DOI QR코드

DOI QR Code

Steganographic Method Based on Interpolation and Improved JPEG Prediction

보간법과 개선된 JPEG 예측을 통한 스테가노그래픽 기법 연구

  • Received : 2013.01.28
  • Accepted : 2013.02.22
  • Published : 2013.04.05

Abstract

The previous steganographic methods by using the interpolation were difficult to estimate the distortion because the size of cover image is extended by interpolation algorithms. In this paper, to solve the problems of previous methods proposed the improved steganographic method based on the pixel replacement algorithms. In our method, we cannot extend a cover image, but also can estimate exactly the distortion of the stego-images. In the experimental results, the estimated distortion and embedding capacity of stego-image are shown on three pixel replacement methods.

Keywords

References

  1. N. F. Johnson and Jajodia, "Exploding Steganography : Seeing the Unseen", Computer Practices, Vol. 31, No. 2, pp. 26-34, 1998.
  2. R. J. Anderson and F. A. P. Petitcols, "On the Limits of Steganography", IEEE Journal on Selected Areas in communications, Vol. 16, No. 4, pp. 747-781, 1998.
  3. Y. R. Park and J. H Park, "A Study of Steganography Using Cartoon Image", Journal of Korea Multimedia Society, Vol. 7, No. 7, pp. 913-921, 2004.
  4. N. Johnson and S. Jajodia, "Steganalysis of Images Created Using Current Steganography Software", Second Information Hiding Workshop held in Portland, Oregon, USA, LNCS 1525, pp. 273-289, 1998.
  5. E. Kawaguchi, H. Noda, and M. Niimi, "Image Data Based Steganograpy", Information Processing Society of Japan(IPSJ MAGAZINE), Vol. 44, No, pp. 223-241, 2003.
  6. K. H. Jung and K. Y. Yoo, "Steganographic Method Based on Three Directional Embedding", 7, 3-5, 2010.
  7. C. F. Lee and Y. L. Huang, "An Efficient Image Interpolation Increasing Payload in Reversible Data Hiding", Expert Systems with Applications, Vol. 39, pp. 6712-6719, 2012. https://doi.org/10.1016/j.eswa.2011.12.019
  8. W. Hong and T. S. Chen, "Reversible Data Embedding for High Quality Images using Interpolation and Reference Pixel Distribution Mechanism", J. Vis. Commun. Image R., Vol. 22, pp. 131-140, 2011. https://doi.org/10.1016/j.jvcir.2010.11.004
  9. C. K. Chan and L. M. Cheng, "Hidding Data in Images by Simple LSB Substitution", Journal of Pattern Recognition, Vol. 37, No. 3, pp. 469-474, 2004. https://doi.org/10.1016/j.patcog.2003.08.007
  10. R. Z. Wang, C. F. Lin, and J. C. Lin, "Image Hiding by Optimal LSB Substitution and Genetic Algorithm", Journal of pattern Recognition, Vol. 34, No. 3, pp. 671-683, 2001. https://doi.org/10.1016/S0031-3203(00)00015-7
  11. H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang, "Image Steganography Scheme Based on Pixel-Value Differencing and LSB Replacement Methods", Visual Image Signal Processing, Vol. 152, No. 5, pp. 611-615, 2005. https://doi.org/10.1049/ip-vis:20059022
  12. D. C. Wu and W. H. Tsai, "A Steganographic Method for Images by Pixel-Value Differencing", Journal of Pattern Recognition Letters, Vol. 24, No. 9-10, pp. 1613-1626, 2003. https://doi.org/10.1016/S0167-8655(02)00402-6
  13. R. E. Crochiere and L. R. Rabiner, "Multirate Digital Signal Processing", Prentice-Hall, 1983.
  14. H. Noda, J. Spaulding, M. N. Shirazi, M. Nimi, and E. Kawaguchi, with JPEG2000 Compreasion, Proceedings of Pacifix Rim Workshop on Digital Steganograpy(STEG 2002), pp. 98-107, 2002.

Cited by

  1. Study of Information Hiding Methods for SONAR Images in the Naval Combat System vol.18, pp.6, 2015, https://doi.org/10.9766/KIMST.2015.18.6.779