A PSNR-Controllable Data Hiding Algorithm Based on LSBs Substitution
Title | A PSNR-Controllable Data Hiding Algorithm Based on LSBs Substitution |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | Sun, H., Luo, H., Wu, T. Y., Obaidat, M. S. |
Conference Name | 2015 IEEE Global Communications Conference (GLOBECOM) |
Date Published | dec |
Publisher | IEEE |
ISBN Number | 978-1-4799-5952-5 |
Keywords | Algorithm design and analysis, Complexity theory, computation complexity, computational complexity, control theory, Decoding, decoding algorithms, encoding, Image coding, Information security, LSB substitution, mobile devices, PCDH, personal privacy, PSNR, PSNR-controllable data hiding algorithm, pubcrawl170107, Resiliency, Resistance, security, Sensors, steganalysis, steganography |
Abstract | There are more and more systems using mobile devices to perform sensing tasks, but these increase the risk of leakage of personal privacy and data. Data hiding is one of the important ways for information security. Even though many data hiding algorithms have worked on providing more hiding capacity or higher PSNR, there are few algorithms that can control PSNR effectively while ensuring hiding capacity. In this paper, with controllable PSNR based on LSBs substitution- PSNR-Controllable Data Hiding (PCDH), we first propose a novel encoding plan for data hiding. In PCDH, we use the remainder algorithm to calculate the hidden information, and hide the secret information in the last x LSBs of every pixel. Theoretical proof shows that this method can control the variation of stego image from cover image, and control PSNR by adjusting parameters in the remainder calculation. Then, we design the encoding and decoding algorithms with low computation complexity. Experimental results show that PCDH can control the PSNR in a given range while ensuring high hiding capacity. In addition, it can resist well some steganalysis. Compared to other algorithms, PCDH achieves better tradeoff among PSNR, hiding capacity, and computation complexity. |
URL | https://ieeexplore.ieee.org/document/7417631 |
DOI | 10.1109/GLOCOM.2015.7417631 |
Citation Key | sun_psnr-controllable_2015 |
- mobile devices
- Steganography
- steganalysis
- sensors
- security
- Resistance
- Resiliency
- pubcrawl170107
- PSNR-controllable data hiding algorithm
- PSNR
- personal privacy
- PCDH
- Algorithm design and analysis
- LSB substitution
- information security
- Image coding
- encoding
- decoding algorithms
- Decoding
- Control Theory
- computational complexity
- computation complexity
- Complexity theory