PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Capacity-Raising Steganography Using Multi-Pixel Differencing and Pixel-Value Shifting Operations

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In order to provide large embedding capacity and to minimize distortion for the stegoimage, a steganographic method using multi-pixel differencing is presented in this paper. It takes into consideration four pixels of a block, and the differences between the lowest gray-value pixel and its surrounding pixels are used to determine the degree of smoothness and sharpness for embedding the secret data. If the difference values are large in a block, and the block is located in the sharp area then more data can be embedded. On the other hand, if the block is located in the smooth area less data can be embedded. The multi-pixel differencing method is employed in our scheme. We also propose the pixel-value shifting method to increase the image quality. The experimental results show that our scheme has a large embedding capacity without creating a noticeable distortion.
Wydawca
Rocznik
Strony
321--336
Opis fizyczny
Bibliogr. 19 poz., fot., tab., wykr.
Twórcy
autor
autor
autor
Bibliografia
  • [1] Anderson, R. R., Peticolas, F. A. P.: On the Limits of Steganography, EEE J. Selected Areas Commun., 16(4), 1998, 474 -481.
  • [2] Artz, D.: Digital Steganographic: Hiding Data within Data, IEEE Internet Comput., 5, 2001, 75 -80.
  • [3] Bender, D. W., Gruhl, N. M., Lu, A.: Techniques for Data Hiding, IBM System J., 35, 1996, 313 -316.
  • [4] Chan, C. K., Chen, L. M.: Hiding Data in Images by Simple LSB Substitution, Pattern Recognition, 37, 2004, 469 -474.
  • [5] Chang, C. C., Tseng, H. W.: A Steganographic Method for Digital Images Using Side Match, Pattern Recognition Letters, 25, 2004, 1431 -1437.
  • [6] Chu, Y. H., Chang, S.: Dynamical Cryptography Based on Synchronized Chaotic Systems, IEE Electronics Letters, 35(2), 1999, 974 -975.
  • [7] Cox, I. J., Miller, M. L., Bloom, J. A.: Watermarking Applications and Their Properties, n: Proc. Internet. Conf. on Information Technology: Coding and Computing, 2000, 6 -10.
  • [8] Cox, I. J., Miller, M. L., Bloom, J. A.: Digital Watermarking: Principles and Pactice, Morgan Kaufmann Publisher, San Francisco, 2001.
  • [9] Fridrich, J., Goljan, M., Du, R.: Reliable Detection of LSB Stegnography in Grayscale and Color Images, In: proc. ACM Workshop on Multimedia and Security, 2001, 27 -30.
  • [10] H., Y. C., Wang, S. J.: Weighted Bipartite Graph for Locating Optimal LSB Substitution for Secret Embedding, Journal of Discrete Mathematical Sciences and Cryptography, 9(1), 2006, 153 -164.
  • [11] Highland, H. J.: Data Encryption: a non-Mathematical Approach, Comput. Security, 16, 1997, 369 -386.
  • [12] Lee, Y. K., Chen, C. H.: Multipurpose watermarking for image authentication and protection, IEE Proceedings on Vision Image, and Signal Processing, 147(3), 2000, 288 -294.
  • [13] Liu, J. C., Shih, M. H.: Generalizations of Pixel-Value Differencing Steganography for Data Hiding in Images, Fundamenta Informaticae, 83(3), 2008, 319 -335.
  • [14] Wang, C. M., Wu, N. I., Tsai, C. S., Hwang, M. S.: A high quality steganographic method with pixel-value differencing and modulus function, Journal of Systems and Software, 81(1), 2008, 150 -158.
  • [15] Wang, R. Z., Lin, C. F., Lin, J. C.: Image Hiding by Optimal LSB Substitution and Genetic Algorithm, Pattern Recognition, 34, 2000, 671 -683.
  • [16] Wu, D. C., Tsai, W. H.: A Steganographic Method for Images by Pixel-Value Differencing, Pattern Recognition Letters, 24, 2004, 1613 -1623.
  • [17] Wu, N. I., Tsai, C. S., Hwang, M. S.: Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods, IEE Proc.-Vis. Images Signal Process., 152(5), 2005, 611 -615.
  • [18] Yang, C. H.,Wang, S. J.,Weng, C. Y.: Analyses of Pixel-Value-Differencing Schemeswith LSB Replacement in Stegonagraphy, In: The Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2007, 445 -448.
  • [19] Yu, Y. H., Chang, C. C., Hu, Y. C.: Hiding Secret Data in Images via Predictive Coding, Pattern Recognition, 38, 2005, 691 -705.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS8-0010-0017
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.