×

Improved modification direction methods. (English) Zbl 1198.94029

Summary: The original exploiting modification direction (EMD) method proposed by Zhang and Wang is a novel data hiding technique which can achieve large embedding capacity with less distortion. The original EMD method can hide (\(2n+1\))-ary numbers by modifying at most one least-significant bit (LSB) of \(n\) pixel values. The proposed methods in this paper, 2-EMD and EMD-2, modify at most two pixels of the LSB values. Efficiency of the proposed methods is shown theoretically and through experiments. The 2-EMD and EMD-2 can hide even larger numbers than the EMD with similar distortion under the same conditions. This paper shows that the EMD-2 is much better than the EMD, and slightly better than 2-EMD when \(n\) is 3, 4 and 5. The way to generate basis vector can be used for the generalization of the \(n\)-EMD and EMD-\(n\) where \(n>1\).

MSC:

94A08 Image processing (compression, reconstruction, etc.) in information and communication theory
94A60 Cryptography
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Westfeld, A.; Pfitzmann, A., Attacks on steganographic systems, Lecture Notes in Computer Science, 1768, 61-76 (1999)
[2] Tseng, Y.-C.; Chen, Y.-Y.; Pan, H.-K., A secure data hiding scheme for binary images, IEEE Transactions on Communications, 50, 8, 1227-1231 (2002)
[3] Westfeld, A., F5: A steganographic algorithm, Lecture Notes in Computer Science, 2137, 289-302 (2001) · Zbl 1010.68745
[4] Kim, Y.; Duric, Z.; Richards, D., Modified matrix encoding technique for minimal distortion steganography, Lecture Notes in Computer Science, 4437, 167-176 (2008)
[5] Zhang, X.; Wang, S., Efficient steganographic embedding by exploiting modification direction, IEEE Communications Letters, 10, 11, 781-783 (2006)
[6] Lee, C.-F.; Chang, C.-C.; Wang, K.-H., An improvement of EMD embedding method for large payloads by pixel segmentation strategy, Image and Vision Computing, 26, 12, 1670-1676 (2008)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.