The High Embedding Steganographic Method Based on General Multi-EMD

被引:0
|
作者
Kuo, Wen-Chung [1 ]
Wuu, Lih-Chyau [1 ]
Kuo, Shao-Hung [2 ]
机构
[1] Natl Yunlin Univ Sci & Technol, Dept Comp Sci & Informat Engn, Yunlin, Taiwan
[2] Natl Yunlin Univ Sci & Technol, Grad Sch Engn Sci & Technol, Yunlin, Taiwan
关键词
Data hiding; Cover image; Stego image; EMD; Steganographic method;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The hidden secret message capacity, stego-image quality and security are three important conditions for data hiding technology. According to these requirements, an effective security protection with high hiding capacity steganographic method based on general multi-EMD is proposed in this paper. The major contribution of this method is not to need more complicated embedded steps when the secret data is embedded and additional information when the secret data is recovered, respectively. From our simulation results, the proposed scheme not only maintains the original data hiding requirements but also achieves higher capacity than Kuo-Wang scheme.
引用
收藏
页码:286 / 289
页数:4
相关论文
共 50 条
  • [21] A steganographic method for the secure embedding of GIS data streams into aerial photography
    Hebbes, Luke
    Janjua, Faiza Younas
    Livingstone, David
    Orwell, James
    SYMPOTIC '06: JOINT 1ST WORKSHOP ON SENSOR NETWORKS & SYMPOSIUM ON TRENDS IN COMMUNICATIONS - PROCEEDINGS, 2006, : 97 - +
  • [22] Enhance embedding capacity for switch map based multi-group EMD data hiding
    Liu, Yan-Xiao
    Yang, Ching-Nung
    Sun, Qin-Dong
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2019, 16 (05) : 3382 - 3392
  • [23] A Steganographic Method Based on Roberts Operator
    Albdour, Nashat
    Zanoon, Nabeel
    JORDAN JOURNAL OF ELECTRICAL ENGINEERING, 2020, 6 (03): : 265 - 273
  • [24] A perfect maze based steganographic method
    Lee, Hui-Lung
    Lee, Chia-Feng
    Chen, Ling-Hwei
    JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (12) : 2528 - 2535
  • [25] A steganographic method based on tetris games
    Ou, Zhan-He
    Chen, Ling-Hwei
    INFORMATION SCIENCES, 2014, 276 : 343 - 353
  • [26] A steganographic method based on a file attribute
    Hirohisa, Hioki
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 441 - 444
  • [27] An Efficient Steganographic Technique Based on Chaotic Maps and Adpative PPM Embedding
    Najeena, K. S.
    Imran, B. M.
    INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, IMAGE PROCESSING AND PATTERN RECOGNITION (ICSIPR 2013), 2013, : 293 - 297
  • [28] A Steganographic Method for Binary Embedding Using Time-Varying Convolutional Codes
    Lin, Chi-Yuan
    Chen, Kai-Ren
    Wang, Jyun-Jie
    2014 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2014), 2014, : 1221 - 1224
  • [29] A High Quality Steganographic Method Using Morphing
    Bagade, Anant M.
    Talbar, Sanjay N.
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2014, 10 (02): : 256 - 270
  • [30] Steganographic Protection Method Based on Huffman Tree
    Radchenko, Yevgen
    Dychka, Ivan
    Sulema, Yevgeniya
    Suschuk-Sliusarenko, Viktoriya
    Shkurat, Oksana
    ADVANCES IN ARTIFICIAL SYSTEMS FOR MEDICINE AND EDUCATION II, 2020, 902 : 283 - 292