BLOCK BASED DATA HIDING METHOD FOR IMAGES

In this article, a new block based data hiding method is presented. The proposed data hiding method uses non-overlapping blocks and this method consists of block type determination, data hiding and data extraction functions. The most significant bit of the secret data determines the block type. If the most significant bit of the secret data is 1, the block type is the odd, otherwise the block type is even. The other bits of secret data determine index of abnormal pixel. We use ±1 operator to set abnormal pixel and pre-processing in this paper. To extract secret data, we use index of abnormal pixel and block type. Capacity, execution time and visual quality parameters are used for measuring performance of the proposed method. Experimental results show that the proposed method is a successful data hiding method and that the proposed data hiding method can be used in methods such as image authentication, fragile watermarking etc.

___

  • [1] Ma, X., Pan, Z., Hu, S., Wang, L., Reversible data hiding scheme for VQ indices based on modified locally adaptive coding and double-layer embedding strategy, J. Vis. Commun. Image R., (2015), 28, 60–70.
  • [2] Furon, T., A survey of watermarking security, International workshop on digital watermarking, Lecture notes on computer science, (2005), Vol. 3710, Springer, 201–215.
  • [3] Fridrich, J., Steganography in digital media: Principles, algorithms, and applications, Cambridge University Press, 2005.
  • [4] Yang, C.H., Lin, Y.C., Fractal curves to improve the reversible data embedding for VQ-indexes based on locally adaptive coding, J. Vis. Commun. Image Represent. , (2010), 21 (4), 334–342..
  • [5] Bhat, V., Sengupta, I., Das, A., An adaptive audio watermarking based on the singular value decomposition in the wavelet domain, Digital Signal Processing, (2010), 20, 1547–155.
  • [6] Daemen, J., Rijmen, V., The Design of Rijndael: AES-the Advanced Encryption Standard, Springer, 2002.
  • [7] Said, A., Pearlman, W.A., A new, fast, and efficient image codec based on set partitioning in hierarchical trees, IEEE Trans Circuits Syst Video Technol, (1996), 6, 243–250.
  • [8] Shropshire, J., Warkentin, M., Sharma, S., Personality, attitudes, and intentions: Predicting initial adoption of information security behavior, Computers & Security, (2015), Volume 49, 177-191.
  • [9] Dogan, S., A reversible data hiding scheme based on graph neigbourhood degree, Journal of Experimental & Theoretical Artifical Intelligence, (2017), 29 (4), 741-753.
  • [10] Chen, B., Design and analysis of digital watermarking, information embedding, and data hiding systems, Ph.D. dissertation, MIT, Cambridge, MA, June 2000.
  • [11] Celik, M.U., Sharma, G., Tekalp, A.M., Sable, E., Lossless generalized-LSB data embedding, IEEE Trans. Image Process. (2005), 14 (2), 253–266.
  • [12] Lin, Y. K., A data hiding scheme based upon DCT coefficient modification, Computer Standards & Interfaces, (2014), Volume 36, Issue 5, 855-862.
  • [13] Liu, Y., Zhao, J., A new video watermarking algorithm based on 1D DFT and Radon transform, Signal Processing, (2010), Volume 90, Issue 2, 626-639.
  • [14] Lee, S. H., DWT based coding DNA watermarking for DNA copyright protection, Information Sciences, (2014), 273, 263-286,.
  • [15] Vaishnavi, D., Subashini, T.S., Robust and Invisible Image Watermarking in RGB Color Space Using SVD, Procedia Computer Science, 2015, Volume 46, 1770-1777.
  • [16] Tanchenko, A., Visual-PSNR measure of image quality, J. Vis. Commun. Image R., (2014), 25,874–878.
  • [17] A-Eldayem, M. M., A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine, Egyptian Informatics Journal, (2013), 14,1–13.
  • [18] Wang, C. C., Chang, Y. F., Chang, C. C., Jan, J. K., Lin, C. C., A high capacity data hiding scheme for binary images based on block patterns, The Journal of Systems and Software, (2014), 93, 152–162.
  • [19] Lin, C.C., Tsai, W.H., Secret image sharing with steganography and authentication, Journal of System and Software, (2004), 73: 405-414.
  • [20] Yang, C.N., Chen, T.S., Yu, K.H., Wang C.C., Improvements of image sharing with steganography and authentication, Journal of System and Software, (2007), 80, 1070-1076.
  • [21] Chang, C.C., Hsieh, Y.P., Lin, C.H., Sharing secrets in stego images with authentication. Pattern Recognition, (2008), 41 (10), 3130-3137.
  • [22] Eslami, Z., Ahmadabadi, J.Z., Secret image sharing with authentication-chaining and dynamic embedding, Journal of System and Software, (2011), 84, 803-809.
  • [23] Wu, W.-C., Lin, Z.-W., SVD-based self-embedding image authentication scheme using quick response code features, Journal of Visual Communication and Image Representation, (2016), 38, 18-28.