New image steganographic methods using run-length approach

被引:51
作者
Chang, Chin-Chen
Lin, Chih-Yang
Wang, Yu-Zheng
机构
[1] Feng Chia Univ, Dept Comp Sci & Informat Engn, Taichung 40724, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
关键词
steganography; data hiding; run-length encoding;
D O I
10.1016/j.ins.2006.02.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study proposes two efficient data hiding methods incorporating both run-length encoding and modular arithmetic. The first method, BRL (hiding bitmap files by run-length), is suitable for embedding simple data with long streams of repeating bits; the second method, GRL (hiding general files by run-length), is good for embedding complicated data with short streams of repeating bits. Both of the new methods embed secret data in each nonoverlapping block composed of only two consecutive pixels, with the image quality controlled by a modular operation. In addition, the concept of run-length encoding - namely recording the number of repeating bits in the secret data and the bit value itself - is applied for simplicity and efficiency. The experimental results demonstrate that BRL and GRL have their own strengths with respect to different types of secret data. Furthermore, on the average, both can outperform other well-accepted image steganographic methods in terms of image quality and embedding capacity. (C) 2006 Elsevier Inc. All rights reserved.
引用
收藏
页码:3393 / 3408
页数:16
相关论文
共 15 条
[1]   On the limits of steganography [J].
Anderson, RJ ;
Petitcolas, FAP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :474-481
[2]  
[Anonymous], 1999, P IEEE INT C IM PROC
[3]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[4]   A steganographic method based upon JPEG and quantization table modification [J].
Chang, CC ;
Chen, TS ;
Chung, LZ .
INFORMATION SCIENCES, 2002, 141 (1-2) :123-138
[5]   A steganographic method for digital images using side match [J].
Chang, CC ;
Tseng, HW .
PATTERN RECOGNITION LETTERS, 2004, 25 (12) :1431-1437
[6]   Robust authentication scheme for protecting copyrights of images and graphics [J].
Chang, CC ;
Hwang, KF ;
Hwang, MS .
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2002, 149 (01) :43-50
[7]  
Fridrich J, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 2, P404, DOI 10.1109/ICIP.1998.723401
[8]  
Gonzalez R., 2019, Digital Image Processing, V2nd
[9]  
Katzenbeisser S., 2000, ARTECH HOUSE LONDON, V1st
[10]   Multipurpose watermarking for image authentication and protection [J].
Lu, CS ;
Liao, HYM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (10) :1579-1592