Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Image Steganography using Inverse Embedding Reversible Data Hiding Scheme

Print
PDF
IJCA Proceedings on International Conference and workshop on Emerging Trends in Technology (ICWET 2012)
© 2012 by IJCA Journal
icwet2012 - Number 2
Year of Publication: 2012
Authors:
Subodh Karve
Vipul Dalal

Subodh Karve and Vipul Dalal. Article: Image Steganography using Inverse Embedding Reversible Data Hiding Scheme. IJCA Proceedings on International Conference and workshop on Emerging Trends in Technology (ICWET 2012) icwet(2):35-39, March 2012. Full text available. BibTeX

@article{key:article,
	author = {Subodh Karve and Vipul Dalal},
	title = {Article: Image Steganography using Inverse Embedding Reversible Data Hiding Scheme},
	journal = {IJCA Proceedings on International Conference and workshop on Emerging Trends in Technology (ICWET 2012)},
	year = {2012},
	volume = {icwet},
	number = {2},
	pages = {35-39},
	month = {March},
	note = {Full text available}
}

Abstract

Image steganography is a technology that communicates the secret data by the carrier image. A quality data hiding scheme should hide huge secret data in the carrier without demeaning the quality of the carrier. This paper, discusses a high hiding capacity reversible data hiding scheme with low distortion. It incorporates double-embedding strategy projected for storing secret data in carrier. The proposed scheme uses the inverse embedding method in thesecond embedding strategy to increase the hiding capacity and decrease the distortion at the same time for all type of images. The experimental results demonstrate that the proposed scheme performs well for embedding secret data into color image as well as gray scale images with desired characteristics of high hiding capacity and good stego image quality.

References

  • W. Zeng, “Digital watermarking and data hiding: technologies and applications,”in Proc. Int. Conf. Inf. Syst., Anal. Synth., vol. 3, 1998, pp.223–229.
  • J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673–1687, Dec. 1997.
  • A. Z. Tirkel, C. F. Osborne, and R. G. Van Schyndel, “Image watermarking- a spread spectrum application,” in Proc. IEEE 4th Int. Symp. Spread Spectrum Techn. Applicat., vol. 2, Sep. 1996, pp. 785–789.
  • J. Huang and Y. Q. Shi, “An adaptive image watermarking scheme based on visual masking,” Electron. Lett., vol. 34, no. 8, pp. 748–750, 1998.
  • J. Huang, Y. Q. Shi, and Y. Shi, “Embedding image watermarks in DC component,” IEEE Trans. Circuits Syst.: Video Technol., vol. 10, no. 6, pp. 974–979, Sep. 2000.
  • J. Irvine and D. Harle, Data Communications and Networks: An Engineering Approach. New York: Wiley, 2002.
  • M. M. Yeung and F. C. Mintzer, “Invisible watermarking for image verification,” Electron. Imag., vol. 7, no. 3, pp. 578–591, Jul. 1998.
  • B. Chen and G. W. Wornell, “Quantization index modulation: a class of provably good methods for digital watermarking and information embedding,” IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423–1443, May 2001.
  • F. Perez-Gonzlez and F. Balado, “Quantized projection data hiding,” in Proc. IEEE Int. Conf. Image Process., vol. 2, Sep. 2002, pp. 889–892.
  • M. Awrangjeb, “An overview of reversible data hiding,” in Proceedings of International Conference on Computer and Information Technology, 2003, pp. 75-79.
  • Y. Q. Shi, Z. Ni, D. Zou, C. Liang, and G. Xuan, “Lossless data hiding: fundamentals, algorithms and applications,” in Proceedings of IEEE International Symposium on Circuits and Systems, Vol. II, 2004, pp. 33-36.
  • A. M. Alattar. Reversible watermark using the difference expansionof a generalized integer transform. IEEE Transactions on Image Processing, 13(8):1147–1156, 2004.
  • M. U. Celik, G. Sharma, a. Murat Tekalp, and E. Saber. Reversibledata hiding. Proceedings of the International Conferenceon Image Processing, II:157–160, 2002.
  • J. Feng, I. Lin, C. Tsai, and Y. Chu. Reversible watermarking:Current status and key issues. International Journal ofNetwork Security, 2(3):253–266, 2006.
  • J. Fridrich, M. Goljan, and R. Du. Lossless data embedding – new paradigm in digital watermarking. EURASIP Journal on Applied signal Processing, 2002(2):185–196, February 2002.
  • I. J.Cox, M. L.Miller, J. A.Bloom, J. Fridrich, and T. Kalker. Digital Watermarking and Steganography. Morgan Kaufmann Publishers, MA, 2007.
  • D. Kieu and C.-C. Chang. A high stego-image qualitysteganographic scheme with reversibility and high payloadusing multiple embedding strategy. Journal of System andSoftware, 82(10):1743–1752, October 2009.
  • Z. Ni, Y. Shi, N. Ansari, and W. Su. Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology,16(3):354–361, 2006.
  • W. Stallings. Cryptography and Network Security: Principlesand Practice. Pearson Education, New Jersey, 2003.
  • J. Tian. Reversible data embedding using a difference expansion.IEEE Transactions on Circuits and Systems for VideoTechnology, 13(8):890–896, August 2003.
  • Lin Jia and Kee-Young Yoo.” A reversible data hiding scheme using inverse embedding methods indouble-embedding strategies”