on Voronoi Diagram
|
|
- Florence Williams
- 5 years ago
- Views:
Transcription
1 A Data Hiding Scheme based on Voronoi Diagram Shi-Yu Cui 1, *, Zhi-Hui Wang 1, Chin-Chen Chang 2,3, and Ming-Chu Li 1 1 Department of Software, Dalian University of Technology, DaLian , China {cuishiyu0523, wangzhihui1017}@gmail.com, li_mingchu@yahoo.com 2 Department of Information Engineering and Computer Science, Feng Chia University, Taichung 407, Taiwan, ROC alan3c@gmail.com 3 Department of Computer Science and Information Engineering, Asia University, Taichung 41354, Taiwan, ROC Received 25 August 2011; Revised 10 October 2011; Accepted 20 November 2011 Abstract. In this paper, we propose a novel image steganographic technique based on the Voronoi diagram. The basic idea is to generate a Voronoi diagram of a graph transformed from cover image; that is, the Voronoi points correspond to every two consecutive pixels in the cover image. According to the secret bits to be embedded, every Voronoi point will either be replaced by one of its neighbors or keep its original value. As a result, this scheme does not need any extra information, such as indicators, to extract the secret data. Furthermore, the experimental results show that the proposed scheme can achieve greater data hiding capacity with less distortion compared to related schemes. Keywords: Steganography, data hiding, voronoi diagram, delaunay triangulation, PSO 1 Introduction Large digital images can be conveniently transmitted via the Internet due to the rapid development of networking technologies. Because networks are public environments, protecting transmitted information has become a significant problem. Several techniques have been proposed, which can be classified into two categories: encryption [1], [2] and steganography [3]-[9]. In encryption, the secret information is converted into meaningless ciphertext through cryptography algorithms such as DES[1], RSA[2]. This meaningless ciphertext is sent to the recipient via the Internet. No one can extract the secret information without the secret key; however, the attacker may pay more attention to the ciphertext, because it is meaningless. In contrast, steganography involves embedding secret information into meaningful cover images with good visual quality. Steganographic schemes such as reversible data hiding can recover the original image after extraction, but the embedding capacity is generally limited. To meet transfer large amount of information efficiently and securely, the embedding capacity of these schemes must be improved while keeping low distortion. In past decades, many steganographic techniques have been proposed. One effective and common approach is embedding secret information into the least-significant bits (LSB) of the pixel pairs in an image. To achieve higher stego-image quality, Wang et al. [3] proposed an improved scheme that finds the optimal LSB substitution using genetic algorithms. However, because this approach is time-consuming and contains obvious distortion in the smooth areas of cover images, Chang et al. [4] proposed an optimal LSB substitution method based on dynamic programming that improves the computation time of Wang et al. s scheme [3]. In addition, Wu and Tsai [5] proposed a scheme to hide more information in the edge areas using pixel differences. In recent years, Wu et al. [6] proposed a method based on pixel-value differencing and LSB replacement; Mielikainen revisited an LSB matching method [7]; and Yang et al. presented a similar scheme [8]. Later, Wang et al. proposed a combination scheme based on pixel-value differencing and modulus functions [9] to reduce the visibility of the hiding effect in Wu and Tsai s scheme. To obtain higher capacity than Wang et al. s scheme, Hsiao et al. [10] * Correspondence author
2 Journal of Computers Vol. 22, No. 4, January 2012 proposed an adaptive steganographic method based on just noticeable distortion (JND) profile which performs both well on embedding capacity and image quality. In order to achieve higher embedding capacity and better image quality than related schemes [9], [10], this paper proposes an ingenious data hiding technique that manipulates mapping rules based on the Voronoi diagram. We treat every two consecutive pixels as a pixel pair to record secret data and use their value as coordinates to generate a Voronoi diagram. According to the experimental results, the proposed scheme is superior to Wang et al. s method in terms of both stego-image quality and embedding capacity. Furthermore, our scheme provides better security by using a secret key in the PSO algorithm, which is used to generate the Voronoi diagram. The rest of this paper is organized as follows. Section 2 introduces the Voronoi diagram and particle swarm optimization (PSO) algorithm, which are used in the proposed scheme. The proposed data hiding scheme, which includes an embedding phase and a secret information extracting phase, is presented in Section 3. Section 4 presents the experimental results of the proposed method, including the influence of the parameter setting and the comparison with Wang et al. s scheme and Hsiao et al. s scheme. Finally, conclusion is provided in Section 5. 2 Related Works In this paper, a Voronoi diagram on a plane is considered as a data structure in which the Voronoi points correspond to every adjacent pixel pair in a cover image. Each Voronoi point is assigned an integer value with the PSO algorithm to stand for binary secret data. The Voronoi diagram and PSO algorithm are described in this section. 2.1 Voronoi Diagram The Voronoi diagram was originally proposed in 1644 by Descartes, who presented it in [11]. However, the complete concept was introduced by the mathematicians Dirichlet [12] and Voronoi [13], [14], the structure of this concept has been named Dirichlet tessellation or Voronoi diagram as its standard name today. In mathematics, a 2D Voronoi diagram is a special kind of decomposition used to put n points into a convex polygon on a plane. The convex polygon is generated by finding the perpendicular bisectors between every two neighboring points for the purpose of creating one convex polygon contains only one generating point; each point in the convex polygon is closer to its generating point than to any other. For example, let P i stands for a point on a plane. A Voronoi diagram with six points is shown in Figure 1. Convex polygons containing P i are called Voronoi polygons; the contained points are called Voronoi points; and its segments are called Voronoi edges. 48 Fig. 1. A Voronoi diagram of six points If (and only if) the Voronoi polygons of P i and P j are separated by the same edge, connect P i and P j with a straight line. The triangulations consisting of straight lines between every two adjacent Voronoi points that share the same Voronoi edge are called Delaunay triangulations. The Delaunay triangulation for the Voronoi diagram in Figure 1 is shown in Figure 2. There is one and only one Delaunay triangulation corresponding to a Voronoi diagram.
3 Cui et al: A Data Hiding Scheme based on Voronoi Diagram Fig. 2. A Delaunay triangulation 2.2 Particle Swarm Optimization (PSO) Particle swarm optimization (PSO) is an evolutionary algorithm developed by Kennedy, Eberhart and Shi [15], [16] for a social model simulation [17]. PSO maintains a group of candidate solutions called particles and repeats a process to discover a satisfactory solution to the problem. In every loop, particles will move to a new position according to equations for each particle and each dimension until its best position is discovered or time is up. In Equation (1), v(t) and x(t) indicate a particle s velocity and position at time t; p(t) presents the best previous position of this particle; g(t) stands for the best previous position of the informants of the particle default values; R(c) means the uniform distribution on [0, c]; and w and c are constant coefficients. The movements of these particles are used to guide the swarm moved. v( t 1) w v() t R( c) ( p() t x()) t R( c) ( g() t x()) t, xt ( 1) xt ( ) vt ( 1) (1) The output results of the same graph are unchanged, using a same fixed integer as a secret key to initiate a pseudorandom number generator and setting a fixed stop time. Otherwise, the PSO algorithm may output different results every time due to the different keys and various stop times. 3 The Proposed Scheme This paper proposes a novel data hiding scheme based on a Voronoi diagram transformed from a cover image. The main idea is to generate a Voronoi diagram in which the Voronoi points correspond to every two adjacent pixels in a grayscale image (i.e. cover image). The Voronoi diagram is used as an embedding map. Each Voronoi point stands for an integer value 2 k, which is converted from a k-bit binary secret message. Only the neighboring pixel pairs of the cover image, which is transformed through a proposed generating process, are embeddable. Therefore, each embeddable pixel pair can carry k-bits secret binary message by being replaced by another meaningful pixel pair based on the relationship between the two Voronoi points to which they correspond. Some pairs of pixels are not changed to ensure that the Voronoi diagrams are the same for the cover image and stego-image secret extracting process. Details of the data hiding phase are described below. Let I and I denote an original image and a stego-image, respectively, both of which are sized H W, where H and W stand for the height and width of the original image and the stego-image. Let I(x, y) and I (x, y) represent the pixel value at the position of x th row and y th column of I and I, where 1 x W, 1 y H. A secret message is embedded and extracted as binary data. Let SM denote the secret message, where SM={s m s m {0, 1}, for m=1, 2,, p} and p is the length of SM. To create a pixel pair able to be replaced by another pixel pair that carries a fixed value, the secret message SM is divided into uniformly k-bit binary data; then SM is formed as a sequence of decimal values converted from those k-bit binary data. Let s n denote a transformed decimal value which is expressed within a range of [0, 2 k -1]. The transformed secret message SM is represented as: SM ={s n s n {0, 1, 2,, 2 k -1}, for n=1, 2,, q}. The following equation is used to transform the original secret SM into SM : s, for n = 0, 1,, q and m = 1, 2,, p. (2) k 1 ( 1) 2 k j n s j m k j 49
4 Journal of Computers Vol. 22, No. 4, January 2012 Let G(V, E) stand for a graph on a plane which is used to generate a Voronoi diagram. Each vertex in G indicates a pair of neighboring pixels in I as shown in Figure 3; in other words, a vertex is transformed from the two adjacent pixels are on the same row and adjacent column in the cover image. For example, there are two adjacent points I(2,3)=155 and I(2,4)=158 in Figure 3; the corresponding vertex in G is v(155,158). All same pixel pairs are indicated by the same vertex in G. For instance, I(2,3)=155 and I(2,4)=158, I(3,3)=155 and I(3,4)=158 correspond to vertex v(155,158). In this way, except for unembeddable pairs, all pixel pairs in the cover image can find their corresponding vertex points in graph G. 50 Fig. 3. Pixel pairs of image Lena The proposed scheme begins by scanning a cover image from left to right and from top to bottom in order to construct graph G by adding all vertices which indicate every kind of pixel pairs in the cover image. Next, the constructed graph G is used to generate the Voronoi diagram and Delaunay triangulation. Then, all neighboring vertices that share the same Voronoi edge in a Delaunay triangulation are connected to make sure that each vertex in G can find other Voronoi points by connecting lines under a breadth-first search. Next, Voronoi points that are also the vertices of graph G receive r kinds of value, which are denoted as Value(v) by the PSO algorithm. A secret key is used in a pseudorandom number generator of PSO for security. In order to ensure that each kind of Voronoi point only corresponds to a decimal value which is transformed from binary secret data in SM, r should fall into the range of the set R as follows: R={r i r i {2 2, 2 3,, 2 k }, for i=1, 2,, k-1 and k N, where N is the set of natural numbers. For example, when r equals 2 2, this means that there are four kinds of values for the Voronoi points; each point receives one decimal integer value in the range of [0, 3] to stand for one 2-bit binary secret data "00", "01", "10" and "11", respectively. As a result, every vertex in graph G corresponds to a k-bit binary secret data, and all r kinds of values can be found using a breadth-first search starting from any Voronoi point. To ensure that the secret message can be extracted completely, the Voronoi diagram generated based on the cover image must be the same as the one generated based on the stego-image. This means that the vertices appearing in image I before the hiding process also exist in image I. Let LastPoint(v) represent the last positions of every kind of vertex appearing in the cover image. Since vertex v(155,158) appears five times in Figure 3, the LastPoint(v(155,158)) is (5,4) which is the last position of v(155,158). In the data hiding process, the pixel pairs at LastPoint(v) cannot be used for embedding information. Although all different kinds of value have corresponding vertices in G after Voronoi diagram generation for the stego-image, the image quality is not as good as the cover image for carrying secret messages. If too many pixel pairs are replaced by Voronoi points which are too far away, this may reduce the visual quality of the stego-image. There should be a tradeoff between high embedding capacity and high stego-image quality. Let Distance(v 1,v 2 ) denote the distance of two vertices v 1 and v 2 ; v if and v is stand for the first and the second pixel of the i th vertex, respectively. The equation is defined as: Distance( v, v ) v v v v (3) 1 2 1f 2 f 1s 2s When a vertex can t find all r kinds of vertex values using a breadth-first search in the Voronoi diagram or the distance between this vertex and one of the other vertices is larger than a constant value dis_const, then this vertex cannot be used for embedding information and will be deleted in G. In such a case, we rebuild the Voronoi diagram based on the new G. This procedure is called Reconstruct(G) and repeats until each vertex can find all kinds of vertex values in the distance [0, dis_const]. In general, there are two unembeddable kinds of pixel pairs: the corresponding vertex is deleted by Reconstruct(G), and the last pixel pair in the cover image.
5 Cui et al: A Data Hiding Scheme based on Voronoi Diagram The proposed scheme also has safety performance, since an unauthorized receiver cannot extract a secret message without knowing the process of Voronoi diagram generation and the secret key (i.e. the seed of the random generator) used in the PSO algorithm. 3.1 Embedding Procedure The detailed data hiding procedure consists of the following steps: Input: a cover image I and a secret message SM. Step 1: Divide the secret message SM into parts of k-bit binary data uniformly. Then transform it into a sequence of decimal values represented as SM ; the elements of SM are denoted as s n s. Step 2: Generate a graph G by scanning the whole cover image I from left to right and from top to bottom. Add all kinds of pixel pairs v(x, y) into G, and record each kind of v(x, y) s last appearance position, denoted as LastPoint(v). Step 3: Construct a Voronoi diagram and Delaunay triangulation on G. Connect every two vertices in a Delaunay triangulation if and only if they share the same Voronoi edge. Step 4: Use a secret key to assign r kinds of value to all vertices in G with a PSO algorithm, where r equals 2 k, and put values in all vertices Value(v) s at the same time. Step 5: Reconstruct graph G. The details of this procedure are shown below. For each v(x, y) in G, check that whether the v(x, y) shares values with all r-kinds of values in Value(v) in a constant distance dis_const using a breadth-first search. If not, delete v(x, y) until no v can be deleted. Step 6: Embed the secret message into the cover image in a zig-zag scanning manner to process cover image I. For every pixel pair in the original image I, find its corresponding vertex v(x, y) in G. If the position of the pixel pair is not the same as LastPoint(v), find v(x, y ) using breadth-first search under conditions: Value(v )=s n and Distance(v, v ) dis_const. If v(x, y ) equals v(x, y), then process the next pixel pair to embed s n+1 ; otherwise, replace the current pixel pair in the cover image by the v(x, y ) s corresponding pixel pair. If the position of the pixel pair is the same as LastPoint(v), then process the next pixel pair to embed s n and delete vertex v(x, y) in graph G. The algorithm terminates when all pixel pairs in I are processed or when no vertex exists in G. Step 7: Output the stego-image I. 3.2 Embedding Example Here is an example of the proposed embedding scheme. There are four kinds of values in Step 4, so 2-bit binary data can be embedded in a pixel pair. The dis_const is set to 4. For simplicity's sake, an 8 8 pixel block sized cover image I is adopted (as shown in Figure 3), and the secret message SM is " ". The corresponding transformed secret message SM is shown in Figure 4. Fig. 4. Transform secret message into decimal Fig. 5. The Voronoi diagram and Delaunay triangulation on graph G for pixel block First, construct graph G by scanning the cover image s pixel block in Figure 3 in a zig-zag manner. Next, generate a Voronoi diagram and Delaunay triangulation on G and connect the vertices which share a Voronoi edge. The result is shown in Figure 5. 51
6 Journal of Computers Vol. 22, No. 4, January 2012 Next, each Voronoi point in G receives a value between 1 and 4 using the PSO algorithm. The result is shown in Figure 6. The integer values 1, 2, 3, and 4 correspond to secret bits "00", "01", "10" and "11", respectively. Fig. 6. Value list of Voronoi points In the reconstruction process, only the vertices that can find all kinds of values within distance dis_const remain. Figure 7 shows the reconstruction process result for the vertices in Figure 6. Fig. 7. Reconstructed graph G 52 Fig. 8. The outputted stego-image
7 Cui et al: A Data Hiding Scheme based on Voronoi Diagram After reconstructing G, data hiding begins for cover image I in a zig-zag manner. The first pixel pair I(1,1) and I(1,2), which correspond to v(155,155), is replaced by the pixel pair (156,156) to embed secret data "00" using a breadth-first search in G. When processing the pixel pair of I(5,1) and I(5,2), which is the last appearance of v(155,155), graph G should be reconstructed after deleting v(155,155) other than embedding secret data in v(155,155). If the vertex does not appear in the reconstructed graph G, such as (151,151), then it is skipped without being processed. Following this procedure, repeat the embedding process until no v(x, y) remains in the block or until time is up. Finally, the stego-image with 34 embedded secret data bits is outputted as shown in Figure Secret Extraction The secret data extraction procedure is the reverse procedure of secret data hiding. First, the graph G must be rebuilt through stego-image I. All different last appeared pixel pairs in the cover image remain unchanged in the stego image to guarantee that the graph G rebuilt from the stego-image is exactly the same as the one built according to the cover image. The recipient can use the same secret key in the PSO algorithm to ensure that the values in G are also the same as those in the data hiding phase. For each stego-pixel pair except for the last appeared pixel pair of each kind, check whether there is a vertex corresponding to it in graph G. If so, then obtain the Value(v) of that vertex; the binary data converted from Value(v) are the secret data hidden in that pixel pair. If the current processing stego-pixel pair is the last appearing one of its kind, then reconstruct G after deleting it, and repeat the above secret extracting procedure until all stego-pixel are processed. For instance, we try to exact secret information from the stego-image generated by the embedding example in Subsection 3.2. The first pixel pair is (156,156). Its position is not equal to LastPoint(v(156,156)), and v(156,156)=0 is in current value list. Thus, the binary secret bits "00" can be extracted from this pixel pair. When a pixel pair shows its final appearance in the stego-image as (155,158), then the scheme will delete v(155,158) and reconstruct G to update the current value list by repeating Step 5. The pixel pairs (151,151) and (149,149) in stego-image will also be skipped if they do not appear in the current graph G and value list. The extracting scheme finds that only the former 17 pixel pairs can extract secret information after scanning the whole stego-image I from left to right and from top to bottom, which is similar to the embedding procedure. The rest of pixel pairs are deleted for the reasons stated above. The extraction process terminates when all embedded secret information has been extracted successfully. The extracted secret information in decimal system is " ", corresponding to the original binary secret data " ". 4 Experimental Results and Analysis In this section, the proposed scheme s experimental results, including the hiding capacity and the visual quality of stego-image, are presented. The environment for the experiment is an Intel Core i5 machine at 2.40GHz with 4GB main memory. Programs were implemented using MATLAB 7.0 software, Intel Open CV and Standard PSO in C [18]. Six grayscale images of size were used (Figure 9). Fig. 9. Six grayscale test images of size
8 Journal of Computers Vol. 22, No. 4, January Embedding Capacity and Distortion Performance In image steganography, it is critical for a data hiding scheme to provide high embedding capacity with high stego-image quality. Peak signal-to-noise ratio (PSNR) is generally used to evaluate the perceptual quality between the cover image and the stego-image. A larger PSNR indicates that the quality of the stego image is more similar to the original one. The PSNR between the cover image and the stego-image is calculated using Equation (4). PSNR 2 (db) 10 log (255 / MSE) 10, 1 MSE I x y I x y W H H W ( (, ) '(, 2 )) (4) x 1 y 1 I(x, y) and I (x, y) are the (x, y) th pixel values of the cover image I and stego-image I ; W and H denote the width and height of the cover image. Table 1. Embedding capacity and PSNR values (with r set as 4 and dis_const set as 4, 8, 12, 16) r = 4 Cover image ( ) dis_const = dis_const = 4 dis_const = 8 12 Airplane Capacity (bits) PSNR (db) Baboon Capacity (bits) PSNR (db) Boat Capacity (bits) PSNR (db) Lena Capacity (bits) PSNR (db) Pepper Capacity (bits) PSNR (db) Tiffany Capacity (bits) PSNR (db) Table 2. Embedding capacity and PSNR values (when r = 4, 8, 16, 32, respectively, and ) Cover image r = 4 r = 8 r = 16 r = 32 ( ) Airplane Capacity (bits) PSNR (db) Baboon Capacity (bits) PSNR (db) Boat Capacity (bits) PSNR (db) Lena Capacity (bits) PSNR (db) Pepper Capacity (bits) PSNR (db) Tiffany Capacity (bits) PSNR (db) Parameter Analysis In the proposed scheme, dis_const is used to limit the area of breadth-first search, and r is the kinds of values to be assigned to vertices with the PSO algorithm. There is no doubt that both values influence the experimental results. The detailed analysis is presented in the following section. Table 1 gives the experimental results, where dis_const equals 4, 8, 12, and 16, respectively, and r equals 4. We can see that the hiding capacity and the stego-image quality look stable with a fixed r and different dis_const. When the dis_const becomes larger, the hiding capacity increases slightly, while the stego-image quality decreases slightly. The reason that the embedding capacity increases in Table 1 is that the area for the breath-first search is widened by increasing the dis_const. The vertices find all kinds of values more easily in the larger area to avoid 54
9 Cui et al: A Data Hiding Scheme based on Voronoi Diagram being deleted, but there is a tradeoff between high embedding capacity and high PSNR by setting the value of dis_const. Table 2 shows several experimental results by setting a constant value to dis_const and different values to r. It is obvious that a larger r value leads to higher capacities and lower PSNR. Moreover, the embedding capacity increases dramatically when the value of r increases, because each embeddable pixel pair can carry r-bit secret data each time r=4 r=8 r= r=4 r=8 r=16 capacity(bytes) PSNR(dB) dis_const (a)embedding capacity dis_const (b) PSNR values Fig. 10. The embedding capacity and PSNR when dis_const varies from 1 to 16 with the test image Baboon The above tables show that the PSNR values can be improved by setting a small dis_const. However, the dis_const must increase with the increase in r. If the dis_const is so small that the breadth-first search is limited to a small scope, then most vertices are unable to find all kinds of values and will be deleted as shown in Figure 10. Fig. 11. Visual quality performance when dis_const and r set as (4, 4) 55
10 Journal of Computers Vol. 22, No. 4, January Comparison with Related Schemes Based on Embedding Rate and Perceptual Quality The results of the proposed scheme are compared with the irreversible data hiding schemes of Wang et al. [9] and Hsiao et al. [10] as shown in Table 3, Table 4 and Table 5. In order to obtain suitable parameter values of high perceptual quality and embedding capacity, the dis_const and r are set as (4, 4), (8, 16), (16, 16) and (32, 16) respectively. Table 3 obviously shows that larger embedding capacity can be obtained by setting r=32 and dis_const=16, while the high PSNR values of the stego-image can be obtained by setting r=4 and dis_const=4. In general, larger embedding capacity can be achieved by setting larger r and dis_const values at the cost of PSNR reduction. The proposed scheme could achieve higher PSNR values with a smaller dis_const. Figures 11 and 12 indicate the visual quality performance for test images when dis_const and r are set as (4, 4) and (32, 16), respectively. Compared with Wang et al. s scheme as shown in Table 4, our scheme generally performs superior in terms of both embedding capacity and PSNR values when dis_const and r are set as (16, 16). The proposed scheme yields lower PSNR values for only a few images but have higher capacities. For example, the PSNR for the image Lena is only 0.2dB less than in Wang et al. s scheme, but the capacity is 15.1% higher. When the embedding capacity is a little lower, the PSNR is better than for Wang et al. s scheme. For instance, the capacity for Baboon is only 1792 bits lower, and the PSNR is 3.72dB Higher. In average, embedding capacity of test images in our method is bits more than Wang et al. s method with the average of PSNR value is nearly 1dB higher. Fig. 12. Visual quality performance when dis_const and r set as (4, 4) Table 3. The performances of Wang et al. s method, Hsiao et al. s method and the proposed method r = 4 r = 8 r = 16 r = 32 Cover image Wang Hsiao ( ) et al.'s method et al.'s method dis_const = dis_const = dis_const = dis_const = Airplane Capacity (bits) PSNR (db) Baboon Capacity (bits) PSNR (db) Boat Capacity (bits) PSNR (db) Lena Capacity (bits) PSNR (db) Pepper Capacity (bits) PSNR (db) Tiffany Capacity (bits) PSNR (db)
11 Cui et al: A Data Hiding Scheme based on Voronoi Diagram Table 4. The performance of Wang et al. s method and the proposed method when r=16, dis_const=16 Airplane Baboon Boat Lena Pepper Tiffany Average Airplane Baboon Boat Lena Pepper Tiffany Average Cover image ( ) Wang et al.'s method Our method r = 16 dis_cons t= 16 Capacity (bits) PSNR (db) Capacity (bits) PSNR (db) Capacity (bits) PSNR (db) Capacity (bits) PSNR (db) Capacity (bits) PSNR (db) Capacity (bits) PSNR (db) Capacity (bits) PSNR (db) Table 5. The performance of Hsiao et al. s method and the proposed method Cover image ( ) Wang et al.'s method Capacity (bits) PSNR (db) Capacity (bits) PSNR (db) Capacity (bits) PSNR (db) Capacity (bits) PSNR (db) Capacity (bits) PSNR (db) Capacity (bits) PSNR (db) Capacity (bits) PSNR (db) Proposed method r = 16 r = 64 dis_const = 64 r = 32 r = 16 r = 32 r = 16 r = 32 5 Conclusion In this paper, we present an ingenious data hiding scheme based on the Voronoi diagram that considers every two consecutive pixels as Voronoi points to embed secret information. The experimental results comparison indicates that our proposed scheme has superior performance in terms of both embedding capacity and visual quality than Wang et al. s scheme. Also, Compared with Hsiao et al. s scheme, while embedding capacity between our scheme and Hsiao et al. s scheme are close, the average PSNR value of our scheme is even 1dB higher. By setting different parameter values, the proposed method can be adapted to satisfy different requirements for hiding capacity or stego-image quality. Furthermore, the security aspect of our proposed method can be ensured by the Voronoi diagram generating phase and the secret key used in PSO algorithm. References [1] R. Davis, The Data Encryption Standard in Perspective, IEEE Communications Society Magazine, Vol. 16, pp. 5-9,
12 Journal of Computers Vol. 22, No. 4, January 2012 [2] R. L. Rivest, A. Shamir, L. Adleman, A Method for Obtaining Digital Signatures and Public-key Cryptosystems, Communications of the ACM, Vol. 21, No. 3, pp , [3] R.Z. Wang, C.F. Lin, J.C. Lin, Image Hiding by Optimal LSB Substitution and Genetic Algorithm, Pattern Recognition, Vol. 34, No. 4, pp , [4] C.C. Chang, J.Y. Hsiao, C.S. Chan, Finding Optimal Least-signicant-bit Substitution in Image Hiding by Dynamic Programming Strategy, Pattern Recognition, Vol. 36, No. 7, pp , [5] D.C. Wu and W.H. Tsai, A Steganographic Method for Images by Pixel-value Differencing, Pattern Recognition Letters, Vol. 24, No. 9-10, pp , [6] H.C. Wu, N.I. Wu, C.S. Tsai, M.S. Hwang, Image Steganographic Scheme Based on Pixel-value Differencing and LSB Replacement Methods, IEE Proceedings of Vision, Image and Signal Processing, Vol. 152, No. 5, pp , [7] J. Mielikainen, LSB Matching Revisited, IEEE Signal Processing Letters, Vol. 13, No. 5, pp , [8] C.H. Yang, S.J. Wang, C.Y. Weng, Analysis of Pixel-value-differencing Schemes with LSB Replacement in Stegonagraphy, in Proceedings of Third International Conference on Intelligent Information Hiding and Multimedia Signal, Kaohsiung, Taiwan, ROC, pp , [9] C.M. Wang, N.I.Wu, C.S. Tsai, M.S. Hwang, A High Quality Steganographic Method with Pixel-value Differencing and Modulus Function, Journal of Systems and Software, Vol.81, No. 11, pp , [10] J.Y. Hsiao and C.T. Chang, An Adaptive Steganographic Method Based on the Measurement of Just Noticeable Distortion Profile, Image and Vision Computing, Vol. 29, No. 1, pp , [11] R. Descartes, Principia Philosophiae, Ludovicus Elzevirius, Amsterdam, [12] G. L. Dirichlet, Über Die Reduktion Der Positiven Quadratischen Formen Mit Drei Unbestimmten Ganzen Zahlen, J. Reine Angew. Math., Vol. 40, pp , [13] G. F. Voronoi, Deuxieme Memoire: Recherches Sur Les Paralleloedres Primitifs, J. Reine Angew. Math., Vol. 136, pp , [14] G. F. Voronoi, Nouvelles Applications Des Parametres Continus A La Théorie Des Formes Quadratiques, Deuxieme Memoire, Recherches Sur Les Parallelloedres Primitifs, J. Reine Angew. Math., Vol. 134, pp , [15] J. Kennedy and R. Eberhart, Particle Swarm Optimization, in Proceedings of IEEE International Conference on Neural Networks, Perth, WA, pp , [16] Y. Shi and R. Eberhart, A Modified Particle Swarm Optimizer, in Proceedings of IEEE International Conference on Evolutionary Computation, Anchorage, AK, USA, pp , [17] J. Kennedy, The Particle Swarm: Social Adaptation of Knowledge, in Proceedings of IEEE International Conference on Evolutionary Computation, Indianapolis, IN, USA, pp , [18] Standard PSO,
1 An Image Data Hiding Scheme Based on Vector Quantization and Graph Coloring
1 An Image Data Hiding Scheme Based on Vector Quantization and Graph Coloring Shuai Yue 1, Zhi-Hui Wang 2, and Chin-Chen Chang 3 1 Department of Software, Dalian University of Technology, DaLian, China,
More informationHybrid Stegnography using ImagesVaried PVD+ LSB Detection Program
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12086-12090 Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program Shruti
More informationA Revisit to LSB Substitution Based Data Hiding for Embedding More Information
A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia
More informationA Reversible Data Hiding Scheme for BTC- Compressed Images
IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game
More informationAdaptive Steganography Method Based on Two Tiers Pixel Value Differencing
Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing Chi-Yao Weng 1, Yen-Chia Huang 1, Chin-Feng Lee 2(&), and Dong-Peng Lin 2 1 Department of Computer Science, National Pingtung University,
More informationA reversible data hiding based on adaptive prediction technique and histogram shifting
A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn
More informationAn Adaptive Data Hiding Method Using Neighborhood Pixels Differencing Based On Modulus Function
An Adaptive Data Hiding Method Using Neighborhood Pixels Differencing Based On Modulus Function Najme Maleki, Mehrdad Jalali, Majid Vafaei Jahan Department of Computer Engineering, Mashhad Branch, Islamic
More informationDigital Image Steganography Using Bit Flipping
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using
More informationAn Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility
An Information Hiding Scheme Based on Pixel- Value-Ordering Prediction-Error Expansion with Reversibility Ching-Chiuan Lin Department of Information Management Overseas Chinese University Taichung, Taiwan
More informationRandom Traversing Based Reversible Data Hiding Technique Using PE and LSB
Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Rhythm Katira #1, Prof. V. Thanikaiselvan *2 # ECE Department, VIT University Vellore, Tamil-Nadu, India 1 rhythm.katira2009@vit.ac.in
More informationVARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS
VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com
More informationA high quality steganographic method with pixel-value differencing and modulus function
Available online at www.sciencedirect.com The Journal of Systems and Software 81 (2008) 150 158 www.elsevier.com/locate/jss A high quality steganographic method with pixel-value differencing and modulus
More informationDigital image steganography using LSB substitution, PVD, and EMD
Digital image steganography using LSB substitution, PVD, and EMD Anita Pradhan, K. Raja Sekhar, Gandharba Swain* Department of Computer Science and Engineering, K L University, Vaddeswaram-522502, Andhra
More informationMeaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Meaningful Shadows for Image Secret Sharing with Steganography
More informationA Framework to Reversible Data Hiding Using Histogram-Modification
A Framework to Reversible Data Hiding Using Histogram-Modification R. Neeraja 1 PG Student, ECE Department Gokula Krishna College of Engineering Sullurpet, India e-mail:r.p.neeru@gmail.com M. Gnana Priya
More informationResearch Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography
Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More informationCHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction
CHAPTER 6 LSB based data hiding with double Encryption 6.1 Introduction In image steganography, the amount of secret data that can be embedded depends on the method and the cover-image as capacity limitation
More informationResearch Article A Novel Image Data Hiding Scheme with Diamond Encoding
Hindawi Publishing Corporation EURASIP Journal on Information Security Volume 9, Article ID 65847, 9 pages doi:.55/9/65847 Research Article A Novel Image Data Hiding Scheme with Diamond Encoding Ruey-Ming
More informationA Secure Steganographic Method Using Modified LSB (Least Significant Bit) Substitution
Volume 6, Issue 8, August 2017, ISSN: 2278 1323 A Secure Steganographic Method Using Modified LSB (Least Significant Bit) Substitution Suman, Dr. Sukhjeet Kaur Ranade Abstract In this paper a technique
More informationUser-Friendly Sharing System using Polynomials with Different Primes in Two Images
User-Friendly Sharing System using Polynomials with Different Primes in Two Images Hung P. Vo Department of Engineering and Technology, Tra Vinh University, No. 16 National Road 53, Tra Vinh City, Tra
More informationEfficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference Matrix Laxman Tawade 1, Rajshree Mahajan 2, Chandan Kulthe 3 1 Department of Electronic and Telecommunication Engineering, Pune University, India 2,3
More informationData Hiding on Text Using Big-5 Code
Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic
More informationHigh Capacity Data Hiding Scheme for DCT-based Images
Journal of Information Hiding and Multimedia Signal Processing c 010 ISSN 073-41 Ubiquitous International Volume 1, Number 3, July 010 High Capacity Data Hiding Scheme for DCT-based Images Chia-Chen Lin
More informationA Formula Diamond Encoding Data Hiding Scheme
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 6, November 2015 A Formula Diamond Encoding Data Hiding Scheme Wen-Chung Kuo
More informationA Grayscale Image Steganography Based upon Discrete Cosine Transformation
A Grayscale Image Steganography Based upon Discrete Cosine Transformation Chin-Chen Chang 1, Pei-Yu Lin, and Jun-Chou Chuang 3 1 Department of Information Engineering and Computer Science, Feng Chia University,
More informationEnhanced Least Significant Bit Scheme Robust Against Chi-Squared Attack
2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation Enhanced Least Significant Bit Scheme Robust Against Chi-Squared Attack Masoud Afrakhteh Dept. of
More informationA new approach to the secret image sharing with steganography and authentication
1 A new approach to the secret image sharing with steganography and authentication C-C Wu a, M-S Hwang* b and S-J Kao a a Department of Computer Science and Engineering, National Chung Hsing University,
More informationImage Tamper Detection and Recovery Based on Dual Watermarks Sharing Strategy
Image Tamper Detection and Recovery Based on Dual Watermars Sharing Strategy Yi-Hui Chen, Chin-Chen Chang Department of Applied Informatics and Multimedia Asia University, Taichung, Taiwan 35, R.O.C. Department
More informationReversible Image Data Hiding with Local Adaptive Contrast Enhancement
Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu and Xiaocheng Hu Abstract Recently, a novel reversible data hiding scheme is proposed
More informationAbstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction
A Report on Genetic Algorithm based Steganography for Image Authentication by Amrita Khamrui Enrolled Scholar Department of Computer Science & Engineering, Kalyani University Prof. (Dr.) J K Mandal Professor
More informationDIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS
DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS Murat Furat Mustafa Oral e-mail: mfurat@cu.edu.tr e-mail: moral@mku.edu.tr Cukurova University, Faculty of Engineering,
More informationCOPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *
COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE * Pei-Pei Chen ( 陳佩貝 ) 1 and Wen-Hsiang Tsai ( 蔡文祥 ) 1, 2 1 Dept. of Computer Science, National Chiao Tung University,
More informationKeywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM
Volume 6, Issue 1, January 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Information
More informationImproved Qualitative Color Image Steganography Based on DWT
Improved Qualitative Color Image Steganography Based on DWT 1 Naresh Goud M, II Arjun Nelikanti I, II M. Tech student I, II Dept. of CSE, I, II Vardhaman College of Eng. Hyderabad, India Muni Sekhar V
More informationImage Error Concealment Based on Watermarking
Image Error Concealment Based on Watermarking Shinfeng D. Lin, Shih-Chieh Shie and Jie-Wei Chen Department of Computer Science and Information Engineering,National Dong Hwa Universuty, Hualien, Taiwan,
More information488 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 3, NO. 3, SEPTEMBER 2008
488 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL 3, NO 3, SEPTEMBER 2008 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng
More informationSteganography by using Logistic Map Function and Cellular Automata
Research Journal of Applied Sciences Engineering and Technology 4(3): 4991-4995 01 ISSN: 040-7467 Maxwell Scientific Organization 01 Submitted: February 0 01 Accepted: April 30 01 Published: December 01
More informationHighly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting
More informationBit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationSecured Double Layer Data Hiding Using Encryption and Decryption Techniques
Secured Double Layer Data Hiding Using Encryption and Decryption Techniques H.MaheshKumar M.Vignesh Abstract In this period of Internet every digitized object is transferable and exchangeable over internet
More informationA NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME
VOL 13, NO 13, JULY 2018 ISSN 1819-6608 2006-2018 Asian Research Publishing Network (ARPN) All rights reserved wwwarpnjournalscom A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME Javvaji V K Ratnam
More informationMultilayer Data Embedding Using Reduced Difference Expansion
Multilayer Data Embedding Using Reduced Difference Expansion DINESH SATRE 1, DEVYANI BONDE 2, SUBHASH RATHOD 3 Department Of Computer Engineering Marathwada Mitra Mandal s Institute of Technology Savitribai
More informationA Novel Reversible Data Hiding Technique Based on Pixel Prediction and Histogram Shifting
Research Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet A Novel
More informationA BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu
International Journal of Innovative Computing, Information and Control ICIC International c 2016 ISSN 1349-4198 Volume 12, Number 2, April 2016 pp. 395 405 A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD
More informationREVERSIBLE DATA HIDING SCHEME BASED ON PREDICTION ERROR SORTING AND DOUBLE PREDICTION.
REVERSIBLE DATA HIDING SCHEME BASED ON PREDICTION ERROR SORTING AND DOUBLE PREDICTION Ling-ling WAN 1,Fan CHEN 1, Hong-jie HE 1,Lei ZHANG 2 1 the School of Information Science and Technology, Southwest
More informationA NovelQR-Code Authentication Protocol Using Visual Cryptography for Secure Communications
I J C T A, 9(2) 2016, pp. 967-974 International Science Press A NovelQR-Code Authentication Protocol Using Visual Cryptography for Secure Communications A. John Blesswin 1, A. Genitha 2 and G. Selvamary
More informationHigh capacity data hiding scheme based on (7, 4) Hamming code
DOI 10.1186/s40064-016-1818-0 RESEARCH Open Access High capacity data hiding scheme based on (7, 4) Hamming code Zekun Cao 1, Zhaoxia Yin 1,2*, Honghe Hu 1, Xiangping Gao 1 and Liangmin Wang 1 *Correspondence:
More informationAppendix A. Definition of Terms
Appendix A Definition of Terms Artifact: Artifacts are the irregularities that may be present in an image after processing. They are not related to the details of the image and sometimes accompany transmitted
More informationData Hiding Scheme Based on A Flower-Shaped Reference Matrix
Journal of Network Intelligence c 2018 ISSN 2414-8105 (Online) Taiwan Ubiquitous Information Volume 3, Number 2, May 2018 Data Hiding Scheme Based on A Flower-Shaped Reference Matrix Chin-Feng Lee Department
More informationComputation of Voronoi Diagrams and Delaunay Triangulation via Parametric Linear Programming
Computation of Voronoi Diagrams and Delaunay Triangulation via Parametric Linear Programming Saša V. Raković, Pascal Grieder and Colin Jones September 14, 2004 Abstract This note illustrates how Voronoi
More informationOptimized Watermarking Using Swarm-Based Bacterial Foraging
Journal of Information Hiding and Multimedia Signal Processing c 2009 ISSN 2073-4212 Ubiquitous International Volume 1, Number 1, January 2010 Optimized Watermarking Using Swarm-Based Bacterial Foraging
More informationImproved Reversible Data Hiding in Encrypted Images Based on Reserving Room After Encryption and Pixel Prediction
Improved Reversible Data Hiding in Encrypted Images Based on Reserving Room After Encryption and Pixel Prediction Ioan Catalin Dragoi, Henri-George Coanda and Dinu Coltuc Electrical Engineering Dept. Valahia
More informationDesign and Performance Evaluation of Boolean based Secret Image Sharing Scheme
Design and Performance Evaluation of Boolean based Secret Image Sharing Scheme Javvaji V.K. Ratnam 1, T. Sreenivasulu Reddy 2 and P. Ramana Reddy 3 1 Research Scholar, Faculty of Electronics and Communication
More informationA Survey of Fragile Watermarking-based Image Authentication Techniques
Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 6, November 2016 A Survey of Fragile Watermarking-based Image Authentication
More informationCOPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *
COPYIGHT POTECTION OF PALETTE IMAGES BY A OBUST LOSSLESS VISIBLE WATEMAKING TECHNIQUE * Pei-Pei Chen ( 陳佩貝 ) and Wen-Hsiang Tsai ( 蔡文祥 ), Dept of Computer Science, National Chiao Tung University, Hsinchu,
More informationA Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme
A Robust Color Image Watermarking Using Maximum Wavelet-Tree ifference Scheme Chung-Yen Su 1 and Yen-Lin Chen 1 1 epartment of Applied Electronics Technology, National Taiwan Normal University, Taipei,
More informationComparison of Wavelet Based Watermarking Techniques for Various Attacks
International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869, Volume-3, Issue-4, April 2015 Comparison of Wavelet Based Watermarking Techniques for Various Attacks Sachin B. Patel,
More informationA New Approach to Compressed Image Steganography Using Wavelet Transform
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography
More informationSecret Image Sharing Scheme Based on a Boolean Operation
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 14, No 2 Sofia 2014 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2014-0023 Secret Image Sharing Scheme Based
More informationA Comparative Study and Analysis of Quantization Table Modification Effect on JPEG Based Image Steganography
A Comparative Study and Analysis of Quantization Table Modification Effect on JPEG Based Image Steganography V. Senthooran 1, L. Ranathunga 2, KokSheik Wong 3 1,2 Department of Information Technology,
More informationInterleaving Max-Min Difference Histogram Shifting Data Hiding Method
JOURNAL OF SOFTWARE, VOL. 5, NO. 6, JUNE 2010 615 Interleaving Max-Min Difference Histogram Shifting Data Hiding Method Hsien-Wei Yang Overseas Chinese University/Department of Information Management,
More informationHigh Capacity Reversible Watermarking Scheme for 2D Vector Maps
Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration
More informationReversible Data Hiding Based on Median Difference Histogram
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 27, 577-593 (2011) Reversible Data Hiding Based on Median Difference Histogram HSIEN-WEI YANG 1,2, I-EN LIAO * AND CHAUR-CHIN CHEN + 1 Department of Information
More informationFeature Based Watermarking Algorithm by Adopting Arnold Transform
Feature Based Watermarking Algorithm by Adopting Arnold Transform S.S. Sujatha 1 and M. Mohamed Sathik 2 1 Assistant Professor in Computer Science, S.T. Hindu College, Nagercoil, Tamilnadu, India 2 Associate
More informationAdaptive Pixel Pair Matching Technique for Data Embedding
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationReversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting
Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting Hêmin Golpîra 1, Habibollah Danyali 1, 2 1- Department of Electrical Engineering, University of Kurdistan, Sanandaj,
More informationDATA HIDING IN PDF FILES AND APPLICATIONS BY IMPERCEIVABLE MODIFICATIONS OF PDF OBJECT PARAMETERS
DATA HIDING IN PDF FILES AND APPLICATIONS BY IMPERCEIVABLE MODIFICATIONS OF PDF OBJECT PARAMETERS 1 Jiun-Tsung Wang ( 王竣聰 ) and 2 Wen-Hsiang Tsai ( 蔡文祥 ) 1 Institute of Multimedia Eng., National Chiao
More informationA Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques
Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and
More informationMobile Robot Path Planning in Static Environments using Particle Swarm Optimization
Mobile Robot Path Planning in Static Environments using Particle Swarm Optimization M. Shahab Alam, M. Usman Rafique, and M. Umer Khan Abstract Motion planning is a key element of robotics since it empowers
More informationReversible Data Hiding VIA Optimal Code for Image
Vol. 3, Issue. 3, May - June 2013 pp-1661-1665 ISSN: 2249-6645 Reversible Data Hiding VIA Optimal Code for Image Senthil Rani D. #, Gnana Kumari R. * # PG-Scholar, M.E-CSE, Coimbatore Institute of Engineering
More informationRobust DWT Based Technique for Digital Watermarking
Robust DWT Based Technique for Digital Watermarking Mamta Jain Department of Electronics & Communication Institute of Engineering & Technology Alwar er.mamtajain@gmail.com Abstract Hiding the information
More informationVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
ABSTRACT VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP Jung-San Lee, Hsiao-Shan Wong, and Yi-Hua Wang Department of Information Engineering and Computer Science, Feng Chia University,
More information2
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 2018 International Conference on Information and Communications Technology (ICOIACT) An Improved
More informationA Novel Information Security Scheme using Cryptic Steganography
A Novel Information Security Scheme using Cryptic Steganography B.RAJA RAO Associate Professor, E.C.E Dept raja_rao_b@ yahoo.com P.ANIL KUMAR Assistant Professor, I.T Dept anilkumar_pallikonda@yahoo.co.in
More informationRobust Image Watermarking based on DCT-DWT- SVD Method
Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete
More informationIMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION. Catalin Dragoi, Dinu Coltuc
0th European Signal Processing Conference (EUSIPCO 01) Bucharest, Romania, August 7-31, 01 IMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION Catalin Dragoi, Dinu Coltuc
More informationA Image Steganography based on Non-uniform Rectangular Partition
120 A Image Steganography based on Non-uniform Rectangular Partition Venkata Ramesh Pokala Y. Dasradh Ram Reddy G. Srinivasa Reddy BVSR, Chimakurthy, A.P BVSR, Chimakurthy, A.P BVSR, Chimakurthy, A.P Abstract
More informationA secure steganographic algorithm based on Cellular Automata using Fibonacci representation
A secure steganographic algorithm based on Cellular Automata using Fibonacci representation Tuan Duc Nguyen Department of Computer Science Faculty of Science, Khon Kaen University Khon Kaen, Thailand nguyenductuan1982@gmail.com
More informationChaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image
015 International Conference on Computer, Control, Informatics and Its Applications Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image Rinaldi Munir Informatics
More informationImage Steganography Method Using Integer Wavelet Transform
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationAn Improved Reversible Data-Hiding Scheme for LZW Codes
International Conference on Computer Engineering, Information Science & Application Technology (ICCIA 2016) An Improved Reversible Data-Hiding Scheme for LZW Codes Wenqiang Zhao a, Bailong Yang b, Shizhong
More informationSINDH UNIVERSITY RESEARCH JOURNAL (SCIENCE SERIES)
Sindh Univ. Res. Jour. (Sci. Ser.) vol. 47 (4) 723-728 (2015) SINDH UNIVERSITY RESEARCH JOURNAL (SCIENCE SERIES) A New Image Steganographic Technique using Pattern based Bits Shuffling and Magic LSB for
More informationA DWT and DCT based Hybrid Approach for Audio Watermarking
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.
More informationACEAIT-3055 High-Capacity Steganography Using MRF-Synthesized Cover Images
ACEAIT-3055 High-Capacity Steganography Using MRF-Synthesized Cover Images Chaur-Chin Chen and Wei-Ju Lai Department of Computer Science National Tsing Hua University Hsinchu 30013, Taiwan e-mail: cchen@cs.nthu.edu.tw
More informationMRT based Fixed Block size Transform Coding
3 MRT based Fixed Block size Transform Coding Contents 3.1 Transform Coding..64 3.1.1 Transform Selection...65 3.1.2 Sub-image size selection... 66 3.1.3 Bit Allocation.....67 3.2 Transform coding using
More informationCHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM
74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small
More informationRobust Steganography Using Texture Synthesis
Robust Steganography Using Texture Synthesis Zhenxing Qian 1, Hang Zhou 2, Weiming Zhang 2, Xinpeng Zhang 1 1. School of Communication and Information Engineering, Shanghai University, Shanghai, 200444,
More informationAN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS
AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan
More informationHyper Edge Detection with Clustering for Data Hiding
Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 1, January 2016 Hyper Edge Detection with Clustering for Data Hiding Raniyah
More informationData Hiding Method Based on Graph Coloring and Pixel Block s Correlation in Color Image
AUT Journal of Electrical Engineering AUT J. Elec. Eng., 49()(17)13-13 DOI: 16/eej.17.1676.4868 Data Hiding Method Based on Graph Coloring and Pixel Block s Correlation in Color Image G. Ghadimi 1, M.
More informationFeature-Guided K-Means Algorithm for Optimal Image Vector Quantizer Design
Journal of Information Hiding and Multimedia Signal Processing c 2017 ISSN 2073-4212 Ubiquitous International Volume 8, Number 6, November 2017 Feature-Guided K-Means Algorithm for Optimal Image Vector
More informationDigital Image Watermarking Scheme Based on LWT and DCT
Digital Image ing Scheme Based on LWT and Amy Tun and Yadana Thein Abstract As a potential solution to defend unauthorized replication of digital multimedia objects, digital watermarking technology is
More informationDIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS
DICTA22: Digital Image Computing Techniques and Applications, 2 22 January 22, Melbourne, Australia. DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS *Yuk Ying CHUNG, Man To WONG *Basser Department of Computer
More informationA Novel Fragile Watermark-Based Image Authentication Scheme for AMBTC-Compressed Images
Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 2, March 2016 A Novel Fragile Watermark-Based Image Authentication Scheme
More informationData Hiding in Color Images Using Modified Quantization Table
Data Hiding in Color Images Using Modified Quantization Table Neha Batra 1 Pooja Kaushik 2 1 Pursuing M.Tech, Dept., of ECE, MMU, Mullana, India 2 Assistant Professor, Dept., of ECE, MMU, Mullana, India
More informationA Digital Video Watermarking Algorithm Based on LSB and DCT
A Digital Video Watermarking Algorithm Based on LSB and DCT Kirti Jain, U.S.N Raju Department of Computer Science and Engineering NIT Warangal India kirtijain.kj@gmail.com,usnraju@gmail.com ABSTRACT: In
More informationA DWT Based Steganography Approach
A DWT Based Steganography Approach EE604 Term Paper Instructor: Prof. Sumana Gupta Group No. 1 Group Members Anirudh Kumar Agrawal, 11907098 Pratik Likhar, 11531 Radhika Ravi, 11553 Introduction Image
More informationSECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES
VOL., NO. 7, APRIL 5 ISSN 89-668 6-5 Asian Research Publishing Network (ARPN). All rights reserved. SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES R. Selveeswari and P. R. Vijayalakshmi
More informationA WATERMARKING TECHNIQUE USING SYNONYM SUBSTITUTION FOR INTEGRITY PROTECTION OF XML DOCUMENTS
ICIC Express Letters ICIC International c 2010 ISSN 1881-803X Volume 4, Number 1, February 2010 pp. 89 94 A WATERMARKING TECHNIQUE USING SYNONYM SUBSTITUTION FOR INTEGRITY PROTECTION OF XML DOCUMENTS Chin-Chen
More information