﻿ 基于像素差和索引函数的信息隐藏算法

# 基于像素差和索引函数的信息隐藏算法An Information Hiding Algorithm Based on Pixel Di?erence and Index Function

Abstract: In the 2 × 2 pixel block, reference pixel values was randomly determined by the index function, And we calculated the pixel value difference between reference pixel value and the other three pixel value around it. The number of secret data was embedded according to the range of pixel value difference. Using complementary function embedded secret information to effectively re-duce the load of image distortion degree. In the process of extracting information, the quantitative pixel values can accurately extract the secret information. Our proposed method improves the Jung and Yoo information hiding algorithm based on index function, and the proposed algorithm has more security.

[1] Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J. and Kalker, T. (2008) Digital Watermarking and Steganography. 2nd Edition. Morgan Kaufmann, San Francisco.

[2] Hsu, C.S. and Tu, S.F. (2010) Probability-Based Tampering Detection Scheme for Digital Images. Optics Communications, 283, 1737-1743.
https://doi.org/10.1016/j.optcom.2009.12.073

[3] Hong, W., Chen, T.S. and Shiu, C.W. (2009) Reversible Data Hiding for High Quality Images Using Modification of Prediction Errors. Journal of systems and Software, 82, 1833-1842.
https://doi.org/10.1016/j.jss.2009.05.051

[4] Provos, N. and Honyman, P. (2003) Hide and Seek: An Introduction To Steganography. IEEE Security and Privacy Magazine, 1, 32-44.
https://doi.org/10.1109/MSECP.2003.1203220

[5] Xu, H., Wang, J. and Kim, H.J. (2010) Near-Optimal Solution to Pair-Wise LSB Matching via An Immune Programming Strategy. Information Sciences, 180, 1201-1217.
https://doi.org/10.1016/j.ins.2009.12.027

[6] Wu, D.C. and Tsai, W.H. (2003) A Steganographic Method for Images by Pixel-Value Differencing. Pattern Recognition Letters, 24, 1613-1626.
https://doi.org/10.1016/S0167-8655(02)00402-6

[7] Wang, C.M., Wu, N.I., Tsai, C.S. and Hwang, M.S. (2008) A High Quality Steganographic Method with Pixel-Value Differencing and Modulus Function. Journal of Systems and Software, 81, 150-158.
https://doi.org/10.1016/j.jss.2007.01.049

[8] Joo, J.C., Lee, H.Y. and Lee, H.K. (2010) Improved Steganographic Method Preserving Pixel-Value Differencing Histogram With Modulus Function. EURASIP Journal on advances in signal processing, 1, 1-13.

[9] Luo, W., Huang, F. and Huang, J. (2010) Edge Adaptive Image Steganography Based on LSB Matching Revisited. IEEE Transactions on Information Forensics and Security, 5, 201-214.
https://doi.org/10.1109/TIFS.2010.2041812

[10] Yang, C.H., Weng, C.Y., Wang, S.J. and Sun, H.M. (2008) Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems. IEEE Transactions on Information Forensics and Security, 3, 488-497.
https://doi.org/10.1109/TIFS.2008.926097

[11] Luo, D.C., Wu, N.I., Wang, C.M., Lin, Z.H. and Tsai, C.S. (2010) A Novel Adaptive Steganography Based on Local Complexity and Human Vision Sensitivity. Journal of Systems and Software, 83, 1236-1248.
https://doi.org/10.1016/j.jss.2010.01.050

[12] Chang, K.C., Huang, P.S., Tu, T.M. and Chang, C.P. (2007) Adaptive Image Stegannographic Scheme Based on Tri-Way Pixel-Value Differencing. ISIC IEEE Internation Conference, 1165-1170.

[13] Jung, K.H., Ha, K.J. and Yoo, K.Y. (2008) Image Data Hiding Method Based on Multi-Pixel Differencing and LSB Substitution Methods. International Conference on Convergence and Hybrid Information Technoligy, 355-358.
https://doi.org/10.1109/ICHIT.2008.279

[14] Balasubramanian, C., Selvakumar, S. and Geetha, S. (2014) High Payload Image Steganography with Reduced Distortion Using Octonary Pixel Pairing Scheme. Multimedia Tools and Applications, 73, 2223-2245.
https://doi.org/10.1007/s11042-013-1640-4

[15] Jung, K.H. and Yoo, K.Y. (2014) High-Capacity Index Based Data Hiding Method. Multimedia Tools and Applications.

[16] Lee, C.F., Chen, H.L. and Tso, H.K. (2010) Embedding Capacity Raising in Reversible Data Hiding Based on Prediction of Difference Expansion. Journal of Systems and Software, 83, 1864-1872.
https://doi.org/10.1016/j.jss.2010.05.078

[17] Zeng, X.T., Li, Z. and Ping, L.D. (2012) Reversible Data Hiding Scheme Using Reference Pixel and Multilayer Embedding. AEU International Journal of Electronics Communication, 66, 532-539.
https://doi.org/10.1016/j.aeue.2011.11.004

[18] Hong, W. (2013) Adaptive Image Data Hiding in Edges Using Patched Reference Table and Pair-Wise Embedding Technique. Information Sciences, 221, 473-489.
https://doi.org/10.1016/j.ins.2012.09.013

[19] Wang, Z. and Bovik, A.C. (2002) A Universal Image Quality Index. IEEE Signal Processing Letters, 9, 81-84.
https://doi.org/10.1109/97.995823

[20] Fridrich, J., Goljan, M. and Du, R. (2001) Reliable Detection of LSB Steganography in Grayscale and Color Images. Proceedings of ACM Workshop on Multimedia and Security, 27-30.
https://doi.org/10.1145/1232454.1232466

[21] Zhang, X.P. and Wang, S.Z. (2004) Vulnerability of Pixel-Value Differencing Steganography to Histogram Analyais and Modification for Enhanced Security. Pattern Recognition Letters, 331-339.
https://doi.org/10.1016/j.patrec.2003.10.014

[22] Yang, C.H., Wang, C.Y. and Sun, H.M. (2008) Information Hiding Technique Based on Blocked PVD. Journal of Inforamtion Management, 15, 29-48.

Top