- Open Access
- Total Downloads : 185
- Authors : Nilofer Lalani
- Paper ID : IJERTV4IS010680
- Volume & Issue : Volume 04, Issue 01 (January 2015)
- Published (First Online): 29-01-2015
- ISSN (Online) : 2278-0181
- Publisher Name : IJERT
- License: This work is licensed under a Creative Commons Attribution 4.0 International License
Data Hiding for Secret Communication using Appm
Nilofer Lalani (Pg Student)
Department Of Electronics And Telecommunications M.G.Ms College Of Engineering, Nanded,Ms
Abstract- This paper proposes a data hiding method based on pixel pair matching. The idea behind PPM is to use the values of pixel pair as reference coordinate and search a coordinate in the neighborhood set of this pixel pair according to the given message. The pixel pair is then replaced by the search coordinate to hide the digit. Exploiting modification direction and diamond encoding are two data hiding methods based on PPM proposed recently. APPM offers lower distortion than these methods by providing more compact neighborhood sets and allows digits to be embedded in any notational system and also provides lower distortion for various payloads. Experimental results shows that proposed method provide better performance than other existing methods (OPAP and DE).
Index Terms- Adaptive pixel pair matching (APPM), Diamond encoding (DE), least significant bit (LSB), optimal pixel adjustment process (OPAP), Pixel pair matching (PPM).
I.INTRODUCTION
Data hiding is method that hides data into carrier for carrying secret messages confidentially [1], [2]. Digital images are transmitted over internet very widely, so they serve as carrier for covert communication. Images that carry data are called cover images and images with data hided inside are called stego images. After the process of embedding is completed, pixels of cover images will be changed and so distortion occurs. Distortion caused by embedding of data is called embedding distortion [3].A good data hiding method should be capable of providing statistical detection.
The LSB is well known data hiding method. It is easy to implement and has low CPU cost and therefore is one of the popular data hiding methods. In LSB, pixels with even values will be increased by 1 or kept as it is. Pixels with odd values will be decreased by 1 or kept as it is. So, imbalanced embedding distortion occurs [6], [7]. In 2004, Chan et al. [8] proposed a simple OPAP method to reduce the distortion caused by LSB replacement. According to it, if message bits are embedded into right most r LSBs of m bit pixel, other m
r bits are adjusted by simple calculations. If the adjusted result offers a smaller distortion, then these mr bits are replaced by adjusted results or kept as it is.
LSB and OPAP, uses one pixel as embedding unit and hides data into right most r LSBs. Another group of data hiding method uses two pixels as an embedding unit and hidesdigit
in a Bary notational system. We term such data hiding methods as PPM. In 2006, Mielikainen [9] proposed LSB
matching method based on PPM. He used two pixels as embedding unit. LSB of the first pixel is used for carrying one message bit and binary function is used to carry another bit. Two bits are carried by two pixels. There are ¾ chances a pixel value is changed by one and another ¼ chance a pixel value is not changed. So MSE is (3/4) *(1²/2) = 0.375 when the payload is 1 bpp [9]. Whereas MSE obtained by LSB is
-
Zhang and Wang [10] proposed EMD method. EMD improves Mielikainen method in which only one pixel in pixel pair is changed one gray scale unit at most and a message digit in a 5 ary notational system can be embedded. So the payload is (1/2)log2 5 = 1.161 bpp. LSB matching and EMD methods improves traditional LSB methods in which better stego image quality can be achieved under same payload. The maximum payloads of LSB matching and EMD are 1 and 1.161 bpp. So, these two methods are not good for high payload applications.
Embedding methods of LSB matching and EMD offers no way to increase payload. In 2008, Hong [11] proposed data hiding method based on Sudoku solutions with maximum payload of (1/2) log2 9 bpp. In 2009, Chao et al. [12] presented diamond encoding method to further enhance payload of EMD. DE employs an extraction function to generate diamond characteristic values (DCV), and embedding is done by modifying pixel pairs in the input image according to their DCVs neighborhood set and given message digit. Chao used k as an embedding parameter for controlling the payload, in which a digit is hidded into two pixels in a B ary notational system, where B= 2k² +2k+1. If k=1, B=5, i.e. digits in 5ary notational system is hided and the resultant payload is same like EMD. If k=2,B=13;If k=3,B=25.Instead of enhancing payload of EMD, Wang et al.[13] suggested a novel section wise exploring modification direction method for enhancing image quality of EMD. This method segments cover Image into pixel sections, each section is divided into selective and descriptive groups .EMD procedure is then performed on each group by referencing predefined selector and descriptor table. Method combines different pixel groups of cover image to represent more embedding directions with less pixel changes than EMD method. By selecting appropriate combination of pixel groups, embedding efficiency of stego image is enhanced.
Another group of data hiding methods considers security as guiding principle to develop less detectable embedding scheme. These methods can either be implemented by
avoiding embedding messages into conspicuous part of cover image, or by improving embedding efficiency, i.e., embed more messages per modification into the cover [14].former can be achieved for e.g. .using selection channel such as wet paper code proposed by Fridrich et al. [15].Latter can be achieved by encoding message optimally with smallest embedding impact using near optimal embedding schemes [4], [16], [17].In above methods, data bits are not conveyed by individual pixels but by group of pixels and their positions.
This paper proposes a new data hiding method for reducing embedding impact by providing simple extraction function with a more compact neighborhood set. It also embeds more messages per modifications thereby increasing embedding efficiency. The Image quality obtained not only performs better than OPAP and DE, but also offers higher payload with less detectability.
The rest of the paper is organized as follows. Section II is brief review of OPAP and DE. Section III has proposed method. Section IV includes Experimental results. Section V contains conclusions and remarks.
-
RELATED WORKS
OPAP reduces image distortion compared to traditional LSB method.DE enhances payload of EMD by embedding digits in B-ary notational system. These two methods offer a high payload and preserves acceptable stego image quality.
-
Optimal Pixel Adjustment Process (OPAP)
OPAP method was proposed by Chan et al. in 2004.It greatly improves image distortion problem resulting from LSB replacement. OPAP method is shown as below[8], [18].suppose pixel value is v, value of right-most r LSBs of v is ( ).Let v' be pixel value after hiding r message bits using LSB replacement and s be the decimal value of these r message bits. OPAP uses below equation for adjusting v' so that embedding distortion can be minimized.
Where v'' is the result after OPAP embedding .It is found that v'' and v' has same right-most r LSBs and so, embedded data can be extracted directly from the right-most r LSBs. Consider a simple example. Suppose a pixel value v=160=101000002, bits to be hidden are 1012.So, r=3, s=5.After hiding s, we get v'=165. Because(3)=0002=0 and
(3)-s=0-5<-231 , and v''=v'-23=165-8=157=100111012. So,
after embedding1012,pixel value 160 is modified to 157.For extracting embedded data back, simplyextract right-most three LSBs of 157.
-
Diamond Encoding (DE)
In 2009, Chao et al. proposed a DE method which is based on PPM. It hides secret digit in B-ary notational system into two pixels, where B= 2k² +2k+1, k1.payload of DE is
(1/2)log2(2k² + 2k + 1) bpp. It is seen that when k=1, DE is same like EMD in which both methods hide data in 5-ary notational system. DE method is described in brief below:
Let the size of m bits cover image be M*M, message digits be, where B represents message digit is in B-ary notational system. First find smallest integer k satisfying following condition:
2
[]Whererepresents number of message digits in a B-ary notational system. To hide a message digit into pixel pair (x, y) neighborhood set (x, y) is determined by
(x, y) = {(a, b) a-x+ b-yk}
Where (x, y) is set of the coordinates (a, b)s whose absolute distance to the coordinate (x, y) is smaller or equal to k. Diamond function f is the used to calculate DCV of (x, y), where f(x, y) = ((2k+1)x + y) mod B. Then the coordinates belonging to set (x, y) is searched and DE finds a coordinate (x', y') satisfying f (x', y') =, and then replacing (x, y) by (x', y'). We should repeat this procedure until all the message digits are hidded inside. For the extraction, pixels are scanned using same order as in embedding. DCV value of pixel pair (x',y') is then extracted as a message digit.
Consider a simple example: Let k=3 and (x, y) = (12, 10), then B=25. The neighborhood and its corresponding DCV values are shown in Fig, 1. Below.If a digit in a 25 ary notational system 1425 is to be hidden, then in the region defined by(12, 10), we find DCV value of (x', y')=(11, 12)=14.so, we replace (12, 10) by (11, 12). For extracting digits back, calculate f (x', y')=f(11, 12) = (7*11+12) mod 25
= 14; thus we get our embedded digit back.
-
-
ADAPTIVE PIXEL PAIR MATCHING
-
The Basic idea of PPM based methods is to use pixel pair (x, y) as coordinate and search a coordinate (x', y') within a predefined neighborhood set (x, y) such that f (x', y') =, where f is the extraction function and is the message digit
in a B-ary notational system to be concealed. Data embedding is done by replacing (x, y) with (x',y').
For PPM-based methods, suppose a digit is to be concealed. Range of digit is between 0 and B-1, and coordinate (x', y') (x, y) has to be found such that f(x', y')
=. So, the range of f(x, y) must be integers between 0 and B-1., each integer occurring at least once. Also to reduce distortion, number of coordinates in (x, y) should be as small as possible. Best PPM method satisfies following three requirements: 1) there are exactly B coordinates in (x, y). 2) The values of extraction function in this coordinate are mutually exclusive.3) The design of (x, y) and f(x, y) should be capable to embed digit in any notational system so that B which is best can be selected for achieving lower embedding distortion.
DE is a data hiding method based on PPM. DE enhances payload of EMD and also preserves stego image quality. But, there are several problems.1) The payload of DE is determined by the selected notational system, which is controlled by parameter k; so, the notational system cannot be arbitrarily selected. Take for example when k=1, 2, 3 then digits in 5ary, 13ary and 25- ary notational system are used to embed data, respectively. But, embedding digits in 4- ary or 16 ary notational system are not supported in DE 2) (x,
y) in DE is defined by diamond shape, which results in some unnecessary distortion when k >2. In section III-A, we redefine (x, y) as well as f(x, y ) and thus propose a new embedding method based on PPM . Proposed method allows hiding digits in any notational system and provides same or even smaller embedding distortion than DE for various payloads.
-
Extraction Function and Neighborhood Set
(x, y) and f(x, y) affects stego image quality a lot. The design of (x, y) and f(x, y) should fulfill following requirements: All values of f(x, y) in (x, y) should be mutually exclusive, and the summation of the square distance between all coordinates in (x, y) and (x, y) should be smallest. Because, during embedding (x, y) will be replaced by one of the coordinate in (x ,y).Suppose there are B coordinates in (x, y) i.e. we want hide digits in B ary notational systems so the probability of replacing (x, y) by one of the coordinates in (x, y) is same. Averaged MSE can be obtained by averaging the summation of the squared distance between (x, y) and other coordinates in (x, y). So the expected MSE after data embedding is given by
Minimize: 1 ( x) ² + ( y) ² Subject to: f (, ) {0, 1 B -1}
=0
f (, ) f( , ), if i j for 0 i, j B-1
Given B and (x, y) value, above equation can be solved easily
to obtain constant and B pairs of (, ).These B pairs of (, ) are denoted by(,).(,).represents neighborhood setof (x, y). Table I gives list of constant satisfying above condition for the payload under 3 bpp.
Fig. 2 shows some representative (,) and their corresponding satisfying above equation, where the center of (,) is shaded with lines. Fig also shows (,)of DE when we set k=3 and k=4. We can observe that the four corners of diamond shape may cause higher distortion but ours selects a more compact region for embedding and thus smaller distortion can be achieved.
B Embedding Procedure
Suppose the cover image is of size M*M, and message bit to be hided is S. First we calculate minimum B such that all
2
(, ) = 1
1
=0
(( -x) ²+ ( -y) ²).
Now, we will propose an APPM data hiding method to explore better f(x, y) and (x, y) so that (,) can be minimized. Data is then embedded with help of PPM based on this f(x, y) and (x, y). Let
f(x, y) =(x+*y) mod B
Solution of (x, y) and f(x, y) is discrete optimization problem
message bits can be embedded. The detail procedure is shown below.
-
Calculate minimum B satisfying [M*M/2] > =
-
Convert S into list of digits with a B ary notational system
-
Solve discreet optimization problem for finding and
(, )
-
In the region defined by (,)record the coordinate f(^,^) = i, 0 i B-1
notational system. Modulus distance is given by d = (1-12) mod 16=5 and (^,^)=(-1,1);so we replace (10, 11) by (10-1,
5 5
11+1) =(9, 12).
C Extraction Procedure
-
Construct a non-repeat random embedding sequence Q using key
-
To embed, two pixel in the input image are selected according to Q, and calculate modulus distance [14] d = (-
-
f(x, y)) modB, than replace (x, y) with (x +^y +^).
For extracting digits back, pixel pairs are to be scanned in same order like embedding. Following procedure is used
-
Construct embedding sequence Q using key .
-
Select two pixels(x', y')
7. Repeat step 6 until all the message digit are embeddedinside.
Let x' =x +^ and y=y +^.If overflow or underflow occurs then in the neighborhood set of (x, y) find nearest (x, y'') such that f(x, y'') =. This can be done by solving optimization problem
Minimize (x- x'')² +(y- y'')²
Subject to f(x, y'') =. 0 x, y'' 255
-
Calculate f(x', y').
-
Repeat steps 2 and 3 until all digits are extracted back.
-
Finally convert extracted message digits into binary bit stream to get message bit S.
For the previous example, extraction can be done as, Le scanned digit be (x', y') = (9, 12). Calculating f(9, 12) = (9+6*12) mod 16 = 116
IV QUALITY ANALYSIS AND EXPERIMENTAL RESULTS
Image distortion occurs when we are hiding some data inside it because pixel values of cover image is modified. We use MSE (Mean Square error) to measure image quality. Lower MSE leads to better image quality.
MSE = 1
=0
.
=0
(, – ) ²
,
, )
Where, M*M is the Image size, (, ) and are pixel
Instead of taking gray scale image as cover image we can also use RGB image as cover image. First color image is divided into three planes i.e. R plane, G plane and B plane. Bits to be embedded are hidden into one of the three planesand then same procedure is carried out like OPAP bit hiding.
We can also embed secret data inside video. First video is
values of original and stego image.
-
Analysis of Theoretical MSE
In this section we are going to analyze averaged MSE of LSB, OPAP, DE, APPM methods, so that stego image quality can be theoretically measured. When data is embedded using r LSBs of each pixel, each bit valued 0 or 1 has equal probability. Squared error caused by embedding a bit in ith LSB is (1/2)(21)². So, MSE is given by
divided into different frames and in one of the frame we can
= 1
(2 1 ) ² = 1(4 -1)
hide data using similar procedure.
2
=1 6
It is also possible to hide images inside cover image. For doing this first we need to convert the elements of hiding image which is in matrix format into singular Columnand then same procedure is followed like OPAP method. At the
To find averaged MSE of OPAP, consider original pixel value isv and stego pixel value is v''. Probability of v-v''=0 or v-v''= 2 1 is 1/2 .so, MSE is given by
end again we need to convert obtained elements into original
1 (2 1)² + 1
211 ²
size of hidden image using reshape command.
Consider simple example: Suppose a cover image of size 512*512 with B=16 is given .i .e 16-ary notational system is
= 2
= 1 (4 +2)
12
21
=1
used as an embedding base. So, value of constant
16=6.16(0,0)can be obtained by solving optimization. The neighborhood set 16(0,0) is shown in Fig 3 above. Suppose a pixel pair (10, 11) is used and we want to hide 116 in 16-ary
For DE method, assume that the probability of selecting a
coordinate (,, ) in the diamond shape (x, y) to replace a pixel pair (x, y) is the same. So, averaged MSE caused by embedding digits in a B- ary notational system is
= 1 1 (( -x) ² + ( -y)²)
2
=0
=k(k+1)(k²+k+1)/{3+6k(k+1)}
For embedding digits in APPM, assume that probability of replacing (x,y) with each (x',y') in (,) is identical. So, averaged MSE is given as
= 1 1 (( -x) ² + ( -y)²)
2
=0
for ( , ,) (x, y)
Take for example, 16(,) which allows concealing digits with 16-ary notational system is shown in fig 4. Squared distance between ( , ) 16(,) and center position are marked in corresponding positions. Averaged MSE is then calculated by averaged squared distance as
216
(=16)= 1
(1*4+2*4+4*4+5*3) = 1.344
LSB and OPAP employs each pixel in cover image as an embedding unit, and r bits can be embedded into each pixel, so payload is r bpp. Whereas for PPM based methods, payload of r bpp is equal to embedding 2r bits for every two pixel i.e. pixel pair, which is same like embedding digits in 22 ary notational system. Theoretical MSE of APPM is compared with MSEs of LSB, OPAP, DE and results are shown in Table II. We can observe that MSE of APPM is smaller than LSB and OPAP in all payloads. When payload is 1 bpp, OPAP and LSB have same MSE i. e 0.5 and MSE of APPM is 0.375 which is ¼ reductions in MSE. For higher payload e. g. 3 or 4 bpp, MSE of OPAP is about one half that of LSB and APPMs MSE is decreased to 0.297 for 3 bpp and 0.982 for 4 bpp.
Fig 5 shows cover image Lena along with stego images under various payloads. We can observe that the stego images are visually indistinguishable from cover images.Comparison of theoretical MSEs under various payloads for APPM and DE is shown in Table III.
When digits in 5-ary notational system are embedded i. e k=1, EMD, DE, APPM obtain same MSE because all of them share same neighborhood set. And, when k2, APPM and DEshare same neighborhood set and have same MSEs. But, when k>2, MSE of APPM is lower than DE. APPM is capable of embedding digits in any notational system while DE can embed digits only in (2k²+2k+1)-ary notational system. And so APPM can decrease distortion by choosing better notational system for embedding of data.
TABLE IV
MSE COMPARISON (payload=400000 bits)
Image
2 bit
LSB
2-bit
OPAP
DE
(k=2)
APPM
(9=3)
Boat
1.9643
1.1446
1.0789
0.6669
Lena
1.9091
1.1488
1.0748
0.6649
TABLE V
MSE COMPARISON (payload=650000 bits)
Image
3 bit
LSB
3-bit
OPAP
DE
(k=3)
APPM
(32=7)
Boat
8.6549
4.5396
2.8330
2.7127
Lena
8.6526
4.5413
2.8352
2.6961
Fig 6 shows MSE comparison of some PPM based data hiding methods for payload less than 2 bpp. It can be seen that MSE of APPM is always less than or equal to other PPM based methods. when digits in 4-ary notational system is embedded, MSE OF APPM and LSB Matching is the same. When digits are embedded in 13-ary notational system, APPM and DE have same MSE. However when we are using 16-ary APPM performs better than OPAP.
-
Comparison of Experimental Results
Twoimages Lena and Boat of size 512*512 are taken as test images to compare MSE obtained by LSB, OPAP, DE and APPM method. Payloads are set to 400000, 650000 and 1000000. Message bits are generated using pseudorandom number generator. Results are shown in Table IV-VI.
Table IV-VI shows that the proposed method is best under various payloads. For example with payload of 400 000 bits,
TABLE VI
MSE COMPARISON (payload=1000000 bits)
Image |
4 bit |
4-bit |
DE |
APPM |
LSB |
OPAP |
(k=10) |
(199=37 |
|
) |
||||
Boat |
39.6423 |
21.1726 |
20.5441 |
17.4966 |
Lena |
40.5510 |
20.4404 |
17.8132 |
16.3385 |
TABLE VII
MSE COMPARISON (payload=9000 00 bits)
Image |
2 bit LSB |
2-bit OPAP |
DE (k=2) |
APPM (9=3) |
Boat |
2.5690 |
1.5014 |
1.0810 |
0.6688 |
Lena |
2.4965 |
1.5001 |
1.0789 |
0.6682 |
TABLE VIII
MSE COMPARISON (payload=9000 00 bits)
Image |
3 bit LSB |
3-bit OPAP |
DE (k=3) |
APPM (32=) |
Boat |
10.5173 |
5.5049 |
2.8369 |
2.7352 |
Lena |
10.4665 |
5.5039 |
2.8467 |
2.7183 |
MSE of 2-bit OPAP is 1.1488 and that of DE is 1.0748. However, proposed method has smallest MSE i.e. 0.6649. For larger payloads also APPM performs better than LSB, OPAP and DE method.
Now, we are changing the payload of all the methods to a common payload i.e. 900000 bits. Results are shown in Table VII, VIII, and IX. Results reveal that even after changing the payloads MSE of proposed method gives best results compared to other methods.
As already explained previously we can also hide image inside a cover Image. we have taken cover image as Lena image and boat image of size 512*512 and image to be embedded is cameraman image of size 64*64.Results are shown in Table X, XI, XII.
TABLE IX
MSE COMPARISON (payload=9000 00 bits)
Image |
4 bit LSB |
4-bit |
DE |
APPM |
OPAP |
(k=10) |
(199=37 |
||
) |
||||
Boat |
35.6276 |
19.9493 |
18.5365 |
17.6584 |
Lena |
36.4398 |
18.4202 |
17.7895 |
16.3380 |
TABLE X
Image |
2 bit LSB |
2-bit OPAP |
DE (k=2) |
APPM (9=3) |
Boat |
0.1529 |
0.0928 |
0.0836 |
0.0626 |
Lena |
0.1497 |
0.0940 |
0.0835 |
0.0624 |
MSE COMPARISON
TABLE XI MSE COMPARISON
Image |
3 bit LSB |
3-bit OPAP |
DE (k=3) |
APPM (32=7) |
Boat |
0.4882 |
0.2572 |
0.1953 |
0.1678 |
Lena |
0.4743 |
0.2601 |
0.1944 |
0.1685 |
TABLE XII MSE COMPARISON
Image |
4 bit LSB |
4-bit |
DE |
APPM |
OPAP |
(k=10) |
(199=37 |
||
) |
||||
Boat |
1.2043 |
0.6654 |
0.5880 |
0.5202 |
Lena |
1.1688 |
0.6837 |
0.5739 |
0.5020 |
We can observe from Table X, XI, XII that even after embedding image inside cover image, MSE of APPM method shows better result compared to other methods.
Instead of using gray scale image as cover image we can also use RGB image as cover image. Experimental outputs are shown in table XIII, XIV, XV.Embedding is done in R-plane. Cover Image taken is ocean.bmp of size 512*768. Secret data to be embedded is bits.
TABLE XIII MSE COMPARISON
Image |
2 bit LSB |
2-bit OPAP |
DE (k=2) |
APPM (9=3) |
ocean |
0.3169 |
0.1835 |
0.1434 |
0.0603 |
TABLE XIV MSE COMPARISON
Image |
3 bit LSB |
3-bit OPAP |
DE (k=3) |
APPM (32=7) |
ocean |
0.8616 |
0.4469 |
0.1140 |
0.0894 |
TABLE XV MSE COMPARISON
Image |
4 bit LSB |
4-bit OPAP |
DE (k=10) |
APPM (199=37 ) |
ocean |
2.8603 |
1.3209 |
0.9759 |
0.5758 |
We can also go for video watermarking i.e. we can take video as cover and hide bits inside it. Experimental Results are shown in Table XVI, XVII, and XVIII. Input video taken is of form .avi.
Experimental results reveal that no matter what we hide, MSE of APPM method will be better than other methods because APPM selects smallest notational system that provides enough embedding capacity to accommodate given payload with least distortion.
TABLE XVI MSE COMPARISON
2 bit LSB |
2-bit OPAP |
DE (k=2) |
APPM (9=3) |
0.6158 |
0.3621 |
0.3574 |
0.2176 |
TABLE XVII MSE COMPARISON
3 bit LSB |
3-bit OPAP |
DE (k=3) |
APPM (32=7) |
1.6961 |
0.8940 |
0.6768 |
0.5301 |
TABLE XVIII MSE COMPARISON
4 bit LSB |
4-bit OPAP |
DE (k=10) |
APPM (199=37 ) |
5.2107 |
2.6241 |
2.5898 |
2.3174 |
V. CONCLUSION
This paper proposed a simple and efficient data embedding method based on PPM. Two pixels are scanned as an embedding unit and neighborhood set which is specially design is used to embed message digits with smallest notational system. APPM allows users to select digits in any notational system and achieves better image quality. The proposed method resolves low payload problems in EMD and also offers smaller MSE compared with OPAP and DE.
REFERENCES
-
J.Fridrich, Steganography in digital media: Principles, Algorithms, and Applications. Cambridge, U.K.: Cambridge Univ. Press, 2009.
-
N.Provos and P. Honeyman, Hide and Seek: An Introduction to Steganography IEEE security privacy, vol. 3, no. 3, pp. 32-44, May/June 2003.
-
A. Cheddad, J. Condell, K. Curran, and McKevitt, Digital Image Stenography: survey and analysis of current methods, single process. Vol. 90, pp. 727-752, 2010.
-
T. Filler, J. Judas and J. Fridrich, Minimizing embedding impact in Steganography using trellis coded quantization, inProc. SPIE, Media Forensics and Security, 2010, vol.7541, DOI:10.1117/12.838002.
-
S. Lyu and H.Farid, Steganalysis using higher-order image statistics, IEEE Trans. Inf. Forensics Security,vol .1, no. 1,pp. 111-119,Mar.2006.
-
J. Fridrich, M. Goljan and R. Du, Reliable detection of LSB Steganography in color and grayscale images, in Proc. Int. Workshop on Multimedia and security, 2001, pp. 27-30
-
A. D. Ker, Steganalysis of LSB Matching in grayscale images, IEEE Signal Process. Let. Vol. 12, no.6, pp. 441-444, jun. 2005.
-
C.K.Chan and L.M.Cheng, Hiding data in images by simple LSB Substitution,Pattern Recognit, 1.37, no 3, pp. 469-474, 2004.
-
J .Mielikainen, LSB matching revisited, IEEE Signal Process. Lett. Vol.13, no. 5, pp. 285-287, May 2006.
-
X. Zhang and S. Wang, Efficient stenographic embedding by EMD, IEEE Commun.Lett., vol.10, no.11, pp. 781-783, Nov.2006.
-
W. Hong, T .S.Chen, and C. W. Shiu, A minimal Euclidean distance Searching technique for Sudoku steganography, in Proc. Int.Symp.Information Science and Engineering,2008,vol.1,pp.515-
518.
-
R.M. Chao, H. C. Wu, C .C. Lee, and Y .P .Chu, A novel image data Hiding scheme with diamondencoding, EURASIP J .Inf. Security, vol 2009,2009,DOI:10.1155/2009/658047,Article ID 658047.
-
J.Wang, Y.Sun, H. Xu, K.chen,H.J Kim,and S.H.Joo, An improved Section-wise EMD method, Signal Process. Vol 90, no.11,pp .2954- 2964, 2010.
-
W. Zhang, X. Zhang, and S. Wang, A double layered plus-minus one Data embedding scheme, IEEE Signal Process .Lett. vol .14,no. 11,pp.
848-851, Nov 2007.
-
J. Fridrich, M. Goljan, P.Lisonek, and Soukal, Writing on wet paper, IEEE Trans.Signal Process.,vol, 53,no.10,pt.2,pp.3923-3935,oct 2005.
-
J. Fridrich and T. Filler, Practical methods for minimizing embedding Impact in steganography, in Proc. SPIE, Security, Steganography. Watermarking of Multimedia, 2007, vol, 6050, pp.2-3
-
J. Fridrich and D. Soukal, Matrix embedding for large payloads
,IEEE
Trans. Inf. Forensics Security, vol.1, no. 3, pp. 390-394, Sep.2006.
-
C.H.Yang, Inverted pattern approach to improve image quality of Information hiding by LSB substitution,Pattern Recognit., vol.41, no.8, Pp.2674-2683, 2008
-
T. Pevny, P .Bas, and J .Fridrich, Steganalysis by subtractive pixel Adjacency matrix ,IEEE Trans .Inf. Forensics Security, vol. 5, no. 2, pp. 215-224, Jun.2010
-
H. Zhao,H .Wang, and M .K .Khan, Statistical analysis of several Reversible data hiding algorithms, in Proc.Multimedia Tools and
Applications,2009,DOI:10.1007/s11042-009-0380-y.