CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Image Steganography using Inverse Embedding Reversible Data Hiding Scheme

Published on March 2012 by Subodh Karve, Vipul Dalal
International Conference and Workshop on Emerging Trends in Technology
Foundation of Computer Science USA
ICWET2012 - Number 2
March 2012
Authors: Subodh Karve, Vipul Dalal
68a71903-f43a-4f12-ac9a-06874010039e

Subodh Karve, Vipul Dalal . Image Steganography using Inverse Embedding Reversible Data Hiding Scheme. International Conference and Workshop on Emerging Trends in Technology. ICWET2012, 2 (March 2012), 35-39.

@article{
author = { Subodh Karve, Vipul Dalal },
title = { Image Steganography using Inverse Embedding Reversible Data Hiding Scheme },
journal = { International Conference and Workshop on Emerging Trends in Technology },
issue_date = { March 2012 },
volume = { ICWET2012 },
number = { 2 },
month = { March },
year = { 2012 },
issn = 0975-8887,
pages = { 35-39 },
numpages = 5,
url = { /proceedings/icwet2012/number2/5324-1015/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference and Workshop on Emerging Trends in Technology
%A Subodh Karve
%A Vipul Dalal
%T Image Steganography using Inverse Embedding Reversible Data Hiding Scheme
%J International Conference and Workshop on Emerging Trends in Technology
%@ 0975-8887
%V ICWET2012
%N 2
%P 35-39
%D 2012
%I International Journal of Computer Applications
Abstract

Image steganography is a technology that communicates the secret data by the carrier image. A quality data hiding scheme should hide huge secret data in the carrier without demeaning the quality of the carrier. This paper, discusses a high hiding capacity reversible data hiding scheme with low distortion. It incorporates double-embedding strategy projected for storing secret data in carrier. The proposed scheme uses the inverse embedding method in thesecond embedding strategy to increase the hiding capacity and decrease the distortion at the same time for all type of images. The experimental results demonstrate that the proposed scheme performs well for embedding secret data into color image as well as gray scale images with desired characteristics of high hiding capacity and good stego image quality.

References
  1. W. Zeng, “Digital watermarking and data hiding: technologies and applications,”in Proc. Int. Conf. Inf. Syst., Anal. Synth., vol. 3, 1998, pp.223–229.
  2. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673–1687, Dec. 1997.
  3. A. Z. Tirkel, C. F. Osborne, and R. G. Van Schyndel, “Image watermarking- a spread spectrum application,” in Proc. IEEE 4th Int. Symp. Spread Spectrum Techn. Applicat., vol. 2, Sep. 1996, pp. 785–789.
  4. J. Huang and Y. Q. Shi, “An adaptive image watermarking scheme based on visual masking,” Electron. Lett., vol. 34, no. 8, pp. 748–750, 1998.
  5. J. Huang, Y. Q. Shi, and Y. Shi, “Embedding image watermarks in DC component,” IEEE Trans. Circuits Syst.: Video Technol., vol. 10, no. 6, pp. 974–979, Sep. 2000.
  6. J. Irvine and D. Harle, Data Communications and Networks: An Engineering Approach. New York: Wiley, 2002.
  7. M. M. Yeung and F. C. Mintzer, “Invisible watermarking for image verification,” Electron. Imag., vol. 7, no. 3, pp. 578–591, Jul. 1998.
  8. B. Chen and G. W. Wornell, “Quantization index modulation: a class of provably good methods for digital watermarking and information embedding,” IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423–1443, May 2001.
  9. F. Perez-Gonzlez and F. Balado, “Quantized projection data hiding,” in Proc. IEEE Int. Conf. Image Process., vol. 2, Sep. 2002, pp. 889–892.
  10. M. Awrangjeb, “An overview of reversible data hiding,” in Proceedings of International Conference on Computer and Information Technology, 2003, pp. 75-79.
  11. Y. Q. Shi, Z. Ni, D. Zou, C. Liang, and G. Xuan, “Lossless data hiding: fundamentals, algorithms and applications,” in Proceedings of IEEE International Symposium on Circuits and Systems, Vol. II, 2004, pp. 33-36.
  12. A. M. Alattar. Reversible watermark using the difference expansionof a generalized integer transform. IEEE Transactions on Image Processing, 13(8):1147–1156, 2004.
  13. M. U. Celik, G. Sharma, a. Murat Tekalp, and E. Saber. Reversibledata hiding. Proceedings of the International Conferenceon Image Processing, II:157–160, 2002.
  14. J. Feng, I. Lin, C. Tsai, and Y. Chu. Reversible watermarking:Current status and key issues. International Journal ofNetwork Security, 2(3):253–266, 2006.
  15. J. Fridrich, M. Goljan, and R. Du. Lossless data embedding – new paradigm in digital watermarking. EURASIP Journal on Applied signal Processing, 2002(2):185–196, February 2002.
  16. I. J.Cox, M. L.Miller, J. A.Bloom, J. Fridrich, and T. Kalker. Digital Watermarking and Steganography. Morgan Kaufmann Publishers, MA, 2007.
  17. D. Kieu and C.-C. Chang. A high stego-image qualitysteganographic scheme with reversibility and high payloadusing multiple embedding strategy. Journal of System andSoftware, 82(10):1743–1752, October 2009.
  18. Z. Ni, Y. Shi, N. Ansari, and W. Su. Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology,16(3):354–361, 2006.
  19. W. Stallings. Cryptography and Network Security: Principlesand Practice. Pearson Education, New Jersey, 2003.
  20. J. Tian. Reversible data embedding using a difference expansion.IEEE Transactions on Circuits and Systems for VideoTechnology, 13(8):890–896, August 2003.
  21. Lin Jia and Kee-Young Yoo.” A reversible data hiding scheme using inverse embedding methods indouble-embedding strategies”
Index Terms

Computer Science
Information Sciences

Keywords

Double embedding PSNR MSE