题名

Adaptive Steganography for Communication Risk Management

DOI

10.6459/JCM.201009_7(2).0007

作者

C. L. Liu;C. C. Lee

关键词

Data communication ; Risk management ; Steganography ; Human visual model ; Adaptive modulus

期刊名称

危機管理學刊

卷期/出版年月

7卷2期(2010 / 09 / 01)

页次

69 - 78

内容语文

英文

英文摘要

Important data transmitted on the Internet runs the risk that it can be easily accessed if it did not be suitably protected. Steganographic methods can be used to enhance this kind of security and, therefore, are suitable for managing the risk of data communication. Modulus-based steganographic methods use a modulus to embed multiple message bits in the pixels of the cover image and can be applied to high-capacity applications such as hiding a secret image into a cover image. For security reason, these methods should basically possess the property of imperceptibility. In this paper, we present a steganographic method to meet this requirement. We first propose a generic model for constructing secure modulus-based steganographic methods. Based on this model, an efficient human visual model is used to compute an adaptive modulus for each pixel of the cover image so that the theoretical imperceptibility can be ensured. Experimental results show that the proposed method can efficiently adapt to the human visual system to provide good performance of imperceptibility for high-capacity steganographic applications.

主题分类 社會科學 > 管理學
参考文献
  1. Kerchhoffs, A. (1883). “La cryptographie militaire,” Journal des Sciences Militaires, 9, 5-38.
  2. Chan, C. K.,Cheng, L. M.(2004).Hiding data in images by simple LSB substitution.Pattern Recognition,37(3),469-474.
  3. Chou, C. H.,Li, Y. C.(1995).A perceptually tuned subband image coder based on the measure of just-noticeable-distortion Profile.IEEE Transactions on Circuits and Systems for Video Technology,5(6),467-476.
  4. Jain, A. K.(1989).Fundamentals of Digital Image Processing.NJ:Prentice-Hall.
  5. Liao, Z.,Huang, Y.,Li, C.(2007).Research on data hiding capacity.International Journal of Network Security,5,140-144.
  6. Lou, D. C.,Liu, J. L.(2002).Steganographic method for secure communications.Computers and Security,21(5),449-460.
  7. Martens, J. B. O. S.,Majoor, G. M. M.(1989).The perceptual relevance of scale-space image coding.Signal Processing,17(4),353-364.
  8. McLaren, D. L.,Nquyen, D. T.(1991).Removal of subjective redundancy from DCT-coded images.IEE Proceedings I on Communications, Speech and Vision,138(5),345-350.
  9. Ngan, K. N.,Leonn, K. S.,Sinnh, H.(1989).Adaptive cosine transform coding of images in perceptual domain.IEEE Transactions on Acoustics, Speech, and Signal Processing,37(11),1743-1750.
  10. Pandel, J.(1991).Variable bit-rate image sequence coding with adaptive quantization.Signal Processing: Image Communication,3(2-3),123-128.
  11. Stallings, W.(2003).Cryptography and Network Security: Principles and Practice.New Jersey:Pearson Education.
  12. Thien, C. C.,Lin, J. C.(2003).A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function.Pattern Recognition,36(12),2875-2881.
  13. Wang, C. M.,Wu, N. I.,Tasi, C. S.,Hwang, M. S.(2008).A high quality steganographic method with pixel-value differencing and modulus function.The Journal of Systems and Software,81,150-158.
  14. Wang, S. J.(2005).Steganography of capacity required using modulo operator for embedding secret image.Applied Mathematics and Computation,164(1),99-116.
  15. Wu, D. C.,Tsai, W. H.(2000).Spatial-domain image hiding using image differencing.IEE Proceedings on Vision, Image and Signal Processing,147(1),29-37.
  16. Wu, N.-I.,Hwang, M.-S.(2007).Data hiding: current status and key issues.International Journal of Network Security,4(1),1-9.