Paper
8 June 2012 A secure data hiding method based on preservation of saturated pixels
Wien Hong, Jeanne Chen, Mei-Chen Wu, Chih-Wei Shiu
Author Affiliations +
Proceedings Volume 8334, Fourth International Conference on Digital Image Processing (ICDIP 2012); 83342Z (2012) https://doi.org/10.1117/12.956468
Event: Fourth International Conference on Digital Image Processing (ICDIP 2012), 2012, Kuala Lumpur, Malaysia
Abstract
Zhang and Wang in 2007 proposed an exploring the modification of embedding directions (EMD) method for which n pixels are used as an embedding unit, and a digit in based 2n+1 can be concealed by modifying a pixel value a grayscale at most. In case the overflow or underflow problems occur, EMD adds or subtracts one of the saturated pixels in the same pixel group by one and re-embeds the digit. However, if the number of saturated pixels is considerable, the modification of the saturated pixels may result in a critical vulnerability to the LSB-based steganalyzers. This paper proposes a method to leave those saturated pixels untouched and embeds only those non-saturated ones. Because no saturated pixels are modified, the stego image is insensitive to the detection by the LSB-based steganalyzers. The experimental results reveal that the proposed method is more robust to the LSB-based steganalyzers than the original EMD method when the number of saturated pixels is considerable.
© (2012) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Wien Hong, Jeanne Chen, Mei-Chen Wu, and Chih-Wei Shiu "A secure data hiding method based on preservation of saturated pixels", Proc. SPIE 8334, Fourth International Conference on Digital Image Processing (ICDIP 2012), 83342Z (8 June 2012); https://doi.org/10.1117/12.956468
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Data hiding

Remote sensing

Distortion

Digital imaging

Computer science

Image quality

Computer engineering

Back to Top