Tytuł artykułu
Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
Simple least-significant-bit (LSB) substitution is the most straightforward way to embed the secret image in the host image. Based on the simple LSB substitution, the method using substitution table is proposed to improve the quality of the stego-image. In this paper, we shall bring up a new method that uses the un-embedded host pixel bits to partition the host pixel into different planes. This way, we can derive the optimal substitution table for each plane. By combining the optimal substitution tables, we can obtain the final result that we call the multi-bit-reference substitution table. After transforming the secret data according multi-bit-reference substitution table, we can embed the transformed secret data in the host image so that the host image will be degraded possibly less. The experimental results show that our method leads to good results.
Słowa kluczowe
Wydawca
Czasopismo
Rocznik
Tom
Strony
291--305
Opis fizyczny
Bibliogr. 13 poz., fot., tab.
Twórcy
autor
- Department of Computer Science and Information Engineering, National Chung Cheng Uniersity, Chiayi, Taiwan, 621, R.O.C
autor
- Department of Computer Science and Information Engineering, National Chung Cheng Uniersity, Chiayi, Taiwan, 621, R.O.C
- Department of Computer Science and Information Engineering, National Chung Cheng Uniersity, Chiayi, Taiwan, 621, R.O.C.
Bibliografia
- [1] Bender, D. W., Gruhl, N. M., Lu, A.: Techniques for Data Hiding, IBM Systems Journal, 35, 1996, 313-336.
- [2] Chan, C. K., Cheng, L. M.: Hiding Data in Images by Simple LSB Substitution, Pattern Recognition, 37(3), 2004, 469-474.
- [3] Chu, Y. H.,Chang, S.: Dynamical Cryptography Based on Synchronized Chaotic Systems, Electronics Letters, 35(12), 1999, 974-975.
- [4] Chun, W. D., Hsiang, T. E.: Data Hiding in Images via Multiple-based Number Conversion and Lossy Compression, IEEE Transactions on Consumer Electronics, 44(4), 1998, 1406-1412.
- [5] Chang, C. C., Hsiao, J. Y., Chan, C. S.: Finding Optimal LSB Substitution in Image Hiding by Dynamic Programming Strategy, Pattern Recognition, 36(7), 2003, 1583-1595.
- [6] Fu, M. S., Au, O. C.: Halftone Image Data Hiding with Intensity Selection and Connection Selection, Signal Processing: Image Communication, 16(10), 2001, 909-930.
- [7] Fu, M. S., Au, O. C.: Steganography in Halftone Images: Conjugate Error Diffusion, Signal Processing, 83(10), 2003, 2171-2178.
- [8] Highland, H. J.: Data Encryption: a Non-mathematical Approach, Computer Security, 16, 1997, 369-386.
- [9] Maniccam, S. S., Bourbakis, N.: Lossless Compression and Information Hiding in Images, Pattern Recognition, 37(3), 2004, 475-486.
- [10] Pei, S. C., Guo, J. M.: Data Hiding in Halftone Images with Noise-Balanced Error Diffusion, IEEE Signal Processing Letters, 10(12), 2003, 345-351.
- [11] Spaulding, J., Noda, H., Shirazi, M. N., Kawaguchi, E.: BPCS Steganography Using EZW Lossy Compressed Images, Pattern Recognition Letters, 23(13), 2002, 1579-1587.
- [12] Wu, M. Y., Ho, Y. K., Lee, J. H.: An Iterative Method of Palette-based Image Steganography, Pattern Recognition Letters, 25(3), 2004, 301-309.
- [13] Wang, R. Z., Lin, C. F., Lin, J. C.: Hiding by Optimal LSB Substitution and Genetic Algorithm, Pattern Recognition, 34(3), 2001, 671-683.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS2-0007-0014