JIS  Vol.3 No.3 , July 2012
A New Steganography Method Based on the Complex Pixels
ABSTRACT
Today steganography has attracted the attention of many researchers. In this paper, we propose a new steganography method for secure Data communication on half tone pictures. Using the halftone pictures improve the security and capacity. In this method, the complexity of every pixel in picture is computed, then a neibourhood is defined to compute the complexity of every pixel, and then the complexity of every pixel is computed in the neibourhood. Placing data in the monotonous areas of halftone can explain the presence of hidden data. A method has been represented that surveys the position of every pixel neibouring others and prevents including in monotonous areas. If that was a complicated one, steganography bit after stonehalf will be hidden after scrolling the whole, the process of spreading error will be done. Performing the suggested method improves the quality of placing picture and increases its security.

Cite this paper
A. Hashemi Pour and A. Payandeh, "A New Steganography Method Based on the Complex Pixels," Journal of Information Security, Vol. 3 No. 3, 2012, pp. 202-208. doi: 10.4236/jis.2012.33025.
References
[1]   C.-S. Shieh, H.-C. Huang, F.-H. Wang and J.-S. Pan, “Genetic Watermarking Based on Transform-Domain Techniques,” Pattern Recognition, Vol. 37, No. 3, 2004, pp. 555-565. doi:10.1016/j.patcog.2003.07.003

[2]   P. Wayner, “Disappearing Cryptography: Information Hiding: Steganography and Watermarking,” 2nd Edition, Morgan Kaufmann Publishers Inc., San Francisco, 2002.

[3]   M. Y. Wu and J. H. Lee, “A Novel Data Embedding Method for Two-Color Facsimile Images,” Proceeding of International Symposium on Multimedia Information Processing (ICASSP), Vol. 2, 1998, pp. 1161-1164.

[4]   Y. C. Tseng, Y. Y. Chen and H.-K. Pan, “A Secure Data Hidding Scheme for Binary Images,” IEEE Transaction on Communications, Vol. 50, No. 8, 2002, pp. 1227-1231. doi:10.1109/TCOMM.2002.801488

[5]   T. Mitsa and K. Parker, “Digital Halftoning Using a Blue Noise Mask,” Journal of Optical Society of America A, Vol. 9, No. 11, 1992, pp. 1920-1929. doi:10.1364/JOSAA.9.001920

[6]   M. Wu, E. Tang and B. Liu, “Data Hiding in Digital Binary Image,” Proceeding of IEEE International Conference on Multimedia & Expo, New York, 2000, pp. 393-396.

[7]   R. W. Floyd and L. Steinberg, “Adaptive Algorithm for Spatial Grayscale,” Proceedings of SID, Vol. 17, No. 2, 1976, pp. 75-77.

[8]   T. N. Pappas, J. P. Allebach and D. L. Neuhoff, “Modelbased Digital Halftoning,” IEEE Signal Processing Magazine, Vol. 20, No. 4, 2003, pp. 14-27. doi:10.1109/MSP.2003.1215228

[9]   E. Kawaguchi and R. O. Eason, “Principle and Applications of BPCS Steganography,” Proceedings of SPIE’s International Symposium on Voice, Video, and Data Communications, 1998, pp. 464-473.

[10]   M. S. Fu and O. C. Au, “Data Hiding Watermarking for Halftone Images,” IEEE Transactions on Image Processing, Vol. 11, No. 4, 2008, pp. 477-484.

[11]   M. Jiang, E. K. Wong, N. Memon and X. Wu, “Steganalysis of Halftone Images,” Proceedings of ICASSP, Vol. 2, 2009, pp. ii/793-ii/796.

[12]   S. H. Kim and J. P. Allebach, “Impact of Human Visual System Models on Model Based Halftoning,” IEEE Transaction on Image Processing, Vol. 11, 2004, pp. 258-269.

[13]   H. K. Verma and A. N. Singh, “Robustness of the Digital Image Watermarking Techniques against Brightness and Rotation Attack,” International Journal of Computer Science and Information Security, Vol. 5, No. 1, 2010.

 
 
Top