Attack modelling: towards a second generation watermarking benchmark
Signal Processing - Special section on information theoretic aspects of digital watermarking
Detecting LSB Steganography in Color and Gray-Scale Images
IEEE MultiMedia
A Stochastic Approach to Content Adaptive Digital Image Watermarking
IH '99 Proceedings of the Third International Workshop on Information Hiding
A steganographic method for images by pixel-value differencing
Pattern Recognition Letters
Digital Image Processing (3rd Edition)
Digital Image Processing (3rd Edition)
A high quality steganographic method with pixel-value differencing and modulus function
Journal of Systems and Software
An improvement of EMD embedding method for large payloads by pixel segmentation strategy
Image and Vision Computing
A High Capacity 3D Steganography Algorithm
IEEE Transactions on Visualization and Computer Graphics
Complete video quality-preserving data hiding
IEEE Transactions on Circuits and Systems for Video Technology
Robust Data Hiding in Audio Using Allpass Filters
IEEE Transactions on Audio, Speech, and Language Processing
Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform
IEEE Transactions on Information Forensics and Security - Part 1
Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems
IEEE Transactions on Information Forensics and Security
Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving
IEEE Transactions on Multimedia
Robust and Transparent Color Modulation for Text Data Hiding
IEEE Transactions on Multimedia
Image quality assessment: from error visibility to structural similarity
IEEE Transactions on Image Processing
Information Content Weighting for Perceptual Image Quality Assessment
IEEE Transactions on Image Processing
Hi-index | 0.00 |
This paper presents a low distortion data embedding method using pixel-value differencing and base decomposition schemes. The pixel-value differencing scheme offers the advantage of conveying a large amount of payload, while still maintaining the consistency of an image characteristic after data embedding. We introduce the base decomposition scheme, which defines a base pair for each degree in order to construct a two-base notational system. This scheme provides the advantage of significantly reducing pixel variation encountered due to secret data embedding. We analyze the pixel variation and the expected mean square error caused by concealing with secret messages. The mathematical analysis shows that our scheme produces much smaller maximal pixel variations and expected mean square error while producing a higher PSNR. We evaluate the performance of our method using 6 categories of metrics which allow us to compare with seven other state-of-the-art algorithms. Experimental statistics verify that our algorithm outperforms existing counterparts in terms of lower image distortion and higher image quality. Finally, our scheme can survive from the RS steganalysis attack and the steganalytic histogram attack of pixel-value difference. We conclude that our proposed method is capable of embedding large amounts of a message, yet still produces the embedded image with very low distortion. To the best of our knowledge, in comparison with the current seven state-of-the-art data embedding algorithms, our scheme produces the lowest image distortion while embedding the same or slightly larger quantities of messages.