skip to main content
10.1145/1516241.1516300acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

An efficient block-based lossless information hiding technique

Published: 15 February 2009 Publication History

Abstract

Lossless information hiding is to embed secret information into multi-media. Through extraction algorithm, the concealed information can be extracted and the original multi-media can be totally recovered. Jin et al. developed a simple and efficient lossless hiding scheme. The stego image quality resulted from Jin et al.'s scheme is good. However, their scheme can not hide a large number of secret data. Therefore, this paper proposes an enhanced hiding scheme to improve Jin et al.'s scheme. Furthermore, we apply an wavelet control technique based on Kamstra et al.'s scheme to control the image distortion. The experimental result shows that the amount of secret data based on the proposed scheme is higher than that of Jin et al.'s scheme. Moreover, the proposed method combined with Kamstra et al.'s scheme enhances the stego image quality efficiently.

References

[1]
Coltuc, D. and Chassery, J. M. 2007. Very Fast Watermarking by Reversible Contrast Mapping. IEEE Signal Processing Letters. 14, 4, 255--258.
[2]
Celik, M. U., Sharma, G., Tekalp, A. M., and Saber, E. 2005. Lossless Generalized-LSB Data Embedding. IEEE Transactions on Image Processing. 14, 2, 253--266.
[3]
Fallahpour, M. and Sedaaghi, M. H. 2007. High Capacity Lossless Data Hiding Based on Histogram Modification. IEICE Electronics Express. 4, 7, 205--210.
[4]
Jin, H. L., Fujiyoshi, M., and Kiya, H. 2007. Lossless Data Hiding in the Spatial Domain for High Quality Images. IEICE Transactions Fundamentals. E90-A, 4, 771--777.
[5]
Lee, C. C., Wu, H. C., Tsai, C. S., and Chu, Y. P. 2008. Adaptive Lossless Steganographic Scheme with Centralized Difference Expansion. Pattern Recognition. 41, 6, 2097--2106.
[6]
Lu, T. C., Lu, C. M., and Chang, C. C. 2007. Multimedia Security Techniques. CHWA, Taiwan.
[7]
Kamstra, L. and Heijmans, H. J. A. M. 2005. Reversible Data Embedding into Images Using Wavelet Techniques and Sorting. IEEE Transactions on Image Processing. 14, 12, 2082--2090.
[8]
Ni, Z., Shi, Y. Q., Ansari, N., and Su, W. 2006. Reversible Data Hiding. IEEE Transactions on Circuits and Systems for Video Technology. 16, 3, 354--362.
[9]
Sato, S., Jin, H. L., Fujiyoshi, M., and Kiya, H. 2006. On Area to Compute Statistic for the Reversible Data Hiding Scheme. IEICE Technical Report. SIP2006-1.
[10]
Thodi, D. M. and Rodriguez, J. J. 2007. Expansion Embedding Techniques for Reversible Watermarking. IEEE Transactions on Image Processing. 16, 3, 721--730.
[11]
Tian, J. 2003. Reversible Data Embedding Using a Difference Expansion. IEEE Transactions on Circuits and Systems for Video Technology. 13, 8, 890--896.
[12]
Yeh, H. L. 2007. Prediction-Based Reversible Data Hiding. Master Thesis. Providence University.

Cited By

View all
  • (2017)Image Hiding Algorithm Based on Secure Steganography Mechanism2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)10.1109/CyberC.2017.70(122-129)Online publication date: Oct-2017

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICUIMC '09: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
February 2009
704 pages
ISBN:9781605584058
DOI:10.1145/1516241
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 February 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. distortion control
  2. lossless information hiding
  3. wavelet technique

Qualifiers

  • Research-article

Conference

ICUIMC '09
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2017)Image Hiding Algorithm Based on Secure Steganography Mechanism2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)10.1109/CyberC.2017.70(122-129)Online publication date: Oct-2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media