Image Steganographic Method using Variable Length for Data Embedding

가변 길이 자료 은닉이 가능한 이미지 스테가노그래픽 방법 연구

  • 정기현 (영진전문대학 컴퓨터정보계열)
  • Published : 2008.06.30

Abstract

Wu and Tsai's pixel-value differencing method and Chang and Tseng's side-match method are based on the theory that the number of bits which can be embedded is determined by the degree of the pixel's smoothness, or its proximity to the edge of the image. If pixels are located in the edge area, they may tolerate larger changes than those in smooth areas. However, both methods are subject to the fall off the boundary problem(FOBP). This study proposes a new scheme that can solve the FOBP. The experimental results demonstrate that the proposed method resolves the problem, and achieves a higher image quality index value than other methods.

Keywords

References

  1. Neil F. Johnson, Sushil Jajodia, Exploring Steganography : Seeing the Unseen, Computer Practices, 26-34, 1998
  2. J. Zollner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, G. Wolf, Modeling the security of steganographic systems, 2nd Workshop on Information Hiding, 345-355, 1998
  3. W. Bender, N. Morimoto, A. Lu, Techniques for data hiding, IBM Systems Journal, 35(3/4), 313-336, 1996 https://doi.org/10.1147/sj.353.0313
  4. D. C. Wu, W. H. Tsai, A steganographic method for images by pixel-differencing, Pattern Recognition Letters 24(9-10), 1613-1626, 2003 https://doi.org/10.1016/S0167-8655(02)00402-6
  5. C. C. Chang, H. W. Tseng, A steganographic method for digital images using side-match, Pattern Recognition Letters 25(12), 1431-1437, 2004 https://doi.org/10.1016/j.patrec.2004.05.006
  6. R. C. Gonzalez, R. E. Woods, Digital Image Processing, Prentice Hall, Upper Saddle River, NJ, 2002
  7. R. J. Anderson, F. A. P. Petitcolas, On the limits of steganography, IEEE Journal on Selected Areas in Communications 16, 474-481, 1998 https://doi.org/10.1109/49.668971
  8. F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn, Information hiding - a survey, Proceedings of the IEEE, special issue on protection of multimedia content, 87(7), 1062-1078, 1999
  9. K. H. Jung, J. G. Yu, S. M. Kim, K. J. Kim, J. Y. Byun, K. Y. Yoo, The hiding of secret data using the run length matching method, LNCS, 1027-1034, 2007
  10. Z. Wang, A. C. Bovik, A universal image quality index, IEEE Signal Processing Letters 9, 81-84, 2002 https://doi.org/10.1109/97.995823