PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Adaptive Data Embedding Scheme Based on Similar and Dissimilar Clustering Strategies

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Embedding large amounts of secret data into a cover image with low distortion is an important research issue in steganography. The proposed scheme uses two clustering technologies - similar and dissimilar clustering - to enhance hiding capacity as provided by Du and Hsu’s scheme. In general, the hiding capacity of our proposed scheme is higher than that of Du and Hsu’s scheme, about 16 Kb for the same image quality. In addition, the image quality of our proposed scheme is more than provided by the schemes of either Du and Hsu’s or Shie et al., about 2 dB. Moreover, the distortion for each test image in our proposed scheme is always less than those caused by Du and Hsu’s and Shie et al.’s schemes. Experimental results confirm that the proposed scheme is significantly better than earlier works.
Wydawca
Rocznik
Strony
23--45
Opis fizyczny
bibliogr. 28 poz., tab., wykr.
Twórcy
autor
autor
autor
  • Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan, R.O.C., ccc@cs.ccu.edu.tw
Bibliografia
  • [1] Bender, W. and Gruhl, D., Morimoto, N., and Lu, A.: Techniques for data hiding, IBM systems Journal, vol. 35, no. 3&4, pp. 313-336, 1996.
  • [2] Chan, C. K. and Cheng, L. M.: Hiding data in images by simple LSB substitution, Pattern Recognition, vol. 37, no. 3, pp. 469-474, 2004.
  • [3] Chang, C. C., Hsiao, J. Y. and Chan, C. S.: Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy, Pattern Recognition, vol. 36, no. 7, pp. 1583-1593, 2003.
  • [4] Chang, C. C. and Lin, C. Y.: Reversible steganography for VQ-compressed images using side matching and relocation, IEEE Transactions on Information Forensics and Security, vol. 1, no. 4, pp. 493-501, 2006.
  • [5] Chang, C. C., Lin, C. Y. and Wang, Y. Z.: New image steganographic methods using run-length approach, Information Sciences, vol. 176, no. 22, pp. 3393-3408, Feb. 2006.
  • [6] Chang, C. C., Tai, W. L. and Lin, C. C.: A reversible data hiding scheme based on side match vector quantization, IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 10, pp. 1301-1308, Jul. 2006.
  • [7] Chen, B., Latifi, S., and Kanai, J.: Edge enhancement of remote image data in the DCT domain, Image and Vision Computing, vol. 17, no. 12, pp. 913-921, 1999.
  • [8] Chang, C. C., Lin, C. C., and Chou, H.: A color image hiding scheme using human visual system, Imaging Science Journal, vol. 54, no. 3, pp. 152-163, 2006.
  • [9] Cox, I. J., Kilian, J., Leigiton, T., and Shamoon, T.: Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673-1687, 1997.
  • [10] Du,W. C. and Hsu,W. J.: Adaptive data hiding based on VQ compressed images, IEE Proceedings on Vision Image Signal Processing, vol. 150, no. 4, pp. 233-238, 2003.
  • [11] Hsu, C. T. andWu, J. L.: Hidden digital watermarks in images, IEEE Transactions on Image Processing, vol. 8, no. 1, pp. 58-68, 1999.
  • [12] Johnson, N. F. and Jajodia, S.: Steganography: seeing the unseen, IEEE Computing, vol. 31, no. 2, pp. 26-34, 1998.
  • [13] Kamstra, L. H. and Henk, J. A. M: Reversible data embedding into images using Wavelet techniques and sorting, IEEE Transactions on Image Processing, vol. 14, no. 12, pp. 2082-2090, 2005.
  • [14] Kim, T.: Side match and overlap match vector quantizers for images, IEEE Transactions on Image Processing, vol. 1, no. 2, pp. 170-185, 1992.
  • [15] Lee, Y.K. and Chen, L. H.: High capacity image steganographicmodel, IEE Proceedings-Vision, Image, and Signal Processing, vol. 147, no. 3, pp. 288-294, 2000.
  • [16] Lin, S. D. and Shie, S. C.: Side-match finite-state vector quantization with adaptive block classification for image compression, IEICE Transactions on Information Systems, vol. E83-D, no. 8, pp. 1671-1678, 2000.
  • [17] Lin, Y. C. and Tai, S. C.: A fast linde-buzo-gray algorithm in image vector quantization, IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, vol. 45, no. 3, pp. 432-435, 1998.
  • [18] Lin, Y. C. andWang, C. C.: Digital images watermarking by vector quantization, Proceedings of 9th National Computer Symposium, Taichung, Taiwan, pp. 76-87, 1999.
  • [19] Lu, C. S., Huang, S. K., Sze, C. J. and Liao, H. Y. M.: A new watermarking technique for multimedia protection, Multimedia Image and Video Processing, eds. Ling Guan, Jan Larsen, and S. Y. Kung, CRC Press Inc., Chapter 18, pp.507-530, 2000.
  • [20] Lu, Z. M. and Sun, S. H.: Digital image watermarking technique based on vector quantization, Electronics Letters, vol. 36, no. 4, pp. 303-305, 2000.
  • [21] Munteanu, A., Cornelis, J., Auwera, G. V. D. and Cristea, P.: Wavelet image compression - the quadtree coding approach, IEEE Transactions on Technology in Bilmedicine, vol. 3, no. 3, pp. 176-185, 1999.
  • [22] Nasrabadi, N. M. and King, R. A.: Image coding using vector quantization: A review, IEEE Transactions on Communications, vol. 36, no. 8, pp. 957-971, 1988.
  • [23] Pai, Y. T. and Ruan, S. J.: Low power block-based watermarking algorithm, IEICE Transactions on Information and Systems, vol. E89-D, no. 4, pp. 1507-1514, 2006.
  • [24] Pfitzman, B.: Information hiding terminology, InformationHiding: First InternationalWorkshop, Cambridge UK, Lecture Notes in Computer Science, 1174, Springer-Verlag, Berlin Heidelberg New York, pp. 347-350, 1996.
  • [25] Shie, S. C., Lin, S. D. and Fang, C.M.: Adaptive data hiding based on SMVQ prediction, IEICE Transactions on Information and Systems, vol. E89-D, no. 1, pp. 358-362, 2006.
  • [26] Vanderkooy, J. and Lipshitz, S. P.: Resolution below the least significant bit in digital systems with dither, IJ. Audio Eng. Soc., vol. 32, pp. 106-113, Correction Ibid., p. 889, 1984.
  • [27] Walker, J. S.: Fast fourier transforms, 2nd ed., Boca Raton, FL: CRC Press, 1996.
  • [28] Wang, R. Z., Lin, C. F. and Lin, J. C.: Image hiding by optimal LSB substitution and genetic algorithm, Pattern Recognition, vol. 34, no. 3, pp. 671-683, 2001.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS8-0003-0028
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.