Image hiding by optimal LSB substitution and genetic algorithm

被引:491
作者
Wang, RZ
Lin, CF
Lin, JC
机构
[1] Yuan Ze Univ, Inst Elect Engn & Comp Engn & Sci, Chungli 320, Taiwan
[2] Natl Chiao Tung Univ, Dept Comp & Informat Sci, Hsinchu 300, Taiwan
关键词
image encryption; image hiding; LSB substitution; genetic algorithm;
D O I
10.1016/S0031-3203(00)00015-7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we develop a novel method to embed important data in the host image so that the interceptors will not notice about the existence of the data. The basic concept of the proposed method is by simple LSB substitution. To prevent illicit access of data and increase the system performance, the method of randomized process and the optimal LSB substitution are proposed. The effectiveness of the optimal LSB substitution in the worst case is proved. We also develop a genetic algorithm to solve the problem of hiding important data in the rightmost k LSBs of the host image, which may involve a huge computation time to find the optimal result when k is large. Finally, based on the concept of perceptual modeling, an improved hiding technique is developed to obtain a high-quality embedding result. Experimental results will reveal that the quality of the embedding result will not be seriously degraded, and is near optimal by utilizing the proposed method. (C) 2001 Pattern Recognition Society. Published by Elsevier Science Ltd. All rights reserved.
引用
收藏
页码:671 / 683
页数:13
相关论文
共 15 条
[1]  
Adelson E., 1990, U.S. Patent, Patent No. [4,939,515, 4939515]
[2]  
[Anonymous], 1989, GENETIC ALGORITHM SE
[3]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[4]   PICTURE DATA ENCRYPTION USING SCAN PATTERNS [J].
BOURBAKIS, N ;
ALEXOPOULOS, C .
PATTERN RECOGNITION, 1992, 25 (06) :567-581
[5]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[6]   Data encryption: A Nonmathematical approach [J].
Highland, HJ .
COMPUTERS & SECURITY, 1997, 16 (05) :369-386
[7]  
HOLLAND JH, 1975, ADAPTATION NATURAL A
[8]   Hidden digital watermarks in images [J].
Hsu, CT ;
Wu, JL .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1999, 8 (01) :58-68
[9]   On the security of image encryption method [J].
Jan, JK ;
Tseng, YM .
INFORMATION PROCESSING LETTERS, 1996, 60 (05) :261-265
[10]  
Koch E, 1995, P IEEE WORKSH NONL S, P452