This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Data Hiding in 2-Color Images
July 2002 (vol. 51 no. 7)
pp. 873-880

In an earlier paper, we proposed a steganography scheme for hiding a piece of critical information in a host binary image. That scheme ensures that, in each m \times n image block of the host image, as many as \lfloor \log_2 (mn+ 1) \rfloor bits can be hidden in the block by changing at most 2 bits in the block. In this paper, we propose a new scheme that improves in its capability to maintain higher quality of the host image after data hiding by sacrificing some data hiding space. The new scheme can still offer a good data hiding ratio. It ensures that, for any bit that is modified in the host image, the bit is adjacent to another bit which has a value equal to the former's new value. Thus, the hiding effect is quite invisible.

[1] R.J. Anderson, “Stretching the Limits of Steganography,” Information Hiding, vol. 1174, pp. 39-48, 1996.
[2] R.J. Anderson and F.A.P. Peticolas, “On the Limits of Steganography,” IEEE J. Selected Areas Comm., vol. 16, no. 4, May 1998.
[3] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for Data Hiding,” IBM System, vol. 35, nos. 3-4, Feb. 1996.
[4] Y.-Y. Chen, H.-K. Pan, and Y.-C. Tseng, “A Secure Data Hiding Scheme for Two-Color Images,” Proc. IEEE Symp. Computers and Comm., 2000, (also available at).
[5] E. Franz et al. “Computer-Based Steganography,” Information Hiding, vol. 1174, pp. 7-21, 1996.
[6] M. Fu and O. Au, “Data Hiding by Smart Pair Toggling for Halftone Images,” IEEE Int'l Conf. Acoustics, Speech, and Signal Processing, pp. 2318 -2321, 2000.
[7] M. Fu and O. Au, “Data Hiding in Halftone Images by Pixel Toggling,” Proc. SPIE Conf. Image and Video Comm. and Processing, 2000.
[8] D. Gruhl and W. Bender, “Information Hiding to Foil the Casual Counterfeiter,” Proc. Workshop Information Hiding, IH '98, Apr. 1998.
[9] D. Kahn, The Codebreakers: The Story of Secret Writing. NY: Scribner, 1996.
[10] S. Katzenbeisser and F.A.P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, 2000.
[11] F. Petitcolas, R. Anderson, and M. Kuhn, “Information Hiding—A Survey,” Proc. IEEE, vol. 87, no. 7, pp. 1062-1078, July 1999.
[12] M. Pierrot-Deseilligny and H. Le-Men, “An Algorithm for Digital Watermarking of Binary Images, Application to Map and Text,” Int'l Workshop Computer Vision, 1998.
[13] G.J. Simmons, “The Prisoners' Problem and the Subliminal Channel,” Advances in Cryptology, Proc. CRYPTO '83, pp. 51-67, 1983.
[14] G.J. Simmons, “Results Concerning the Bandwidth of Subliminal Channels,” IEEE J. Selected Areas in Comm., vol. 16, no. 4, pp. 463-473, May 1998.
[15] G.J. Simmons, “The History of Subliminal Channels,” IEEE J. Selected Areas in Comm., vol. 16, no. 4, pp. 452-462, May 1998.
[16] W. Stallings, Cryptography and Network Security. N.J.: Prentice Hall, 1999.
[17] S. Takano, K. Tanaka, and T. Sugimura, “Steganograpic Image Transformation,” SPIE Proc. Security and Watermarking of Multimedia Contents, 1999.
[18] K. Tanaka, Y. Nakamura, and K. Matsui, “Embedding Secret Information into a Dithered Multi-Level Image,” Proc. IEEE Military Comm. Conf., pp. 216-220, 1990.
[19] R.G. van Schyndel, A.Z. Tirkel, and C.F. Osborne, "A Digital Watermark," Proc. IEEE Int'l Conf. Image Processing, vol. 2, IEEE CS Press, Los Alamitos, Calif., 1994, pp. 86-90.
[20] R.Z. Wang, C.F. Lin, and J.C. Lin, “Image Hiding by LSB Substitution and Genetic Algorithm,” Proc. Int'l Symp. Multimedia Information Processing, Dec. 1998.
[21] P. Wayner, “Should Encryption Be Regulated?” Byte, May 1993.
[22] M. Wu, E. Tang, and B. Liu, “Data Hiding in Digital Binary Image,” Porc. IEEE Int'l Conf. Multimedia and Expo (ICME '00), 2000.
[23] M.Y. Wu and J.H. Lee, “A Novel Data Embedding Method for Two-Color Facsimile Images,” Proc. Int'l Symp. Multimedia Information Processing, Dec. 1998.
[24] J. Zhao and E. Koch, "Embedding Robust Labels into Images for Copyright Protection," Intellectual Property Rights and New Technologies, Proc. KnowRight95 Conf., 1995, pp. 241-251.

Index Terms:
Binary image processing, coding, cryptography, information hiding, prisoners' problem, security, steganography.
Citation:
Yu-Chee Tseng, Hsiang-Kuang Pan, "Data Hiding in 2-Color Images," IEEE Transactions on Computers, vol. 51, no. 7, pp. 873-880, July 2002, doi:10.1109/TC.2002.1017706
Usage of this product signifies your acceptance of the Terms of Use.