SciELO - Scientific Electronic Library Online

 
vol.11 número2Adjacent Lane Detection and Lateral Vehicle Distance Measurement Using Vision-Based Neuro-Fuzzy ApproachesEnhanced Mechanisms for Navigation and Tracking Services in Smart Phones índice de autoresíndice de assuntospesquisa de artigos
Home Pagelista alfabética de periódicos  

Serviços Personalizados

Journal

Artigo

Indicadores

Links relacionados

  • Não possue artigos similaresSimilares em SciELO

Compartilhar


Journal of applied research and technology

versão On-line ISSN 2448-6736versão impressa ISSN 1665-6423

J. appl. res. technol vol.11 no.2 Ciudad de México Abr. 2013

 

A Blind Data Hiding Technique with Error Correction Abilities and a High Embedding Payload

 

H. Y. Liang1, C. H. Cheng*2, C. Y. Yang3, K. F. Zhang4

 

1 Department of Information and Communication Engineering Chaoyang University of Technology Taichung, 4139, Taiwan.

2 Department of Electrical Engineering National Formosa University Yunlin, 632, Taiwan. *chcheng@nfu.edu.tw.

3 Department of Computer Science Taipei Municipal University of Education Taipei, 10042, Taiwan.

4 Department of Information and Communication Engineering Chaoyang University of Technology Taichung, 4139, Taiwan.

 

ABSTRACT

Least significant bit (LSB) embedding is a simple steganographic technique used in the spatial domain that involves replacing the LSB of each pixel in the cover work with the information bits being hidden to achieve information secrecy. However, considering the current prevalence of information theft and sabotage, the stego image produced using LSB embedding cannot prevent malicious illegal acts. Therefore, this study proposes a blind data hiding technique that combines block-coded modulation (BCM) codes with LSB embedding. The proposed method not only provides error correction capabilities to prevent errors during the extraction process, but also has a superior embedding payload. The peak signal noise ratio (PSNR) exceeds 40 dB by using our proposed method. Regarding the simulation results, the proposed method provides a superior PSNR compared to LSB embedding and a higher embedding payload than that offered by other steganographic techniques with error correction capabilities.

Keywords: Least significant bit embedding, data hiding, block-coded modulation codes, Reed-Muller codes.

 

DESCARGAR ARTÍCULO EN FORMATO PDF

 

Acknowledgements

This work was supported in part by the National Science Council (NSC) of Republic of China under grant NSC 101-2221-E-324-026 and NSC 101-2221-E-150-059.

 

References

[1] F. Hartung and M. Kutter, "Multimedia Watermark-ing Techniques," Proceedings of the IEEE, vol. 87, no. 7, pp. 1079-1107, 1999.         [ Links ]

[2] G. C. Langelaar, et al., "Watermarking digital image and video data. A state-of-the-art overview," IEEE Signal Processing Magazine, vol. 17, no.5, pp. 20-46, 2000.         [ Links ]

[3] S. C Nirmal and B. Parthasarathy, "An Innovative Fusion Technique for Secured Video Watermark-ing," International Journal of Engineering and Innovative Technology, vol. 2, no. 2, pp. 20-22, 2012.         [ Links ]

[4] S. Anand, et al., "Digital Watermarking," International Journal of Engineering and Innovative Technology, vol. 2, no. 2, pp. 151-155, 2012.         [ Links ]

[5] C. C. Ramos, et al., "A Blind Video Watermarking Scheme Robust To Frame Attacks Combined With MPEG2 Compression," Journal of Applied Research and Technology, vol.8, no. 3, pp. 323-339, 2010.         [ Links ]

[6] H. C. Wu, et al., "Image steganographic scheme based on pixel-value differencing and LSB replacement methods," IEE Proceedings Vision, Image and Signal Processing, vol. 152, no. 5, pp. 611-615, 2005.         [ Links ]

[7] A. D. Ker, "Steganalysis of LSB matching in grayscale images," IEEE Signal Processing Letters, vol. 12, no.6, pp. 441-444, 2005.         [ Links ]

[8] P. R. Rudramath and M. R. Madki, "Improved BPCS Steganography Based Novel Approach for Data Embedding," International Journal of Engineering and Innovative Technology, vol. 1, no.3, pp. 156-159, 2012.         [ Links ]

[9] P. V Bodhak and B. L Gunjal, "Improved Protection In Video Steganography Using DCT & LSB," International Journal of Engineering and Innovative Technology, vol. 1, no. 4, pp. 31-37, 2012.         [ Links ]

[10] C. C. Chang, et al., "A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images," International Symposium on Electronic Commerce and Security, Guangzhou, China, 2008, pp. 16-21.         [ Links ]

[11] C. C. Thien and J. C. Lin, "A Simple and High-hiding Capacity Method for Hiding Digit-by-digit Data in Images Based on Modulus Function," Pattern Recognition, vol. 36, no. 12, pp. 2875-2881, 2003.         [ Links ]

[12] S. Lin and D. J. Costello, "Error Control Coding: Fundamentals and Applications", Englewood Cliffs, NJ: Prentice-Hall, 2004, pp. 1063-1074.         [ Links ]

[13] G. Pok, J. Liu, and A. S. Nair, "Selective removal of impulse noise based on homogeneity level information," IEEE Transactions on Image Processing, vol. 12, no. 1, pp. 85-92, 2003.         [ Links ]

Creative Commons License Todo o conteúdo deste periódico, exceto onde está identificado, está licenciado sob uma Licença Creative Commons