Affiliation:
1. Department of Computer Science and Engineering, National Chung Hsing University, Taichung 402202, Taiwan
Abstract
This paper presents an optimal weighted modulus (OWM) algorithm able to conceal secret messages in a high dynamic range image encoded via the RGBE format, consisting of the red, green, blue, and exponent channels. In contrast to current state-of-the-art schemes, which mainly employ limited and vulnerable homogeneous representations, our OWM scheme exploits four channels and an embedding weight to conceal secret messages, thereby offering more embedding capacities and undetectability against steganalytic tools. To reduce the impact on the luminance variation, we confine the maximal change incurred in the exponent channel when embedding secret messages. In addition, we propose an SEC scheme to eliminate the pixel saturation problem, even though a pixel contains values close to the boundary extreme. As a result, the stego images produced not only exhibit high quality but also comply with the RGBE encoding format, making them able to resist malicious steganalytic detection. The experimental results show that our scheme offers larger embedding rates, between 2.8074 and 5.7549 bits per pixel, and the average PSNR value for twelve tone-mapped images is over 48 dB. In addition, the HDR VDP 3.0 metric demonstrates the high fidelity of stego HDR images, where the average Q value is close to the upper bound of 10.0. Our scheme can defeat RS steganalytic attacks and resist image compatibility attacks. A comparison result confirms that our scheme outperforms six current state-of-the-art schemes.
Funder
Ministry of Science and Technology in Taiwan
Reference32 articles.
1. Cox, I.J., Miller, M.L., and Bloom, J.A. (2008). Digital Watermarking and Steganography, Morgan Kaufmann. [2nd ed.].
2. Katzenbeisser, S., and Petitcolas, F. (2016). Information Hiding, Artech House.
3. Image steganography in spatial domain: A survey;Hussain;Signal Process. Image Commun.,2018
4. Image steganography: A review of the recent advances;Subramanian;IEEE Access,2021
5. Liu, J.-C., Chang, C.-C., Chang, C.-C., and Xu, S. (2023). High-capacity imperceptible data hiding using permutation-based embedding process for IoT security. Electronics, 12.