Bit Plane Coding based Steganography Technique for JPEG2000 Images and Videos

Geeta Kasana, Dr Kulbir Singh, Dr Satwinder Singh Bhatia


DOI: https://doi.org/10.12777/ijse.10.1.

Abstract


In this paper, a Bit Plane Coding (BPC) based steganography technique for JPEG2000 images and Motion JPEG2000 video is proposed. Embedding in this technique is performed in the lowest significant bit planes of the wavelet coefficients of a cover image. In JPEG2000 standard, the number of bit planes of wavelet coefficients to be used in encoding is dependent on the compression rate and are used in Tier-2 process of JPEG2000. In the proposed technique, Tier-1 and Tier-2 processes of JPEG2000 and Motion JPEG2000 are executed twice on the encoder side to collect the information about the lowest bit planes of all code blocks of a cover image, which is utilized in embedding and transmitted to the decoder. After embedding secret data, Optimal Pixel Adjustment Process (OPAP) is applied on stego images to enhance its visual quality. Experimental results show that proposed technique provides large embedding capacity and better visual quality of stego images than existing steganography techniques for JPEG2000 compressed images and videos. Extracted secret image is similar to the original secret image.

Full Text:

FULL TEXT PDF

References


ISO/IEC 15444-1, (2001). Information Technology – JPEG2000 Image Coding System – Part 1: Core Coding System..

Carvajal-Gamez, B. E., Gallegos-Funes F. J., and Rosales-Silva, A. J. (2013). Color local complexity estimation based steganographic method, EXPERT SYSTEMS WITH APPLICATIONS, 40(4): 1132–1142.

DOI: http://dx.doi.org/10.1016/j.eswa.2012.08.024

Chan, C. K. and Cheng, L. M. (2004). Hiding data in images by simple LSB substitution, PATTERN RECOGNITION, 37(3):469–474.

doi:10.1016/j.patcog.2003.08.007

Chang, C. C., Tai, W. L., and Lin, C. C., (2006). A reversible data hiding scheme based on side match vector quantization. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 16(10):1301–1308.

doi: 10.1109/TCSVT.2006.882380

Chang, C. C. et al, (2007). Reversible hiding in DCT-based compressed images. INFORMATION SCIENCES, 177(13): 2768–2786.

doi:10.1016/j.ins.2007.02.019

Chang, C. C., Wu, W. C., and Hu Y.C. (2007). Lossless recovery of a VQ index table with embedded secret data. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 18(3):207–216.

doi:10.4304/jsw.8.3.547-553

Chang, C. C., Nguyen, T. S., and Lin, C. C. (2011). A reversible data hiding scheme for VQ indices using locally adaptive coding. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 22(7): 664–672.

Doi:10.1016/j.jvcir.2011.06.005

Chen, W. J., Chang, C. C., and Le, T. (2010). High payload steganography mechanism using hybrid edge detector. EXPERT SYSTEMS WITH APPLICATIONS, 37(4):3292–3301.

doi:10.1016/j.eswa.2009.09.050

Chen, W. Y. (2008). Color image steganography scheme using DFT, SPIHT codec, and modified differential phase-shift keying techniques. APPLIED MATHEMATICS AND COMPUTATION, 196(1): 40–54.

doi:10.1016/j.procs.2015.08.168

http://www.sciencedirect.com/science/article/pii/S1877050915022954

Chu, R., You, X., Kong X., and Ba, X. (2004). DCT-based image steganographic method resisting statistical attacks. Proceedings of IEEE international conference on acoustics, speech, and signal processing, 5.

http://ieeexplore.ieee.org/xpls/abs_all.jsp%3Farnumber%3D1327270

Cox, I. J., Miller, M. L., Bloom, J. A., Fridrich, J., and Kalker, T. (2008). Digital Watermarking and Steganography. 2nd ed., Burlington, MA: Morgan Kaufmann.

Goudia, D., Chaumont M., Puech W. and Said N. H. (2011). A Joint Trellis Coded Quantization Data Hiding Scheme in the JPEG2000 Part-2 Coding Framework, 19th European Signal Processing Conference, pp. 1110-1114, Sept.

http://ieeexplore.ieee.org/xpls/abs_all.jsp%3Farnumber%3D7073918

Hai-ying, G., Yin, X. and Guo-qiang, L. (2008). A steganographic algorithm for JPEG2000 images. IEEE computer society, Int. Conf. on Computer Science and Software Engineering, pp. 1263-1266.

doi: 10.1109/CSSE.2008.139

Hsieh, M. S. (2010). A robust image authentication method based on wavelet transform and Teager energy operator. INTERNATIONAL JOURNAL OF MULTIMEDIA AND ITS APPLICATIONS, 2(3):1-17.

doi: : 10.5121/ijma.2010.2301

http://airccse.org/journal/jma/0810ijma01.pdf

Ioannidou, A., Halkidis, S. T., and Stephanides, G. (2012). A novel technique for image steganography based on a high payload method and edge detection. EXPERT SYSTEMS WITH APPLICATIONS, 39(14): 11517–11524.

http://dl.acm.org/citation.cfm%3Fid%3D2240648

doi:10.1016/j.eswa.2012.02.106

Ishida, T., Yamawak,i K., Noda H., and Niimi M. (2008). Performance improvement of JPEG2000 steganography using QIM. Intelligent Information Hiding and Multimedia Signal Processing, International Conference, IEEE Computer Society, pp: 155-158.

doi:10.1109/IIH-MSP.2008.120

Ishida T., Yamawaki K., Noda H. and Niimi M. (2009). An Improved QIM-JPEG2000 Steganography and Its Evaluation by Steganalysis. JOURNAL OF INFORMATION PROCESSING, 17: 267-272.

http://doi.org/10.2197/ipsjjip.17.267

KAKADU software, www.kakadusoftware.com/

Jafari, R., Ziou, D., and Rashidi, M. M. (2013). Increasing image compression rate using steganography. EXPERT SYSTEMS WITH APPLICATIONS, 40(17): 6918–6927.

doi:10.1016/j.eswa.2013.06.008

Jin, H. L., Fujiyoshi, M., Sheki Y. and Kiya, H. (2007). A Data Hiding Method for JPEG2000 Coded Images Using Module Arithmetic. ELECTRONICS AND COMMUNICATIONS IN JAPAN, 90(7): 37-45.

doi: 10.1002/ecjc.20286

Ni, Z., Shi, Y. Q., Ansari, N., and Su, W., (2006). Reversible data hiding. IEEE Transactions on Circuits Systems and Video Technology, 16(3), pp. 354–362.

http://ieeexplore.ieee.org/xpls/abs_all.jsp%3Farnumber%3D1608163

doi: 10.1109/TCSVT.2006.869964

Noda, H., Spaulding, J., Shirazi, M. N., Kawaguchi, E. (2002). Application of bit plane decomposition steganography to JPEG2000 encoded images. IEEE Signal Processing Letters, 9(12), pp. 410-413.

http://ieeexplore.ieee.org/xpls/abs_all.jsp%3Farnumber%3D1159625

doi: 10.1109/LSP.2002.806056

Noda, H., Niimi, M., and Kawaguchi, E. (2006). High-performance JPEG steganography using quantization index modulation in DCT domain. PATTERN RECOGNITION LETTERS, 27(5): 455–461, 2006.

doi:10.1016/j.patrec.2005.09.008

Ohyama, S., Niimi, M., Yamawaki, K., and Noda, H. (2008). Reversible data hiding for full color JPEG2000 compressed bit-stream preserving bit-depth information. In Proc. ICPR 08: the 19th International Conference on Pattern Recognition, pp. 1-4, December.

doi:10.1109/ICPR.2008.4761625

Sweldens W. (1997). The lifting scheme: a custom-design construction of second generation wavelets. SIAM JOURNAL OF MATHEMATICAL ANALYSIS, 29:511-546.

http://140.129.20.249/~jmchen/wavelets/Tutorials/sweldens/lift2.pdf

Sajedi, H., and Jamzad, M. (2010). BSS: Boosted steganography scheme with cover image preprocessing. EXPERT SYSTEMS WITH APPLICATIONS, 37(12): 7703–7710.

doi:10.1016/j.eswa.2010.04.071

Su, P. C., and Kuo, J. (2003). Steganography in JPEG2000 compressed images. IEEE Transactions on Consumer Electronics, 49(4), pp. 824-832.

doi:10.1109/TCE.2003.1261161

Wu, D. C., and Tsai, W. H. (2003). A steganographic method for images by pixel-value differencing. PATTERN RECOGNITION LETTERS, 24(9):1613–1626.

doi:10.1016/S0167-8655(02)00402-6

Yang, C. H., Yang W. J., Huang, C. T., and Wang, S. J. (2011). Reversible steganography based on side match and hit pattern for VQ-compressed images. INFORMATION SCIENCES, 181(11):2218–2230.

doi:10.1016/j.ins.2011.01.015

Yang, C. H., Weng, C. Y., Wang, S. J., and Sun, H. M. (2008). Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Transactions on Information Forensics and Security, 3(3), pp. 488–497.

doi:10.1109/TIFS.2008.926097

Zhang, L., Wang, H., and Wu, R., (2009). A high capacity steganography scheme for JPEG2000 baseline system. IEEE Transactions on Image Processing, 18(8), pp. 1797-1803.

doi: 10.1109/TIP.2009.2021544

http://ieeexplore.ieee.org/xpls/abs_all.jsp%3Farnumber%3D4840534


Refbacks

  • There are currently no refbacks.


Published by Department of Chemical Engineering University of Diponegoro Semarang
Google Scholar

IJSE  by http://ejournal.undip.ac.id/index.php/ijse is licensed under Creative Commons Attribution 3.0 License.