Browse > Article

Image Steganographic Method using Variable Length for Data Embedding  

Jung, Ki-Hyun (영진전문대학 컴퓨터정보계열)
Publication Information
Journal of the Korea Institute of Military Science and Technology / v.11, no.3, 2008 , pp. 115-122 More about this Journal
Abstract
Wu and Tsai's pixel-value differencing method and Chang and Tseng's side-match method are based on the theory that the number of bits which can be embedded is determined by the degree of the pixel's smoothness, or its proximity to the edge of the image. If pixels are located in the edge area, they may tolerate larger changes than those in smooth areas. However, both methods are subject to the fall off the boundary problem(FOBP). This study proposes a new scheme that can solve the FOBP. The experimental results demonstrate that the proposed method resolves the problem, and achieves a higher image quality index value than other methods.
Keywords
Steganography; Information Hiding; Run Length Encoding; Data Hiding;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. C. Wu, W. H. Tsai, A steganographic method for images by pixel-differencing, Pattern Recognition Letters 24(9-10), 1613-1626, 2003   DOI   ScienceOn
2 C. C. Chang, H. W. Tseng, A steganographic method for digital images using side-match, Pattern Recognition Letters 25(12), 1431-1437, 2004   DOI   ScienceOn
3 K. H. Jung, J. G. Yu, S. M. Kim, K. J. Kim, J. Y. Byun, K. Y. Yoo, The hiding of secret data using the run length matching method, LNCS, 1027-1034, 2007
4 Z. Wang, A. C. Bovik, A universal image quality index, IEEE Signal Processing Letters 9, 81-84, 2002   DOI   ScienceOn
5 J. Zollner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, G. Wolf, Modeling the security of steganographic systems, 2nd Workshop on Information Hiding, 345-355, 1998
6 W. Bender, N. Morimoto, A. Lu, Techniques for data hiding, IBM Systems Journal, 35(3/4), 313-336, 1996   DOI   ScienceOn
7 F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn, Information hiding - a survey, Proceedings of the IEEE, special issue on protection of multimedia content, 87(7), 1062-1078, 1999
8 R. C. Gonzalez, R. E. Woods, Digital Image Processing, Prentice Hall, Upper Saddle River, NJ, 2002
9 Neil F. Johnson, Sushil Jajodia, Exploring Steganography : Seeing the Unseen, Computer Practices, 26-34, 1998
10 R. J. Anderson, F. A. P. Petitcolas, On the limits of steganography, IEEE Journal on Selected Areas in Communications 16, 474-481, 1998   DOI   ScienceOn