High capacity image steganographic model

被引:203
作者
Lee, YK [1 ]
Chen, LH [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp & Informat Sci, Hsinchu 30050, Taiwan
来源
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING | 2000年 / 147卷 / 03期
关键词
D O I
10.1049/ip-vis:20000341
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Steganography is an ancient art of conveying messages in a secret way that only the receiver knows the existence of a message. So a fundamental requirement for a steganographic method is imperceptibility; this means that the embedded messages should not be discernible to the human eye. There are two other requirements, one is to maximise the embedding capacity, and the other is security. The least-significant bit (LSB) insertion method is the most common and easiest method for embedding messages in an image. However, how to decide on the maximal embedding capacity for each pixel is still an open issue. An image steganographic model is proposed that is based on variable-size LSB insertion to maximise the embedding capacity while maintaining image fidelity. For each pixel of a grey-scale image, at least four bits can be used for message embedding. Three components are provided to achieve the goal. First, according to contrast and luminance characteristics, the capacity evaluation is provided to estimate the maximum embedding capacity of each pixel. Then the minimum-error replacement method is adapted to find a grey scale as close to the original one as possible. Finally, the improved grey-scale compensation, which takes advantage of the peculiarities of human visual system, is used to eliminate the false contouring effect. Two methods, pixelwise and bitwise, are provided to deal with the security issue when using the proposed model. Experimental results show effectiveness and efficiency of the proposed model.
引用
收藏
页码:288 / 294
页数:7
相关论文
共 18 条
[1]   On the limits of steganography [J].
Anderson, RJ ;
Petitcolas, FAP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :474-481
[2]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[3]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[4]   Low cost spatial watermarking [J].
Darmstaedter, V ;
Delaigle, JF ;
Quisquater, JJ ;
Macq, B .
COMPUTERS & GRAPHICS-UK, 1998, 22 (04) :417-424
[5]  
Gonzalez R.C., 1992, DIGITAL IMAGE PROCES
[6]  
Johnson N. F., 1998, COMPUT J, V31, DOI [DOI 10.1109/MC.1998.4655281, 10.1109/MC.1998.4655281]
[7]  
KAHN D, 1996, LECT NOTES COMPUTER, V1174, P1
[8]  
Koch E., 1995, P IEEE WORKSH NONL S, P452
[9]   Digital watermarking of color images using amplitude modulation [J].
Kutter, M ;
Jordan, F ;
Bossen, F .
JOURNAL OF ELECTRONIC IMAGING, 1998, 7 (02) :326-332
[10]  
LANGELAAR GC, 1996, 17 S INF THEOR BEN 3