Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications

  • Conference paper
Secure and Trust Computing, Data Management and Applications (STA 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 186))

Abstract

Steganography provides secure communications over the Internet with a cover image. However, it is difficult to transfer many messages with small-sized images. We have improved EMD (Exploiting Modification Direction), proposed by Zhang and Wang, to solve this problem. In this paper, we have developed a (2nā€‰+ā€‰2-1)-ary scheme. Our scheme shows a higher embedding rate, R=log2(2nā€‰+ā€‰2-1)/n, which is greater than that of the EMD scheme, because the EMD scheme embedding rate is R=log2(2n+1)/n, for n>=2. The experimental results show that our scheme is able to embed twice as many secret bits in multimedia communications compared to the existing EMD embedding method. Our method has low complexity and achieves higher embedding performance with good perceptual quality against the earlier arts. An experiment verified our proposed data hiding method in multimedia communications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 42.79
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 52.74
Price includes VAT (France)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Wang, H., Wang, S.: Cyber warfare:steganography vs. steganalysis. Communication of the ACMĀ 47(10), 76ā€“82 (2004)

    ArticleĀ  Google ScholarĀ 

  2. Goljan, M., Hogea, D., Soukal, D.: Quantitative Steganalysis of Digital Images: Estimating the Secret Message Length. ACM Multimedia Systems Journal, Special Issue on Multimedia SecurityĀ 9(3), 288ā€“302 (2003)

    Google ScholarĀ 

  3. Katzenbeisser, S., Petitcolas, F.A.P. (eds.): Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Books, Boston (2000) ISBN I-58053-35-4

    Google ScholarĀ 

  4. Westfeld, A.: F5-A steganographic algorithm. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.Ā 2137, pp. 289ā€“302. Springer, Heidelberg (2001)

    ChapterĀ  Google ScholarĀ 

  5. Provos, N., Honeyman, P.: Hide and Seek: An Introduction to Steganography. IEEE Security and PrivacyĀ 1(3), 32ā€“44 (2003)

    ArticleĀ  Google ScholarĀ 

  6. Yua, Y.-H., Changa, C.-C., Hub, Y.-C.: Hiding secret data in images via predictive coding. Pattern RecognitionĀ 38(5), 691ā€“705 (2005)

    ArticleĀ  Google ScholarĀ 

  7. Mielikainen, J.: LSB matching revisited. IEEE Signal Processing LettersĀ 13(5), 285ā€“287 (2006)

    ArticleĀ  Google ScholarĀ 

  8. Chan, C.-K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern RecognitionĀ 37(3), 469ā€“474 (2004)

    ArticleĀ  MATHĀ  Google ScholarĀ 

  9. Lin, I.-C., Lin, Y.-B., Wang, C.-M.: Hiding data in spatial domain images with distortion tolerance. Computer Standards and InterfacesĀ 31(2), 458ā€“464 (2009)

    ArticleĀ  Google ScholarĀ 

  10. Chang, C.C., Chen, T.S., Chung, L.Z.: A steganographic method based upon JPEG and quantization table modification. Information Sciences-Informatics and Computer ScienceĀ 141(1-2), 123ā€“138 (2002)

    MATHĀ  Google ScholarĀ 

  11. Spauldinga, J., Noda, H., Shirazib, M.N., Kawaguchia, E.: BPCS steganography using EZW lossy compressed images. Pattern Recognition LettersĀ 23(13), 1579ā€“1587 (2002)

    ArticleĀ  MATHĀ  Google ScholarĀ 

  12. Zhang, X., Wang, S.: Efficient Steganographic Embedding by Exploiting Modification Direction. IEEE Communications LettersĀ 10(11), 781ā€“783 (2006)

    ArticleĀ  Google ScholarĀ 

  13. Lee, C.-F., Chang, C.-C., Wang, K.-H.: An improvement of EMD embedding method for large payloads by pixel segmentation strategy. Image and Vision ComputingĀ 26(12), 1670ā€“1676 (2008)

    ArticleĀ  Google ScholarĀ 

  14. Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color, and gray-scale images. IEEE Trans. MultimediaĀ 8, 22ā€“28 (2001)

    ArticleĀ  Google ScholarĀ 

  15. Westfe3d, A., Pfitzmann, A.: Attacks on Steganographic Syste. In: Proc. 3rd Information Hiding Workshops, Dresden, Germany, September 28-October 1, pp. 61ā€“75 (1999)

    Google ScholarĀ 

  16. Goljan, M., Soukal, D.: Higher-Order Statistical Steganalysis of Palette Images. In: Proc. SPIE, Electronic Imaging, Security, Steganography, Watermarking of Multimedia Contents V, Santa Clara, California, pp. 178ā€“190 (2003)

    Google ScholarĀ 

  17. http://sipi.usc.edu/database/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, C., Shin, D., Shin, D., Zhang, X. (2011). Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications. In: Park, J.J., Lopez, J., Yeo, SS., Shon, T., Taniar, D. (eds) Secure and Trust Computing, Data Management and Applications. STA 2011. Communications in Computer and Information Science, vol 186. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22339-6_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22339-6_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22338-9

  • Online ISBN: 978-3-642-22339-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation