Affiliation:
1. 1Faculty of Computing, Universiti Teknologi Malaysia, Johor Bahru, Malaysia
2. 3Management Information Systems Department, College of Business Administration, Salman bin Abdul Aziz University, Alkharj, KSA
3. 4College of Computer and Information Sciences, Prince Sultan University, Riyadh, KSA
Abstract
AbstractThe rapid growth of covert activities via communications network brought about an increasing need to provide an efficient method for data hiding to protect secret information from malicious attacks. One of the options is to combine two approaches, namely steganography and compression. However, its performance heavily relies on three major factors, payload, imperceptibility, and robustness, which are always in trade-offs. Thus, this study aims to hide a large amount of secret message inside a grayscale host image without sacrificing its quality and robustness. To realize the goal, a new two-tier data hiding technique is proposed that integrates an improved exploiting modification direction (EMD) method and Huffman coding. First, a secret message of an arbitrary plain text of characters is compressed and transformed into streams of bits; each character is compressed into a maximum of 5 bits per stream. The stream is then divided into two parts of different sizes of 3 and 2 bits. Subsequently, each part is transformed into its decimal value, which serves as a secret code. Second, a cover image is partitioned into groups of 5 pixels based on the original EMD method. Then, an enhancement is introduced by dividing the group into two parts, namely k1 and k2, which consist of 3 and 2 pixels, respectively. Furthermore, several groups are randomly selected for embedding purposes to increase the security. Then, for each selected group, each part is embedded with its corresponding secret code by modifying one grayscale value at most to hide the code in a (2ki + 1)-ary notational system. The process is repeated until a stego-image is eventually produced. Finally, the χ2 test, which is considered one of the most severe attacks, is applied against the stego-image to evaluate the performance of the proposed method in terms of its robustness. The test revealed that the proposed method is more robust than both least significant bit embedding and the original EMD. Additionally, in terms of imperceptibility and capacity, the experimental results have also shown that the proposed method outperformed both the well-known methods, namely original EMD and optimized EMD, with a peak signal-to-noise ratio of 55.92 dB and payload of 52,428 bytes.
Subject
Artificial Intelligence,Information Systems,Software
Reference36 articles.
1. Robust digital watermarking based falling - off boundary in corners board gray scale images of and Network;Mehemed;International Journal Computer Science Security,2009
2. the art of hiding data Technology;Rabah;Information Journal,2004
3. Discriminative features mining for offline handwritten signature verification Research;Neamah,2014
4. Blind digital image watermarking technique based on intermediate significant bit and discrete wavelet transform in : Proceedings of the Software International Conference on pp;Yan;Computational Intelligence Engineering,2009
5. Video motion perception using optimized filter;Elarbi;International Journal of Physical Sciences,2011
Cited by
27 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献