Enhanced Embedding Capacity for Data Hiding Approach Based on Pixel Value Differencing and Pixel Shifting Technology

被引:4
|
作者
Huang, Cheng-Ta [1 ,2 ]
Shongwe, Njabulo Sinethemba [2 ]
Weng, Chi-Yao [3 ]
机构
[1] Yuan Ze Univ, Dept Informat Management, Taoyuan 320, Taiwan
[2] Yuan Ze Univ, Int Bachelor Program Informat, Taoyuan 320, Taiwan
[3] Natl Pingtung Univ, Dept Comp Sci & Artificial Intelligence, Pingtung 900, Taiwan
关键词
data hiding; pixel value differencing; pixel shifting; secure analysis; REVERSIBLE WATERMARKING; STEGANOGRAPHIC METHOD; IMAGE STEGANOGRAPHY; BINARY IMAGES; AUTHENTICATION; PVD;
D O I
10.3390/electronics12051200
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data hiding algorithms can achieve the issue of information security when secret data are transmitted via the public network. This paper proposes a novel data-hiding scheme based on pixel value differencing and pixel shifting to increase embedding capacity and visual quality. In the proposed method, the cover image is first divided into nonoverlapping blocks, and eight groups of different values are generated with the center pixel as the reference pixel to embed the secret message. The pixel shifting strategy is applied to adjust the stego image to improve its quality. Experimental results show that the proposed method has an embedding capacity of 740,000 bits with a peak signal-to-noise ratio value greater than 35 dB. Therefore, it is undetected by the human eye. Other compared state-of-the-art schemes have embedding capacities of 51,219 bits, 70,217 bits, and 104,055 bits, which are lower than the proposed methods' 740,000 bits. The RS, chi-square, and rotation attack analyses prove that the proposed method can withstand security attacks. Thus, the proposed method performs better than other state-of-the-art methods with respect to embedding capacity and ability to withstand attacks.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] Data embedding based on pixel value differencing and modulus function using indeterminate equation
    Wang Zhao
    Zhang Jie
    Liao Xin
    Wen Qiaoyan
    The Journal of China Universities of Posts and Telecommunications, 2015, 22 (01) : 95 - 100
  • [22] Data embedding based on pixel value differencing and modulus function using indeterminate equation
    Zhao, Wang (wangzhao1989320@126.com), 1600, Beijing University of Posts and Telecommunications (22):
  • [23] Data embedding based on pixel value differencing and modulus function using indeterminate equation
    School of Science, Beijing University of Posts and Telecommunications, Beijing
    100876, China
    不详
    410082, China
    不详
    100876, China
    J. China Univ. Post Telecom., 1 (95-100):
  • [24] Capacity-Raising Steganography Using Multi-Pixel Differencing and Pixel-Value Shifting Operations
    Yang, Cheng-Hsing
    Wang, Shiuh-Jeng
    Weng, Chi-Yao
    FUNDAMENTA INFORMATICAE, 2010, 98 (2-3) : 321 - 336
  • [25] Adaptive Data Hiding, Using Pixel-Value-Differencing and LSB Substitution
    Khodaei, Masoumeh
    Bigham, Bahram Sadeghi
    Faez, Karim
    CYBERNETICS AND SYSTEMS, 2016, 47 (08) : 617 - 628
  • [26] Dual image based reversible data hiding method using neighbouring pixel value differencing
    Jung, K. H.
    IMAGING SCIENCE JOURNAL, 2015, 63 (07): : 398 - 407
  • [27] Data Hiding in Gray-Scale Images Using Pixel Value Differencing
    Agrawal, Shrikant S.
    Samant, Rahul M.
    TECHNOLOGY SYSTEMS AND MANAGEMENT, 2011, 145 : 27 - 33
  • [28] A digital data hiding scheme based on pixel-value differencing and side match method
    Hsing-Han Liu
    Yuh-Chi Lin
    Chia-Ming Lee
    Multimedia Tools and Applications, 2019, 78 : 12157 - 12181
  • [29] A digital data hiding scheme based on pixel-value differencing and side match method
    Liu, Hsing-Han
    Lin, Yuh-Chi
    Lee, Chia-Ming
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (09) : 12157 - 12181
  • [30] A Secure Data Hiding Method Based on Patched Reference Table and Pixel Value Differencing Technique
    Zhan, Weizhen
    Peng, Zixuan
    Hong, Wien
    Chen, Meijin
    Wen, Danni
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1199 - 1202