An improved algorithm for data hiding in compressed digital images based on PM1 method
O.O. Evsutin, A.S. Kokurina, A.A. Shelupanov, I.I. Shepelev

 

Tomsk State University of Control Systems and Radioelectronics

Full text of article: Russian language.

 PDF

Abstract:
In this paper a novel algorithm of information embedding in JPEG images based on the known steganography method «plus minus 1» is proposed and researched. It is shown that the cover image partial filling allows the algorithm to surpass its counterparts due to an original approach to the determination of the DCT coefficients traverse order for message bits embedding. The peak signal-to-noise ratio is used as a quality metric.

Keywords:
information security, steganography, data hiding, digital images, JPEG.

Citation:
Evsutin OO, Kokurina AS, Shelupanov AA, Shepelev II. An improved algorithm for data hiding in compressed digital images based on PM1 method. Computer Optics 2015; 39(4): 572-81. DOI: 10.18287/0134-2452-2015-39-4-572-581.

References:

  1. Gribunin VG, Okov IN, Turincev IV. Digital steganography [in Russian]. Moscow: SOLON-PRESS; 2009.
  2. Salomon D. Data compression: the complete reference, 4th Edition. London: Springer–Verlag; 2007.
  3. Yu L, Zhao Y, Ni R, Zhu Z. PM1 steganography in JPEG images using genetic algorithm. Soft Computing 2009; 13(4): 393-400.
  4. Fridrich J. Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge: Cambridge University Press; 2010.
  5. Nikolaidis A. Low overhead reversible data hiding for color JPEG images. Multimedia Tools And Applications 2014: 1-13.
  6. Huang F, Huang J, Shi YQ. New channel selection rule for JPEG steganography. IEEE Transactions on Information Forensics and Security 2012; 7(4): 1181-91.
  7. Li F, Zhang X, Yu J, Shen W. Adaptive JPEG steganography with new distortion function. Annals of Telecommunications 2014; 69(7-8): 431-40.
  8. Almohammad A, Hierons RM, Ghinea G. High capacity steganographic method based upon JPEG. Proceedings of the 3-th International Conference on Availability, Reliability and Security (ARES 2008). Spain, Barcelona. 2008: 544-9.
  9. Vongurai N, Phimoltares S. Frequency-based steganography using 32×32 interpolated quantization table and Discrete Cosine Transform. Proceedings of the 5-th International Conference on Computational Intelligence, Modelling and Simulation (CIMSiM). Malaysia, Kuantan. 2012: 249-53.
  10. Wang K, Lu ZM, Hu YJ. A high capacity lossless data hiding scheme for JPEG images. The Journal of Systems and Software 2013; 86(7): 1965-75.
  11. Velasco C, Nakano M, Perez H, Martinez R, Yamaguchi K. Adaptive JPEG steganography using convolutional codes and synchronization bits in DCT domain. Proceedings of the 52-nd IEEE International Midwest Symposium on Circuits and Systems (MWSCAS ‘09). Mexico, Cancun. 2009: 842-7.
  12. Chen B, Wornell GW. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory 2001; 47(4): 1423-43.
  13. Glumov NI, Mitekin VS. A new semi-fragile watermarking algorithm for image authentication and information hiding [In Russian]. Computer Optics 2011; 35(2): 262-7.
  14. Glumov NI, Mitekin VS. The algorithm for large-scale images robust watermarking using blockwise [In Russian]. Computer Optics 2011; 35(3): 368-72.
  15. Verichev AV, Fedoseev VA. Digital image watermarking on triange grid of feature points. Computer Optics 2014; 38(3): 555-63.
  16. Zhao J, Koch E. Embedding robust labels into images for copyright protection. Proceedings of the International Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies (KnowRight'95). Austria, Vienna. 1995: 242-51.
  17. Burgett S, Koch E, Zhao J. Copyright labeling of digitized image data. IEEE Communications Magazine 1998; 36(3): 94-100.
  18. Holliman M, Memon N, Yeo BL, Yeung M. Adaptive public watermarking of DCT-based compressed images. Proceedings of SPIE – The International Society for Optical Engineering 1998; 3312: 284-95.
  19. Fujimura M, Takano T, Baba S, Kuroda H. New data hiding scheme using method of embedding two bits data into two DCT coefficients. Proceedings of the International Conferences on Signal Processing, Image Processing and Pattern Recognition (SIP 2010) and Multimedia, Computer Graphics and Broadcasting (MulGraB 2010). Koream Jeju Island. 2010: 156-64.
  20. Chen B. Recursive code construction for reversible data hiding in DCT domain. Multimedia Tools and Applications 2013; 72(2): 1985-2009.
  21. Xuan G, Shi YQ, Ni Z, Chai P, Cui X, Tong X. Reversible data hiding for JPEG images based on histogram pairs. Proceedings of the International Conference on Image Analysis and Recognition (ICIAR 2007). Canada, Montreal. 2007: 715-27.
  22. Sakai H, Kuribayashi M, Morii M. Adaptive Reversible Data Hiding for JPEG Images. Proceedings of the International Symposium on Information Theory and its Applications (ISITA2008). New Zealand, Auckland. 2008: 1-6.
  23. SIPI Image Database. Source: <http://sipi.usc.edu/data­base/>.
  24. Krainov AY, Mescheryakov RV, Shelupanov AA. Reliability model of informaion transmission in protected distributed telecommunication network [In Russian]. Bulletin of the Tomsk Polytechnic University 2008; 313(2): 60-3.
  25. Iskhakov SY, Shelupanov AA, Meshcheryakov RV, Belyakov KO, Shirshin VA, Shum AL, Saryan VK. Hybrid system of embedding of interactive services in digital television stream [In Russian]. Telecommunications 2015; 1: 11-9.

© 2009, IPSI RAS
151, Molodogvardeiskaya str., Samara, 443001, Russia; E-mail:journal@computeroptics.ru; Tel: +7 (846) 242-41-24 (Executive secretary), +7 (846) 332-56-22 (Issuing editor), Fax: +7 (846) 332-56-20