10.07.2015 Views

A more secure steganography based on adaptive pixel-value ...

A more secure steganography based on adaptive pixel-value ...

A more secure steganography based on adaptive pixel-value ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Multimed Tools ApplIf gi ′ or gi+1 ′ is out of the range [0,255], then the candidate embedding unit ismarked as aband<strong>on</strong>ed <strong>on</strong>e. Note that such unused units are few in most naturalimages and are very easy to detect.It can be proven that the new absolute difference |d ′ |=|gi+1 ′ − g′ i| in the stegoimage will fall into the same regi<strong>on</strong> R k as the difference |d| =|g i+1 − g i | in thecover image. So in data extracti<strong>on</strong>, if |d ′ |∈R k , the embedded <strong>value</strong> can be extractedcorrectly by b =|d ′ |−l k .In [25], the authors shows that a fixed regi<strong>on</strong> R i employed in the original PVDscheme (Step 2) will introduce some unusual steps in the histogram of <strong>pixel</strong> <strong>value</strong>differences (PVD histogram) for all the embedding units, which can be used toexpose the presence of hidden message and further to estimate the size of hiddenbits. To make the <str<strong>on</strong>g>steganography</str<strong>on</strong>g> immune to PVD histogram <str<strong>on</strong>g>based</str<strong>on</strong>g> analysis, theauthors employ random regi<strong>on</strong>s instead of the fixed regi<strong>on</strong>s when data hiding. Theexperimental results in [25] show that the new approach can effectively eliminatethose undesired steps.To improve the embedding capacity, a new PVD-<str<strong>on</strong>g>based</str<strong>on</strong>g> <str<strong>on</strong>g>steganography</str<strong>on</strong>g> combinedwith LSB technique is proposed by Wu et al. [23]. In this method, Steps 1 and 2 arethe same as it did in the original PVD scheme. After that, if R k bel<strong>on</strong>gs to higherlevel, namely |d| > 15, then embeds secret bits using the original method. Otherwiseif |d| bel<strong>on</strong>gs to lower level, namely |d| ≤15, embeds three bits into g i and g i+1 using3-LSB replacement, respectively. Assume that the <strong>pixel</strong> <strong>value</strong>s after data hiding aredenoted as gi ′ and g′ i+1 ,thencalculate|d′ |=|gi+1 ′ − g′ i |, if the new difference |d′ | is notbel<strong>on</strong>gs to lower level, then readjust them by(g′i , g ′ i+1)={ (gi − 8, g i+1 + 8 ) g ′ i ≥ g′ i+1(gi + 8, g i+1 − 8 ) g ′ i < g′ i+1In a latest work [24], it divides the <strong>pixel</strong> differences into three levels: lowerlevel,middle-level and high-level. Similar to Wu’s approach [23], k secret bits areembedded into g i and g i+1 , respectively, where k = l, m, h, if|d| bel<strong>on</strong>gs to lowerlevel,middle-level and high-level, respectively. After that the method applies themodified LSB approach [1, 5] to the resulting <strong>pixel</strong>s pair and gets the new <strong>pixel</strong> pair(gi ′, g′ i+1 ). If the new difference |d′ |=|gi+1 ′ − g′ i| bel<strong>on</strong>gs to different levels, readjustthem into the following forms:(g′i , g i+1 ′ ± 2k) (or g′i ± 2 k , g i+1)′Finally selects the better choice of the new <strong>value</strong>s gi ′, g′ i+1which satisfies thec<strong>on</strong>diti<strong>on</strong>s that the new difference |d ′ | and the original <strong>on</strong>e bel<strong>on</strong>g to the samelevel and the <strong>value</strong> of |gi ′ − g i|+|gi+1 ′ − g i+1| is the smallest am<strong>on</strong>g the candidates.Compared with [23], the new method can provide stego image with larger embeddingcapacity as well as higher objective quality.2.2 Properties of PVD-<str<strong>on</strong>g>based</str<strong>on</strong>g> <str<strong>on</strong>g>steganography</str<strong>on</strong>g>As described in Subsecti<strong>on</strong> 2.1, the main idea of the existing PVD-<str<strong>on</strong>g>based</str<strong>on</strong>g> approachesis that they first divide a cover image into n<strong>on</strong>-overlapping embedding units withtwo c<strong>on</strong>secutive <strong>pixel</strong>s in a raster scanning manner, and then deal with the embeddingunits separately in a pseudo-random order. For a given embedding unit, the

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!