• 沒有找到結果。

Adaptive data hiding in palette images by color ordering and mapping with security protection

N/A
N/A
Protected

Academic year: 2021

Share "Adaptive data hiding in palette images by color ordering and mapping with security protection"

Copied!
10
0
0

加載中.... (立即查看全文)

全文

(1)

Adaptive Data Hiding in Palette Images by Color

Ordering and Mapping With Security Protection

Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang Tsai, Senior Member, IEEE

Abstract—Palette images are widely used in multimedia and In-ternet applications. In this paper, a new method for data hiding in palette images with security protection by color ordering and map-ping, as well as parameter randomization, is proposed. First, image pixels are classified as data embeddable or nonembeddable, and only the former ones are used to embed secret data. The proposed idea of data hiding is based on the use of a new type of color-or-dering relationship, from which a color-mapping function is de-fined with binary values as output. When a secret data bit is to be embedded, a data-embeddable pixel is selected, and its color is ad-justed to make the output of the color-mapping function equal to the secret bit value. The embedded secret data can be extracted correctly and quickly from the resulting stego-image by merely in-specting the outputs of the color-mapping function. Indetectability of the secret information embedded by the proposed method is also analyzed and confirmed. Furthermore, a number of possible se-curity enhancement measures based on parameter randomization in the data-embedding process are proposed to protect the hidden data in the stego-image. The randomization effect is created by the use of a secret key and a number of random number-gener-ating functions. The proposed data hiding method was tested with a variety of palette images. The experimental results show that se-cret data can be embedded and extracted successfully without pro-ducing visual artifacts in the cover image. A good balance between stego-image quality and data-embedding capacity can be achieved, which proves the efficiency and feasibility of the proposed method for practical applications.

Index Terms—Color palette, color-mapping function, color-or-dering relationship, cover image, data hiding, palette image, pa-rameter randomization, random number-generating function, se-curity protection, stego-image.

I. INTRODUCTION

T

HE IDEA OF data hiding is to seamlessly modify a given image, called a cover image in this paper, in a prescribed manner so that secret information can be embedded in the re-sulting image, called the stego-image, without creating notice-able artifacts [1]. The recipient can correctly extract the em-bedded information from the stego-image, while other people are unaware of the existence of the secret behind the stego-image. Data-hiding techniques can be exploited for many ap-plications, such as steganography, covert communication, data authentication, annotation association, etc., and so have been ex-tensively investigated in recent years [2]. This paper is mainly Paper approved by K. Rose, the Editor for Source-Channel Coding of the IEEE Communications Society. Manuscript received November 15, 2001; re-vised November 28, 2002 and April 11. 2003. This work was supported in part by the MOE Program for Promoting Academic Excellency of Universities under Grant 89-1-FA04-1-4.

The authors are with the Department of Computer and Information Science, National Chiao Tung University, Hsinchu 300, Taiwan, R.O.C. (e-mail: chtzeng@cis.nctu.edu.tw; zfyang@cc.nctu.edu.tw; whtsai@cis.nctu.edu.tw).

Digital Object Identifier 10.1109/TCOMM.2004.826379

on the topics of steganography and covert communication of palette-based images. Applications of such topics include intel-ligent information hiding or transmission for military purposes, secret keeping, or communication in business activities of com-panies, etc.

Palette-based images, or simply palette images, are popular in multimedia and Internet applications. Each palette image is composed of a color palette and a set of color indexes. The color palette is a list of entries of representative colors in the image, and the color indexes are some pointers to those palette entries that specify the red–green–blue (RGB) colors in the image. Use of this type of palette image format has the effect of image compression, which helps saving storage space and reducing transmission time. An example of palette images is that of the graphics interchange format (GIF). Popularity of palette images in multimedia and Internet applications makes them appropriate for use as cover images to conceal secret data without arousing suspicion when the resulting stego-images are inspected or transmitted over the Internet. Many studies have been devoted to data hiding [1]–[5]; however, little attention has been paid to such studies for palette images so far. The goal of this study is to design a new secure method for data hiding in palette images.

Since the indexes of the color palette used in a palette image are not color values themselves, hiding data in palette images is more challenging than in images of other formats. Either the palette or the image data can be used to hide secret data. Kwan [6] developed a program called “Gifshuffle” to embed data in GIF images. The idea is to permute the colors in the palette of an image in a specific order in accordance with the secret data. There are 256! possible permutations of the 256 entries of a color palette. So, at most bits can be embedded into a GIF image. A merit of this approach is that the visual content of the cover image is not affected. However, a serious drawback is that palette image software will usually rearrange the order of the colors in the palette of a given image and so destroy the data hidden in the palette, when the image is reloaded and saved. Ad-ditionally, a palette with randomly ordered color entries might also be a hint of data hiding. In some steganographic applica-tions [7]–[10], by using the dithering method, the palette size can be doubled and thus used to choose appropriate colors to replace those of the pixels where data are embedded. However, it was reported in [11] that if data hiding is achieved by manip-ulation of the color palette, hidden data is much more likely to be detected by steganalysis. As a result, data hiding by manipu-lation of the image content instead might be more favorable for practical applications, and this is the approach adopted in this paper.

(2)

Fig. 1. Example of pixel color replacement. (a) Original image. (b) Replacement by the closest color. (c) Replacement by the neighboring color.

Fridrich and Du [12] proposed a method to embed data in palette images by first assigning a specific parity bit (0 or 1) to each color in the palette, and then adjusting the pixel index values in such a way that the parities of the new index values are equal to the message bits to be embedded. They proposed an optimal parity-assignment algorithm so that the resulting data-embedding process guarantees that an index is always replaced by the index of the closest color. Their adaptive method can be employed to conceal a moderate amount of data and has the least modification of pixel values. However, replacing a color with its closest one may not always be the best choice. Theoretically, minimization of the color difference after data embedding will result in the least distortion in the image. Practically, this might not be adequate for palette images, especially for those with low color depth. Fig. 1 illustrates an example of the observation about this phenomenon. For simplicity, only three colors , , and with RGB values (0, 174, 239), (57, 181, 74), and (236, 0, 140) are contained in the sample image. Fig. 1(a) shows the original image. The pixel to be adjusted is located near the center of the image and is marked by a bounding box. It can be noted that the original color of the pixel is . Because the closest color of is , is replaced by to minimize the color change of the pixel, as shown in Fig. 1(b). This results in a spark in the image. On the other hand, Fig. 1(c) shows the result of replacing with the neighboring color . The image contains no visual artifact. As a result, in the development of data hiding in palette images, not only the color characteristics, but also the spatial properties of the image content should be considered.

Though a few effective data-hiding methods for binary im-ages have been proposed [4], [13]–[15], the embedding capacity of a binary image is essentially very limited. On the other hand, various palette images are available for secret data embedding, so we may choose images with larger numbers of colors rather than with two or only a few colors as cover images. Neverthe-less, the proposed method also can be applied to palette images with small numbers of colors except that the embedding ca-pacity of such images will be smaller. In case that a large amount of data is to be hidden, one way out is to use multiple images instead of just one for data embedding.

In this paper, a data-hiding scheme for palette images is proposed for steganographic applications. Secret information hidden in a stego-image is fragile to image manipulations. Also,

such applications require that the secret information hidden in a stego-image is visually and statistically undetectable, and the hidden secret cannot be read even when its existence is detected. To achieve these two goals, the proposed scheme is based on the use of a certain color-ordering relationship. Such an ordering relationship is designed according to some color quality. The ordering relationship is used to choose an optimal set of colors to replace the original ones to achieve better hiding effects, based on the idea of minimizing color distortion. Besides, the proposed method also considers the necessity of reducing local image content changes as mentioned above, yielding secret embedding results with a good compromise between the resulting visual quality and data-hiding capacity. Furthermore, to ensure the security of the hidden data, it is usually desired to have some measures to protect the data behind the stego-image from being illegally discovered. For this purpose, we also propose a sequence of security protection measures, which are based on the concept of randomizing the parameters involved in the proposed data-embedding process. Parameter randomization is achieved by a set of random number generators, all of which are controlled conveniently by the use of a single secret key. The resulting data-embedding scheme becomes so dynamic and complicated that illicit discovery of the hidden data is expected to be impossible.

In the following, the proposed color-ordering relationship and color-mapping function will be introduced in Section II. In Sections III and IV, the proposed data embedding and extraction processes will be described, respectively. Analysis of indetectability of the secret information embedded by the method and the proposed security protection measures for the method will be described in Section V. In Section VI, several experiments results will be presented to show the feasibility of the proposed method. And finally, in Section VII, some conclusions will be given.

II. PROPOSEDCOLOR-ORDERING RELATIONSHIP ANDCOLOR-MAPPINGFUNCTION

The proposed data-hiding method is based on the use of a color-ordering relationship and a binary color-mapping func-tion, which we define in this section. The binary color-map-ping function takes as input the color values of a group of image

(3)

Fig. 2. A pixelX and its four precedent neighbors (the shadowed ones) in the raster-scanning sequence.

pixels, and yields as output a binary value “0” or “1” in accor-dance with the color relationship among the pixels’ colors. The basic idea of data embedding proposed in this paper is to modify the colors of some image pixels in such a way that the corre-sponding binary outputs of the color-mapping function with the colors of the resulting image pixels as input are equal to the data bits to be hidden.

First, we define the color-ordering relationship. Let and

be two colors with RGB values and ,

respectively. The color-ordering relationship is based on the

lu-minance values and of and , where and are

computed as follows [16]:

(1) It is possible that and are different, but and are equal to each other. In this situation, the color-ordering relationship is defined by comparing the RGB values of and further to make the relationship unique. Three possible color orders between and are defined as follows, which we say to form a color-ordering relationship : if or and or and and if and and otherwise. (2) It is not difficult to see that the above relationship defines a unique ordering for all colors and serves the purpose of data hiding well. However, it is noted that by randomizing the or-dering sequence determined by the above definition, more color-ordering relationships can be generated, as will be explained in detail in Section V.

Next, we define some terms before giving the definition of the color-mapping function. In the proposed data-embedding process, an input cover image is processed in a raster-scan-ning manner. Given a pixel in the cover image, we define its precedent neighbors to be those four neighboring pixels, among the eight neighboring ones in a 3 3 neighborhood of , which are visited in sequence before the other four during

the line-by-line raster scanning. More specifically, if is lo-cated at coordinates in the input image, then its

prece-dent neighbors are the four pixels located at ,

, , and . See Fig. 2 for an

il-lustration. Then, we define three related terms: 1) the color

dif-ference between two colors and as the Euclidean

distance between the RGB values and

of and , respectively, or more specifically, as

; 2) the color

differ-ence between two pixels and with colors and , re-spectively, as the color difference between and ; and 3) the

maximum color difference between a given pixel and its four precedent neighbors – as the maximum of the four color differences between and – , respectively.

We are now ready to define the color-mapping function. For a given pixel with color , let the colors of its four precedent neighbors – be through , respectively. Let the result of sorting the values of – according to the color-ordering relationship be – , with being the largest. We define a color-mapping function with binary outputs as follows, which

we denote as : if if if if otherwise. (3)

It can be seen that the function output depends on the ordering of the color of among those of the four precedent neighbors of .

In addition, to reduce possible quality degradation in the re-sulting stego-image, the pixels in the cover image are classified into data embeddable and nonembeddable ones in this study during the raster-scanning process. Only data-embeddable pixels are used for data hiding; nonembeddable ones are skipped. Let be the original color of a given pixel and a possible replacement for in the color palette . When the color of is , assume that the corresponding output of the color-mapping function of is , and that the corresponding maximum color difference between and its four precedent neighbors is . When the color of is replaced by , assume that the corresponding values of and are changed to be and , respectively. Also assume that the number of distinct colors of ’s four precedent neighbors is . A pixel is defined to be data embeddable if the following three conditions are satisfied: 1) is larger than a threshold value ; 2) is smaller than a threshold value ; and 3) there exists a color with the corresponding being the inverse of , and the corresponding being smaller than the threshold value . Or equivalently, we define the data embeddability of a pixel as shown in (4) at the bottom of the page. In (4), the first condition is used to ensure that is located in a reasonably

is data embeddable, if and there exists a such that and

(4)

color-abundant region so that pixel color modification due to data embedding will arouse little suspicion. A reason here is that the change of a pixel’s color among a region with a lot of colors presumably is less noticeable. The second condition is set mainly to avoid pixel color modification at high contrast regions with large values, where sharp lines or edges will appear with higher probabilities. Modification of colors at such regions usually will cause more obvious image content changes, and so reduce the data-hiding effect. The third condition is set to ensure that has the ability to embed a bit, and that is still data embeddable after the data-embedding process. Note that, because the number of distinct colors of ’s four precedent neighbors is not changed when the color of is altered, the condition will not be changed, and so is not included in the third condition.

III. PROPOSEDDATA-EMBEDDINGPROCESS

Assume that the secret data to be embedded in a cover

palette image is a bit stream, denoted as .

The basic idea of the proposed data-embedding process is to check each pixel of in a raster-scanning manner for its data embeddability, and to embed each secret bit of sequen-tially into every data-embeddable pixel, until the bit stream of is exhausted. During each secret bit-embedding step, if the binary output of the color-mapping function is the same as the secret bit value to be embedded, the color of the cur-rently checked data-embeddable pixel is kept unchanged; otherwise, is replaced with a color , called the optimal

replacement color for , selected from the color palette by the following algorithm.

Algorithm 1: Optimal replacement color selection for a given pixel

Input: The color of the currently checked data-embeddable pixel , the color palette , and a secret bit value to be embedded.

Output: The optimal replacement color for .

Step 1) Let denote a set of candidate optimal replacement colors for , and set empty initially.

Step 2) Put each color in the color palette into if satisfies the following two conditions: 1) together with the colors of the four precedent neighbors of as input to the color-mapping function yields a binary output value equal to the secret bit ; and 2) is still data embeddable when its color is set to .

Step 3) Find the color among those in , whose color dif-ference from is the minimum, i.e., find the in that sat-isfies the following condition:

Step 4) Let denote the subset of that contains the colors of the four precedent neighbors of . If the color difference between and is smaller than a preselected threshold or is empty, then take as the desired optimal replace-ment color for and stop; otherwise, perform the next step.

Step 5) Find the color among those in , whose color difference from is the minimum, i.e., find the that satisfies the following condition:

take as the desired for ; and stop.

The first three steps of the above algorithm aim to select from the color palette a color which is “most similar” in color to that of the currently checked pixel . However, if this color differs too much from that of , use of it as the desired optimal replacement color will cause an obvious visual artifact at , as illustrated by Fig. 1(b). Therefore, Step 4) is performed with the preselected threshold used to avoid such a case. If this case is found to exist, then in Step 5), the “most similar” color found from those of the four precedent pixels is taken to be the desired optimal replacement color for the currently checked pixel , as illustrated by Fig. 1(c). An important idea behind the proposed algorithm above is that we require the pixel to be still data embeddable after its color is replaced, as depicted by the second condition in Step 2). This measure facilitates the work of identifying those pixels into which secret bits have been embedded during the secret data-extraction process.

We are now ready to describe the proposed secret data-em-bedding process as an algorithm in the following.

Algorithm 2: Secret data-embedding process

Input: A cover palette image , and a secret bit stream

to be embedded.

Output: An image with the secret being embedded. Step 1) For each secret bit in , perform the following steps until all secret bits in are embedded.

Step 2) Perform a raster scan of and check the data embed-dability of each scanned pixel, until a data-embeddable pixel

is found.

Step 3) Take the color of and the sorted colors – of the four precedent neighbors of as input to the color-mapping function to yield a binary output bit . Step 4) Check whether the secret bit is equal to . If so, regard the secret bit to be already existing at , and go to Step 1) to embed the next bit; otherwise, perform the next step.

Step 5) Find the optimal replacement color for by Algorithm 1; substitute the color of with ; and go to Step 1) to embed the next bit.

IV. PROPOSEDDATA-EXTRACTIONPROCESS

During the data-extraction process, a given stego-image is also processed in a raster-scanning manner. The definition given in (4) is used to check the pixels’ data embeddability. Only data-embeddable pixels are processed further; all nonembed-dable ones are skipped. For each data-embednonembed-dable pixel, we take its color and those of its four precedent neighbors as input to the color-mapping function , and compute the binary output value. If the output is “0,” then the extracted secret bit is taken to be “0;” otherwise, “1.” As can be seen, the extraction process is

(5)

simple and so can be performed very fast. The detailed data-ex-traction process is described in the following as an algorithm. Algorithm 3: Secret data-extraction process

Input: An input stego-image in which a secret bit stream was embedded.

Output: The secret bit stream .

Step 1) Set as an empty bit stream initially.

Step 2) Perform a raster scan of and execute the following steps until all pixels of are processed.

Step 3) For each pixel of , check whether it is data em-beddable. If not, regard no secret bit to exist at , and go to Step 2); otherwise, perform the next step.

Step 4) Take the color of and the sorted colors – of the four precedent neighbors of as input to the color-mapping function to yield a binary output bit . Step 5) Append to the end of , and go to Step 2).

V. SECURITYPROTECTION FORPROPOSEDMETHOD

A. Indetectability of Hidden Information

In steganographic applications, it is required that the exis-tence of hidden information is visually and statistically unde-tectable. The imperceptibility of hidden information is demon-strated by some experimental results in Section VI. In this sec-tion, we show that the hidden information in the stego-images generated by the proposed method cannot be detected by some methods of stego-image analysis.

Intuitively, a general statistical model of palette images can be used to determine whether an image is “normal” or possibly em-bedded with certain extra information. However, because of the variety of palette images, it is difficult to define a general statis-tical model for analyzing palette images [2]. Without a general model, detection of hidden information in palette images can only be performed in certain prescribed manners. In [2], some hidden information detection techniques are described and can be categorized as follows:

1) investigation of abnormal palette structures; 2) detection of outstanding pixels;

3) detection of special patterns in palette images.

Because the proposed method does not manipulate image palettes, no abnormal palette structure, such as a special palette color ordering, will be generated. Techniques belonging to Category 1) above therefore have no effect on the proposed method. In addition, the use of the data embeddability proposed in this paper prevents the resulting stego-images from having outstanding pixels which are visually or statistically detectable. Thus, techniques belonging to Category 2) have no effect on the proposed method, either. Finally, one reported method of special pattern detection in watermarked palette images is Maes [17], which checks the histogram of a watermarked image to detect whether it includes special patterns resulting from modi-fication of the palette content. Such patterns, called twin peaks, are produced by some artificially created palette colors that are similar to the original colors in the cover image. But since our method does not alter the palette, such an approach again does not work on the stego-images yielded by our method.

B. Confidentiality of Hidden Information

When data hiding becomes popular and the public gets ac-quainted with it, people might try illegally to inspect or extract the secret data behind an image. Hence, it is necessary to take appropriate measures to ensure the security of the hidden data, hoping that an unauthorized user will never extract the hidden data successfully or correctly, even if he or she knows in ad-vance that there are secret data behind the stego-image. To pro-tect the embedded data securely, a common way is to use a cryptographic method additionally before data hiding. That is, the secret data are first encrypted with a key, followed by the process of hiding the encryption result in a cover image. This way, though offering an additional level of security protection, does not provide the hidden data with direct protection. It is desired to add security protection directly into the data-hiding process, aiming to increase the difficulty for an unauthorized user to extract, alter, and forge hidden data by manipulating the stego-image. The details of the proposed measures to achieve this goal are described in the following.

Recall that during the proposed secret data-extraction process, the original cover image is not required. Instead, to extract the hidden data from a stego-image correctly, the following three types of information are required:

1) the positions of the data-embeddable pixels determined by the two threshold values and involved in the definition of data embeddability in (4);

2) the order of colors used in defining the color-ordering relationship by (2);

3) the binary outputs of the color-mapping function defined by (3).

If the above three types of information are all discovered illegally, the possibility for the embedded secret data to be ex-tracted out will be increased. The essence of the proposed secret protection measures to secure these three types of critical infor-mation is to randomize the involved parameters (the threshold values, orders, and function outputs) through the use of a single secret key and several random number-generating functions. The secret key may be chosen freely by a user to control the random number-generating functions, and, in turn, to yield a corresponding secret data-embedding process. Subsequently, when data extraction is to be conducted, the same secret key is used to yield the corresponding data-extraction process that is basically a reverse of the data-embedding process. We now describe below the detail of the security enhancement measure for protecting each of the three types of information mentioned above.

1) Randomization of Data-Embeddable Pixel Posi-tions: From (4), we see that and are two thresholds that determine pixel embeddability during secret bit embedding. People cannot know whether a pixel is data embeddable or not by inspecting the stego-image only; the only way is to try all possible combinations of to see if any combination can result in the extraction of reasonable data. To increase the difficulty of finding the correct combination of , when the embeddability of each pixel is checked during the image raster-scanning process, a random combination of is generated by two random number-generating functions

(6)

and , with the initial seeds of both functions set to a secret key value, say . In this paper, is used to generate a value of randomly in the range 1–3, and in the range 5–50. In this way, the embeddability of each pixel will vary so that the positions of the data-embeddable pixels will become un-predictable. This, in turn, means that only when the secret key is used in the data-extraction process for data-embeddability determination can the embedded data be recovered unambigu-ously. In addition, it is noted that a random number generator will always yield the same output number or the same number sequence, as long as the input seed key is identical.

Let be the probability for an unauthorized user to discover a single setting of by enumerating all possible combina-tions of them. It is easy to see that is equal to

in our case.

2) Randomization of Color-Ordering Relationships: The

color-ordering relationship defined by (2) is based on an order yielded from comparing the magnitudes of the luminance values of all colors. This order, though unique, is fixed. Making it dynamically defined for each pixel will increase the security protection effect. The method we adopt to achieve this goal is described as follows.

At the beginning of the data embedding or extraction process, all colors, say ones, in the palette are sorted according to their luminance values based on the color-ordering relationship

defined by (2). Let the resulting color sequence be . We say that color in has the order number . Whenever a pixel with color and order number is en-countered, we use the secret key to generate a random number

sequence using a random

number-gener-ating function with each number in being in the range from 1 to . Then, we assign the new order number of to each color in to replace its old one . Accordingly, the new order number for the color of with the old order number is now . Furthermore, the color of each of the four prece-dent neighbors of is also assigned a new order number in the meantime.

Now, a new color-ordering relationship between two colors and with new order numbers and , respectively, can be defined as follows:

if if

otherwise.

(5)

In short, the above definition gives a color-order randomization effect at each image pixel, leading to more assurance of security protection of the resulting data embedding.

Let be the probability for an unauthorized user to discover a single color-ordering relationship by enumerating all possible ones. It can be seen that if there are distinct colors in the image, is equal to , which decreases with the increase of . Furthermore, even when the image is just with 32 distinct colors, is still quite small, which is about .

3) Randomization of Color-Mapping Functions: The

color-mapping function specified in (3) is randomized in the fol-lowing way to increase the security protection of the embedded data. First, the secret key is used to generate a binary random

sequence , using a random

number-gen-erating function . Based on the dynamically defined color-ordering relationship described previously, the color-mapping function in (3) is redefined in accordance with as fol-lows: if if if if otherwise. (6)

Hence, is different each time when a secret bit is embedded into a data-embeddable pixel. Because always generates the same random number sequence as long as an identical seed (which is the secret key ) is used, the function , which is dynamically defined for each pixel during the embedding and the extraction processes, is identical. As a result, the hidden data can be extracted correctly. This way of randomizing the color-mapping function obviously will strengthen the security of the hidden data.

Let be the probability for an unauthorized user to dis-cover a single color-mapping function by enumerating all

pos-sible ones. It can be seen that is equal to .

4) Security Control by Parameter Randomization: The three

aforementioned security enhancement measures are based on the use of random number generators with an input secret key to randomize the three types of information mentioned pre-viously. The random number generators will always yield the same output numbers or the same number sequences, as long as is identical. This ensures that, in the secret data-extraction process, if the secret key used in the secret data-embedding process is provided, the three types of information can be cor-rectly discovered without causing synchronization errors. That is, the randomization of the three types of information will not affect the correctness of the proposed method.

In addition, the enhancement measures are designed to pro-tect the three types of information by randomizing them. As-sume that all of the above security measures are employed, and that the three types of information all together are randomized times. This means that for an image, a randomization op-eration must be performed for every pixels. Accord-ingly, the probability for an unauthorized user to discover the sets of the three types of information is , which is equal to

for an image with 32 distinct colors.

Now, by selecting an appropriate to randomize the three types of information, may be decreased to be as small as possible. For example, assume that in a high-security applica-tion with a 256 256 input image which has 32 distinct colors,

is required to be smaller than . Then, since , just three times of ization will be sufficient. This, in turn, means that the

random-ization need be conducted once every pixels

in the secret data-embedding process, where is the integer ceiling function.

In summary, if all of the above security enhancement mea-sures are implemented into the secret data-embedding process, it

(7)

Fig. 3. Typical palette images. (a) 2562 256 (256 colors). (b) 213 2 300 (256 colors). (c) 242 2 360 (128 colors). (d) 70 2 118 (32 colors). (e) 100 2 224 (64 colors). (f) 1002 800 (128 colors).

is expected that an unauthorized attempt of extracting the hidden data will be extremely difficult. And this makes the proposed method very feasible for practical data-hiding applications.

VI. EXPERIMENTALRESULTS

To test the performance of the proposed method, a series of experiments were conducted on a collection of 100 palette images. These images were selected to simulate the use of palette images in real-world applications. According to the definition of the public palette image format, there are at most 256 different colors in a palette image, so that the use of palette images is restricted to applications which do not need a great number of colors. Fig. 3 includes a set of typical palette

images in our collections. Fig. 3(a) and (b) are a photograph and a comic picture, respectively. In addition to the purpose of reducing storage space, these kinds of images can be used as thumbnails to serve as previews of real or huge images during browsing. Because more colors are usually required to make photographs and comic pictures visually acceptable, the palettes of these pictures contain more than 128 colors. Fig. 3(c) includes an image containing both graphical and text regions. This image is used as an “image map” in web pages. Users can enter another page by clicking the topics located in the left part of the image. The number of colors used in this kind of image is dependent on the image content. Fig. 3(d) shows a clip art that is usually stored as a palette image. It requires fewer colors than a photograph. Generally, the number

(8)

Fig. 4. Embedding results of the proposed method applied to the images in Fig. 3. (a) 15 640 bits/44.8 dB. (b) 2003 bits/43.7 dB. (c) 1643 bits/40.8 dB. (d) 537 bits/45.3 dB. (e) 927 bits/42.1 dB. (f) 2843 bits/43.5 dB.

of colors used in a clip art is between 32 and 128. Fig. 3(e) and (f) are two images that are mainly composed of text with simple or complex backgrounds. These kinds of images are often used as banners or for advertisements.

The corresponding stego-images, created by the proposed method, are shown in Fig. 4. In our experiment, the threshold values , , and were set to be 2, 20, and 10, respectively. Accordingly, a pixel is data embeddable only when there are at least three distinct colors among its four precedent neighbors, and the maximum color difference between a pixel and the four precedent neighbors is smaller than 20. The number of bits embedded and the resulting peak signal-to-noise ratio (PSNR) value are shown below each stego-image in the figures. The

experimental results show that secret data can be embedded without introducing visual artifacts and extracted correctly by the proposed method.

Furthermore, we also investigated the performance of the pro-posed method with different threshold values. In our experi-ment, is set to a half of . Table I illustrates the embedding performance of the proposed method. As expected, the number of bits that can be embedded is increased, when is decreased and is increased. The image quality after data embedding, though, is still very good, with the resulting PSNR higher than 35 dB. On the other hand, when the thresholds and are set in the reverse way, we see that even better image quality was obtained without sacrificing the embedding capacity. This

(9)

TABLE I

EMBEDDINGPERFORMANCE FORDIFFERENTVALUES OFT ANDT

shows that the proposed method has a good tradeoff between embedding capacity and image quality, and so is quite flexible and practical for various applications.

VII. CONCLUSIONS

In this paper, a new method for data hiding in palette im-ages has been proposed. Data embeddability of cover image pixels, as well as color-mapping functions based on color-or-dering relationships, are defined in this paper. The major idea of the proposed data-embedding process is to modify the colors of data-embeddable image pixels so that the binary outputs of the color-mapping function with the colors of these image pixels as input may be taken as the data to be hidden. The color of a data-embeddable pixel is modified to be an optimal one, which is selected from the color palette and has the least distortion under the color conditions around the pixel. Different from other data-hiding methods that consider only color difference in se-cret embedding, our method in addition takes spatial proper-ties of the image content into account. Hence, when cover im-ages contain limited colors that are visually uncorrelated, the proposed method can yield embedding results with better vi-sual quality. Indetectability of the secret information embedded by the proposed method has also been analyzed and ensured. Furthermore, several possible security enhancement measures for the proposed method have been proposed. These measures essentially randomize the parameters involved in the proposed data-embedding process, and provide the proposed method with good security protection. Good experimental results were ob-tained, which show the feasibility of the proposed method.

REFERENCES

[1] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding—A survey,” Proc. IEEE, vol. 87, pp. 1062–1078, July 1999. [2] S. Katzenbeisser and F. A. P. Petitcolas, Information Hiding Techniques

for Steganography and Digital Watermarking. Boston, MA: Artech House, 2000.

[3] L. M. Marvel, J. C. G. Boncelet, and C. T. Retter, “Spread spectrum image steganography,” IEEE Trans. Image Processing, vol. 8, pp. 1075–1083, Aug. 1999.

[4] K. Matsui and K. Tanaka, “Video-steganography: How to secretly embed a signature in a picture,” in Proc. IMA Intellectual Property Project, vol. 1, 1994, pp. 187–205.

[5] M. Wu, H. Yu, and A. Gelman, “Multi-level data hiding for digital image and video,” in Proc. SPIE Photonics East, vol. 3845, Boston, MA, 1999, pp. 10–21.

[6] M. Kwan. (1998) GIF Colormap Steganography. [Online]. Available: http://www.darkside.com.au/gifshuffle/

[7] R. Machado. (1997) EzStego, Stego Online, Stego. [Online]. Available: http://www.stego.com

[8] H. Repp. (1996) Hide4PGP. [Online]. Available: http://www.rugeley. demon.co.uk/security/hide4pgp.zip

[9] A. Brown. (1996) S-Tools for Windows. [Online]. Available: ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/ s-tools4.zip [10] C. Maroney. (1994–1997) Hide and Seek. [Online]. Available:

ftp://ftp.csua.berkeley.edu/pub/cypherpunks/steganography/hdsk41b. zip

[11] N. F. Johnson and S. Jajodia, “Steganalysis of images created using cur-rent steganography software,” . New York: Springer-Verlag, 1998, vol. 1525, Lecture Notes in Computer Science, pp. 273–289.

[12] J. Fridrich and R. Du, “Secure steganographic methods for palette im-ages,” in Proc. 3rd Int. Workshop Information Hiding, Dresden, Ger-many, 1999, pp. 47–60.

[13] N. F. Maxemchuk and S. Low, “Marking text documents,” in Proc. Int.

Conf. Image Processing, vol. 3, Santa Barbara, CA, 1997, p. 13.

[14] M. Wu, E. Tang, and B. Liu, “Data hiding in digital binary images,” in

Proc. Int. Conf. Multimedia and Expo, vol. 1, New York, NY, 2000, pp.

393–396.

[15] Y.-C. Tseng, Y.-Y. Chen, and H.-K. Pan, “A secure data hiding scheme for binary images,” IEEE Trans. Commun., vol. 50, pp. 1227–1231, Aug. 2002.

[16] R. C. Gonzalez and R. E. Woods, Digital Image Processing, 2nd ed. Reading, MA: Addison-Wesley, 2002.

[17] M. Maes, Twin Peaks: The Histogram Attack on Fixed Depth Image

Wa-termarks. New York: Springer-Verlag, 1998, vol. 1525, Lecture Notes in Computer Science, pp. 290–305.

Chih-Hsuan Tzeng received the B.S. and Ph.D. degrees from the Department of Computer and In-formation Science, National Chiao Tung University, Hsinchu, Taiwan, in 1995 and 2003, respectively.

During his Ph.D. study, he was with the Com-puter Vision Laboratory, Department of ComCom-puter and Information Science, National Chiao Tung University, as a Research Assistant. He is currently a Postdoctoral Fellow with National Chiao Tung University. His research interests include multimedia data hiding, image compression, pattern recognition, and document image processing.

(10)

Zhi-Fang Yang received the Ph.D. degree in com-puter and information science from National Chiao Tung University, Hsinchu, Taiwan in 1999.

She was a Postdoctoral Fellow with the Institute of Information Science, Academia Sinica, Taiwan from December 1999 to December 2000. Since January 2001, she has been a contracted Assistant Professor with the Department of Computer and Information Science, National Chiao Tung University. Her current research interests include multimedia secu-rity and communication, multimedia information processing, and watermarking theory.

Wen-Hsiang Tsai (S’78–M’85–SM’91) received the Ph.D. degree in electrical engineering from Purdue University, West Lafayette, IN, in 1979.

He joined the faculty of National Chiao Tung Uni-versity, Hsinchu, Taiwan in 1979, and is currently a Professor in the Department of Computer and Infor-mation Science and the Vice President of the Univer-sity. He has served as the Head of the Department, the Dean of Academic Affairs of the University, the Chairman of the Chinese Image Processing and Pat-tern Recognition Society at Taiwan, the Editor of sev-eral international journals, and the Editor-in-Chief of the Journal of Information

Science and Engineering. He has published 293 academic papers, including 120

journal papers and 173 conference papers. His major research interests include image processing, pattern recognition, computer vision, virtual reality, and in-formation hiding. He has supervised the thesis studies of 29 Ph.D. students and 113 master students.

Dr. Tsai has received many awards, including four Outstanding Research Awards, two Special Researcher Awards, and one Distinguished Researcher Award, all from the National Science Council, R. O. C. He was also the re-cipient of the Academic Award of the Ministry of Education, the 13th Annual Best Paper Award of the Pattern Recognition Society of the USA, and many aca-demic paper awards made by several acaaca-demic societies. He is a member of the Chinese Image Processing and Pattern Recognition Society, and the Chairman of the Computer Society of IEEE Taipei Section.

數據

Fig. 1. Example of pixel color replacement. (a) Original image. (b) Replacement by the closest color
Fig. 2. A pixel X and its four precedent neighbors (the shadowed ones) in the raster-scanning sequence.
Fig. 3. Typical palette images. (a) 256 2 256 (256 colors). (b) 213 2 300 (256 colors)
Fig. 4. Embedding results of the proposed method applied to the images in Fig. 3. (a) 15 640 bits/44.8 dB

參考文獻

相關文件

T transforms S into a region R in the xy-plane called the image of S, consisting of the images of all points in S.... So we begin by finding the images of the sides

6 《中論·觀因緣品》,《佛藏要籍選刊》第 9 冊,上海古籍出版社 1994 年版,第 1

• helps teachers collect learning evidence to provide timely feedback & refine teaching strategies.. AaL • engages students in reflecting on & monitoring their progress

Robinson Crusoe is an Englishman from the 1) t_______ of York in the seventeenth century, the youngest son of a merchant of German origin. This trip is financially successful,

fostering independent application of reading strategies Strategy 7: Provide opportunities for students to track, reflect on, and share their learning progress (destination). •

Strategy 3: Offer descriptive feedback during the learning process (enabling strategy). Where the

How does drama help to develop English language skills.. In Forms 2-6, students develop their self-expression by participating in a wide range of activities

Now, nearly all of the current flows through wire S since it has a much lower resistance than the light bulb. The light bulb does not glow because the current flowing through it