Image Complexity Analysis Based on HVS and Its Application in Steganography

Article Preview

Abstract:

With human eyes has different insensitive to different types of texture, edged and dark area, this paper proposed an image steganography with higher embedding capacity and good stego image quality. In our method, the image blocks was divided into four kinds (texture, edged, dark and smooth), and secret message was embedded with the algorithm of modulus function coincide with wavelet transform. From the experimental results, the complexity notion can distinguish different kinds of blocks precisely, and the steganography method can hide much larger message and maintain a good visual quality of stego image.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1118-1122

Citation:

Online since:

July 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Wu D C, Tsai W H. A Steganographic Method for Images by Pixel-Value Differencing [J]. Sample Recognition Letters, 2003, 24(9): 1613-1626.

DOI: 10.1016/s0167-8655(02)00402-6

Google Scholar

[2] Kawaguchi E, Eason R O. Principle and Application of BPCS-Steganography[C]/Proceedings of SPIE: Multimedia Systems and Applications, Boston, 1998: 464-472.

Google Scholar

[3] Zhang X, Wang S. Steganography using multiple-base notational system and human vision sensitivity[J]. IEEE Signal Processing Letters,2005,12(1):67-70.

DOI: 10.1109/lsp.2004.838214

Google Scholar

[4] Kang Z W, Liu J, He Y. Steganography Based on Self-organizing competitive NNS and HVS[C]/Proceedings of The Fifth International Conference on Distributed Computing and Applications for Business,Engineering and Sciences. Hangzhou, China:Shanghai University Press, 2006: 395-397.

Google Scholar

[5] LIU Jing, KANG Zhi-wei, HE Yi-gang. A seganographic method based on wavelet contrast and LSB [J]. ACTA ELECTRONICA SINICA,2007,35(7):1391-1393.

Google Scholar

[6] Junling Ren, Zhifeng Ma. Information hiding Algorithm for palette images based on HVS[C]/ Proceedings of Wireless Communications, networking and Information Security. Beijing: IEEE Intetnational Conference , 2010: 354-358.

DOI: 10.1109/wcins.2010.5541799

Google Scholar

[7] Toet A, Ruyven Lvan, Velaton J. Merging thermal and visual images by a contrast pyramid[J]. Opt Engineering, 1989, 28 (7): 789-792.

DOI: 10.1117/12.7977034

Google Scholar

[8] HUANG Da-ren, LIU Jiu-fen, HUANG Ji-wu. An Embedding Strategy and Algorithm for Image Watermarking in DWT Domain [J]. Journal of Software,2002,13(7):1290-1297.

Google Scholar

[9] Chih-Ching Thien, Ja-Chen Lin. A Simple and High-hiding Capacity Method for Hiding Digit-by-digit Data in Images Based on Modulus Function[J]. Pattern Recognition, 2003, 36(12): 2875-2881.

DOI: 10.1016/s0031-3203(03)00221-8

Google Scholar

[10] A. Cheddad, J. Condell, K. Curran and P. Mc Kevitt. Digital Image Steganography: Survey and Analyses of Current Methods [J]. Signal Processing, 2010, 90(3): 727-752.

DOI: 10.1016/j.sigpro.2009.08.010

Google Scholar