Histogram Modification Data Hiding Using Chaotic Sequence
In order to solve the security problem of data hiding with obvious detectable traces to attacker, a histogram modification data hiding scheme using chaotic sequence is presented. This algorithm modifies a cover image histogram by using a chaotic sequence
- PDF / 314,588 Bytes
- 8 Pages / 439.37 x 666.142 pts Page_size
- 11 Downloads / 219 Views
Abstract In order to solve the security problem of data hiding with obvious detectable traces to attacker, a histogram modification data hiding scheme using chaotic sequence is presented. This algorithm modifies a cover image histogram by using a chaotic sequence to conceal the embedding process, and then secret information can be embedded into the modified image with encrypted trace. Experimental results show that the algorithm can achieve sound invisibility and large embedding capacity while guaranteeing high security. With the proposed scheme, the hiding trace of secret data is concealed. Even though the attacker detects the existence of hidden message under stego-image, the secret message cannot be extracted without private keys. Keywords Data hiding • Histogram modification • Chaotic sequence • Embedding capacity
1 Introduction With the development of internet and demand of users, image, video and multimedia data transmission in the internet increased rapidly over the last few years. Therefore, data security becomes more and more important. Data hiding [1] is a data security technique to undetectably insert secret message into a cover media to create a stego medium such that the existence of hidden information will not be detected by attacker. At the receive end, the hidden information can be extracted correctly by legal users. i.e., it provides a safer and securer data communication manner.
X. Li (*) • Q. Zhou Key Laboratory of Space Microwave Technology, China Academy of Space Technology, Xi’an, China e-mail: [email protected] W. Wang (ed.), Mechatronics and Automatic Control Systems, Lecture Notes in Electrical Engineering 237, DOI 10.1007/978-3-319-01273-5_98, © Springer International Publishing Switzerland 2014
875
876
X. Li and Q. Zhou
A number of data hiding methods were proposed. There are three general types: spatial domain methods [2], frequency domain methods [3] and compression domain methods [4]. Spatial domain data hiding manner mixes secret data into the distributed pixels directly. A commonly used method, called the least significant bit (LSB) [5] method, is a simple spatial domain data hiding method by replacing the least significant bit of cover image pixels to embed secret bits. For the frequency domain manner, firstly, the cover image pixels must be transformed into frequency coefficients by using a frequency transform method such as the discrete cosine transformation (DCT) [6] and discrete wavelet transformation (DWT) [7]. Later, the secret data are embedded by modifying the relative coefficients in the frequencyform image. Finally, stego image can be obtained by utilizing corresponding inverse transform. The compression domain method means that the secret message are embedded into the compression codes, such as block truncation coding (BTC)-based [8] scheme and side match vector quantization (SMVQ)-based [9] scheme, and so on. The desires of good data hiding schemes are high security and low image distortion as well as large payload. However, despite claiming good imperceptibility in
Data Loading...