Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy

被引:224
作者
Chang, CC [1 ]
Hsiao, JY
Chan, CS
机构
[1] Natl Changhua Univ Educ, Dept Informat Management, Changhua 500, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 62107, Taiwan
关键词
image hiding; least-significant-bit substitution; dynamic programming; genetic algorithm; image embedding;
D O I
10.1016/S0031-3203(02)00289-3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The processing of simple least-significant-bit (LSB) substitution embeds the secret image in the least significant bits of the pixels in the host image. This processing may degrade the host image quality so significantly that grabbers can detect that there is something going on in the image that interests them. To overcome this drawback, an exhaustive least-significant-bit substitution scheme was proposed by Wang et al. but it takes huge computation time. Wang et al. then proposed another method that uses a genetic algorithm to search "approximate" optimal solutions and computation time is no longer so huge. In this paper, we shall use the dynamic programming strategy to get the optimal solution. The experimental results will show that our method consumes less computation time and also gets the optimal solution. (C) 2003 Pattern Recognition Society. Published by Elsevier Science Ltd. All rights reserved.
引用
收藏
页码:1583 / 1595
页数:13
相关论文
共 9 条
[1]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[2]  
CHANG CC, 1999, P 5 AS PAC C COMM 4, V2, P977
[3]   Dynamical cryptography based on synchronised chaotic systems [J].
Chu, YH ;
Chang, S .
ELECTRONICS LETTERS, 1999, 35 (12) :974-975
[4]  
Chun W. D., 1998, IEEE T CONSUM ELECTR, V44, P1406
[5]   Data encryption: A Nonmathematical approach [J].
Highland, HJ .
COMPUTERS & SECURITY, 1997, 16 (05) :369-386
[6]  
Horowitz E., 1998, Computer Algorithm
[7]   A robust DCT-based watermarking for copyright protection [J].
Lin, SD ;
Chen, CF .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (03) :415-421
[8]   Image hiding by optimal LSB substitution and genetic algorithm [J].
Wang, RZ ;
Lin, CF ;
Lin, JC .
PATTERN RECOGNITION, 2001, 34 (03) :671-683
[9]   Image refining technique using digital watermarking [J].
Wu, CF ;
Hsieh, WS .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (01) :1-5