Improving the Adaptive Steganographic Methods Based on Modulus Function

被引:15
|
作者
Liao, Xin [1 ]
Wen, Qiaoyan [2 ]
Zhang, Jie [3 ]
机构
[1] Hunan Univ, Coll Informat Sci & Engn, Changsha 410082, Hunan, Peoples R China
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[3] Beijing Univ Posts & Telecommun, Sch Sci, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
steganography; adaptive steganographic methods; pixel-value differencing; modulus function; LSB REPLACEMENT METHODS; IMAGES;
D O I
10.1587/transfun.E96.A.2731
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This letter improves two adaptive steganographic methods in Refs. [5], [6], which utilize the remainders of two consecutive pixels to record the information of secret data. Through analysis, we point out that they perform mistakenly under some conditions, and the recipient cannot extract the secret data exactly. We correct these by enlarging the adjusting range of the remainders of two consecutive pixels within the block in the embedding procedure. Furthermore, the readjusting phase in Ref. [6] is improved by allowing every two-pixel block to be fully modified, and then the sender can select the best choice that introduces the smallest embedding distortion. Experimental results show that the improved method not only extracts secret data exactly but also reduces the embedding distortion.
引用
收藏
页码:2731 / 2734
页数:4
相关论文
共 50 条
  • [31] An AMR adaptive steganographic scheme based on the pitch delay of unvoiced speech
    Ren, Yanzhen
    Liu, Dengkai
    Yang, Jing
    Wang, Lina
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (07) : 8091 - 8111
  • [32] An Adaptive JPEG Steganographic Method Based on Weight Distribution for Embedding Costs
    Sun, Yi
    Tang, Guangming
    Bian, Yuan
    Xu, Xiaoyu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (05): : 2723 - 2740
  • [33] A SILK Adaptive Steganographic Scheme Based on Minimizing Distortion in Pitch Domain
    Ren Yanzhen
    Zhong Shan
    Tu Weiping
    Yang Hanyi
    Wang Lina
    IETE TECHNICAL REVIEW, 2021, 38 (01) : 46 - 55
  • [34] Secure steganographic algorithm based on side match and modular function
    Liao, Qi-Nan
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2012, 40 (10): : 2002 - 2008
  • [35] Reversible and adaptive image steganographic method
    Tang, Mingwei
    Hu, Jie
    Song, Wen
    Zeng, Shengke
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2015, 69 (12) : 15 - 24
  • [36] An adaptive steganographic scheme for color images
    Chang, CC
    Tsai, P
    Lin, MH
    FUNDAMENTA INFORMATICAE, 2004, 62 (3-4) : 275 - 289
  • [37] Function-Based Resilience: Improving Performance Through Adaptive Management
    Solomon, J. D.
    Vallero, Daniel
    2018 ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM (RAMS), 2018,
  • [38] Adaptive WENO Methods Based on Radial Basis Function Reconstruction
    Bigoni, Caterina
    Hesthaven, Jan S.
    JOURNAL OF SCIENTIFIC COMPUTING, 2017, 72 (03) : 986 - 1020
  • [39] Adaptive WENO Methods Based on Radial Basis Function Reconstruction
    Caterina Bigoni
    Jan S. Hesthaven
    Journal of Scientific Computing, 2017, 72 : 986 - 1020
  • [40] Secure steganographic methods for palette images
    Fridrich, J
    Du, R
    INFORMATION HIDING, PROCEEDINGS, 2000, 1768 : 47 - 60