Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels

被引:49
作者
Chang, CC
Chan, CS
Fan, YH
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
关键词
image hiding; the least-significant-bit substitution technique; modulus function;
D O I
10.1016/j.patcog.2005.12.011
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we shall propose a novel image-hiding scheme. Our new scheme classifies the host image pixels into two groups of pixels according to the pixel values. For each group of pixels, the corresponding secret pixel values go through an optimal substitution process and are transformed into other pixel values by following the dynamic programming strategy. Then, we can embed the transformed pixel values in the host pixels by using the modulus functions and obtain the stego-image. Extensive experimental results demonstrate that our new method is capable of offering better stego-image quality than a number of well-accepted schemes. (c) 2006 Pattern Recognition Society. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:1155 / 1167
页数:13
相关论文
共 22 条
[1]  
Bender W., 1996, IBM SYST J, V35, DOI DOI 10.1147/SJ.353.0313
[2]  
Chang CC, 2003, INFORMATICA-LITHUAN, V14, P431
[3]   Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy [J].
Chang, CC ;
Hsiao, JY ;
Chan, CS .
PATTERN RECOGNITION, 2003, 36 (07) :1583-1595
[4]   Mean quantization based image watermarking [J].
Chen, LH ;
Lin, JJ .
IMAGE AND VISION COMPUTING, 2003, 21 (08) :717-727
[5]   Dynamical cryptography based on synchronised chaotic systems [J].
Chu, YH ;
Chang, S .
ELECTRONICS LETTERS, 1999, 35 (12) :974-975
[6]   Steganography in halftone images: conjugate error diffusion [J].
Fu, MS ;
Au, OC .
SIGNAL PROCESSING, 2003, 83 (10) :2171-2178
[7]   Halftone image data hiding with intensity selection and connection selection [J].
Fu, MS ;
Au, OC .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2001, 16 (10) :909-930
[8]   Data hiding in curves with application to fingerprinting maps [J].
Gou, HM ;
Wu, M .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (10) :3988-4005
[9]   Robust watermarking of fingerprint images [J].
Gunsel, B ;
Uludag, U ;
Tekalp, AM .
PATTERN RECOGNITION, 2002, 35 (12) :2739-2747
[10]   Data encryption: A Nonmathematical approach [J].
Highland, HJ .
COMPUTERS & SECURITY, 1997, 16 (05) :369-386