Open Access Open Access  Restricted Access Subscription or Fee Access

Method for Data Hiding Bitmap Text Image in Single Color Image for LSB

Ali Mir Arif Mir Asif

Abstract


Data hiding is a common technique for data protection.  Data hiding in text involve embedding instructions for an autonomous program in a text.  One turns today to use keys that are as long as possible combined with cascades of several protective mechanisms. Data Hiding involves secretly embedding significant data into various forms of digital media such as text, audio, image and video. In this array of components hiding information has become a very important member.  If explosive information is hidden inconspicuously in harmless text, no suspicion will arise. Even for persistent aggressors this is a maximal impediment.  For the proposed method, I have used one main program that can encode the text images in a single color image.  It can easily recover the hidden text.  The major advantage of this encoded image is like a original image as before encoding.  The image has no visible changes.  So no one can easily read the hidden texts by sight.  The decoding logic only can recover the texts.  So it can save the confidential data in an encoded image.


Keywords


Bitmap Image, Color Quantization, Data Hiding, Semantic, Syntactic, Text

Full Text:

PDF

References


F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, Information hiding—a survey, Proceedings of the IEEE 87 (1999) 1062–1078.

M.H. Lin, Y.C. Hu, C.C. Chang, Both color and gray scale secret images hiding in a color image, International Journal of Pattern Recognition and Artificial Intelligence 16 (2002) 697–713.

M.T. Orchard, C.A. Bouman, Color quantization of images, IEEE Transactions on Signal Processing 39 (1991) 2677–2690.

N. Papamarkos, A.E. Atsalakis, C.P. Strouthopoulos, Adaptive color reduction, IEEE Transactions on Systems, Man, and Cybernetics-Part B: Cybernetics 32 (2002) 44–56.

J. Puzicha, M. Held, J. Ketterer, J.M. Buhmann, D.W. Fellner, On spatial quantization of color images, IEEE Transactions on Image Processing 9 (2000) 666–682.

C. Rauber, J.O. Ruanaidh, T. Pun, Secure distribution of watermarked images for a digital library of ancient papers, in :Second A CM Conference on Digital Libraries, Philadelphia, PA, July 1997, pp. 123–130, http://cuiwww.unige.ch/∼rauber.

F. Mintzer, Developing digital libraries of cultural content for Internet access, IEEE Communications Magazine 37 (1999) 72–78.

J. Jiang, A. Armstrong, Data hiding approach for efficient image indexing, Electronics Letters IEE 38 (23) (2002) 1424–1425.

Y. Hu, S. Kwong, J. Huang, Using invisible watermarks to protect visibly watermarked images, Proceedings of the 2004 International Symposium on Circuits and Systems, vol. 5, 2004, pp. 584–587.

C.L. Tsai, K.C. Fan, C.D. Chung, T.C. Chuang, Data hiding of binary images using pair-wise logical computation mechanism, IEEE International Conference on Multimedia and Expo, ICME’04, 2004, http://www.ieee-icme.org.

C.L. Tsai, K.C. Fan, C.D. Chung, T.C. Chuang, Reversible and lossless data hiding with application in digital library, in: IEEE 38th International Carnahan Conference on Security Technology, New Mexico, USA, 2004, pp. 226–232.

J. Brassil, S. Low, N. Maxemchuk, L. O’Gorman, Electronic marking and identification techniques to discourage document copying, IEEE Journal on Selected Areas in Communications 13 (1995) 1495–1504.

S.H. Low, N.F. Maxemchuk, J.T. Brassil, L. O’Gorman, Document marking an identification using both line and word shifting, in: Proceedings of Infocom, Boston, MA, 1995, pp. 853–860.

H. Lu, A.C. Kot, J. Cheng, Secure Data Hiding in Binary Document Images for Authentication, IEEE, New York, 2003.

M.Y.Wu, J.H. Lee,A novel data embedding method for binary facsimile images, in: Proceedings of International Symposium on Multimedia Information Processing, Taiwan, ROC, 1998.

Y.Y. Chen, H.K. Pan,Y.C. Tseng, A secure data hiding scheme for binary images, in: IEEE Symposium on Computers and Communications, 2000.

Y.C. Tseng, H.K. Pan, Secure and invisible data hiding in 2-color images, in: Proceedings of IEEE INFOCOM, 2001, pp. 887–896.

R.Z. Wang, C.F. Lin, J.C. Lin, Image hiding by optimal LSB substitution and genetic algorithm, Pattern Recognition 34 (3) (2001) 671–683.

W.S. Kim, R.H. Park, Color image palette construction based on the HSI color system for minimizing the reconstruction error, in: Proceedings of IEEE International Conference on Image Processing, vol. 3, Lausanne, Switzerland, September 1996, pp. 1041–1044.

A. V. Drake, Fundamentals of Applied Probability, McGraw-Hill, Inc., New York (1967).

A. V. Oppenheim and R. W. Shaffer, Discrete-Time Signal Processing, Prentice-Hall, Inc., Englewood Cliffs, NJ (1989).

Abdulaziz, N.; Pang, K.K., “Coding techniques for data hiding in images”, Symposium on, Signal Processing and its Applications, Sixth International, Volume 1, 13-16 Aug. 2001 Page(s):170 – 173.

Adsumilli, C.B.; Farias, M.C.Q.; Mitra, S.K.; Carli, M., “A robust error concealment technique using data hiding for image and video transmission over lossy channels”, IEEE Transactions on, Circuits and Systems for Video Technology, Volume 15, Issue 11, Page(s):1394 - 1406 2005.

B. P_tzmann, Information hiding terminology." In Anderson [39], pp. 347{350, ISBN 3-540-61996-8, results of an informal plenary meeting and additional proposals.

Beau Grantham, “Bitmap Steganography: An Introduction” COT 4810: Topics in Computer Science Dr. Dutton.

Charkari, N.M.; Chahooki, M.A.Z., “A Robust High Capacity Watermarking Based on DCT and Spread Spectrum”, International Symposium on, Signal Processing and Information Technology, 15-18 Dec. 2007 Page(s):194 – 197.

D. L. Hecht, “Embedded Data Glyph, Technology for Hardcopy Digital, Documents,” SPIE 2171 (1995).

Digimarc Corporation, Identification/Authentication Coding Method and Apparatus, U.S. Patent (1995).

E. Adelson, Digital Signal Encoding and Decoding Apparatus, U.S. Patent No. 4,939,515 (1990).

Fakhr, M.W., “A Novel Data Hiding Technique for Speech Signals with High Robustness”, International Symposium on, Signal Processing & IT, 15-18 Dec. 2007 Page(s):379 – 384.

Hesse, D.; Dittmann, J.; Lang, A., “Network based intrusion detection to detect steganographic communication channels - on the example of images”, Euromicro Conference, 2004 Page(s):453 – 456.

I. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” NECI Technical Report 95-10, NEC Research Institute, Princeton, NJ (1995).

Jun Cheng; Kot, A.C.; Rahardja, S., “Steganalysis of Binary Cartoon Image using Distortion Measure”, IEEE International Conference on, Acoustics, Speech and Signal Processing, Volume 2, 15-20 April 2007 Page(s):II-261 - II-264.

L. R. Rabiner and R. W. Schaffer, Digital Processing of Speech Signal, Prentice-Hall, Inc., Englewood Cliffs, NJ (1975).

Moon, S.K.; Kawitkar, R.S., “Data Security Using Data Hiding”, International Conference on, Conference on Computational Intelligence and Multimedia Applications, Volume 4, 13-15 Dec. 2007 Page(s):247 – 251.

Pingault, M.; Pellerin, D., “Motion transparency constraint equation based on a wavelet function decomposition”, IEEE International Conference on, Multimedia and Expo, Volume 1, 26-29 Aug. 2002 Page(s):717 – 720.

Placeway, P.; Schwartz, R.; Fung, P.; Nguyen, L., “The estimation of powerful language models from small and large corporation”, International Conference on, Acoustics, Speech, and Signal Processing, Volume 2, 27April 1993 Page(s):33– 36.

R. C. Dixon, Spread Spectrum Systems, John Wiley & Sons, Inc., New York (1976).

R. J. Anderson, ed., Information hiding: First international workshop, vol. 1174 of Lecture Notes in Computer Science, Isaac Newton Institute, Cambridge, England, May 1996, Springer-Verlag, Berlin, Germany, ISBN 3-540-61996-8.

S. K. Marvin, Spread Spectrum Handbook, McGraw-Hill, Inc., New York (1985).

Sakaguchi, S.; Arai, T.; Murahara, Y., “The effect of polarity inversion of speech on human perception and data hiding as an application”, International Conference on, Acoustics, Speech, and Signal Processing, Volume 2, 5-9 June 2000 Page(s):II917 - II920.

Sang-Bong Lee; Tae-Jung Kim; Jae-Won Suh; Hyeon-Deok Bae, “Error Concealment for 3G-324M Mobile Videophones Over a WCDMA networks”, International Conference on, Consumer Electronics, 10-14 Jan. 2007 Page(s):1 – 2.

Solanki, K.; Dabeer, O.; Manjunath, B.S.; Madhow, U.; Chandrasekaran, S., “Joint source-channel coding scheme for image-in-image data hiding”, International Conference on, Image Processing, Volume 2, 14-17 Sept. 2003 Page(s):II - 743-6.

Suhail, M.A.; Obaidat, M.S., “A watermarking technique for geometric manipulation attacks”, 12th IEEE International Conference on, Electronics, Circuits and Systems, 11-14 Dec. 2005 Page(s):1 – 5.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.