Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(1.06MB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Data Hiding Method With High Embedding Capacity Character
Wen Chung Kuo, Jiin Chiou Cheng, Chun Cheng Wang
Pages - 310 - 317     |    Revised - 30-12-2009     |    Published - 31-01-2010
Volume - 3   Issue - 6    |    Publication Date - January 2010  Table of Contents
MORE INFORMATION
KEYWORDS
data-hiding, stego-image, EMD, cover-image
ABSTRACT
Recently, the data hiding method based on the high embedding capacity by using improved EMD method was proposed by Kuo et al.[6]. They claimed that their scheme can not only hide a great deal of secret data but also keep high safety and good image quality. However, in their scheme, the sender and the receiver must share the synchronous random secret seed before they transmit the stego-image each other. Otherwise, they can not recover the correct secret information from the stego-image. In this paper we propose an improved scheme based on EMD and LSB matching method to overcome the above problem, in other words, the sender does not share the synchronous random secret seed the receiver before the stego-image is transmitted. Observing the experimental results, they show that our proposed scheme acquires high embedding capacity and acceptable stego-image quality.
CITED BY (3)  
1 Guo, and Wang Jun & certificate. (2015). Revised official formula of EMD high-capacity data hiding techniques. Information security communications, 21 (3), 3-12.
2 Parah, S. A., Sheikh, J. A., & Bhat, G. M. (2012). On the realization of a secure, high capacity data embedding technique using joint top-down and down-top embedding approach. Elixir Comp. Sci. & Engg.(49), 10141-10146.
3 Kuo, W. C., Chen, Y. L., Tsai, S. C., & Li, J. S. (2011, October). Single-packet IP Traceback with less logging. In Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2011 Seventh International Conference on (pp. 97-100). IEEE.
1 Google Scholar
2 ScientificCommons
3 Academic Index
4 CiteSeerX
5 refSeek
6 iSEEK
7 Socol@r
8 ResearchGATE
9 Bielefeld Academic Search Engine (BASE)
10 OpenJ-Gate
11 Scribd
12 WorldCat
13 SlideShare
14 PDFCAST
15 PdfSR
1 F. Cayre, C. Fontaine, and T. Furon, “Watermarking Security: Theory and Practice,” IEEE Trans. on Signal Processing Vol.53, No.10, pp.3976-3987, Oct. 2005.
2 C. C. Chang and W. C. Wu, “A Novel Data Hiding Scheme for Keeping High Stego-Image Quality,” Proceedings of the 12th International Conference on MultiMedia Modelling, Bijing, China, pp.225-232, January 2006.
3 A. Ker, “Steganalysis of LSB Matching in Grayscale Images,” IEEE Signal Processing Letters, Vol.12, No.6, pp.441- 444, June 2005.
4 C. F. Lee, Y. R. Wang, and C. C. Chang, “A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction,” IIHMSP 2007, Volume 1, Issue, pp.497 – 500, 26-28 Nov. 2007.
5 J. Mielikainen, “LSB Matching Revisited,” IEEE Signal Processing Letters, Vol.13, No.5, pp.285-287, May 2006.
6 W. C. Kuo, L. C. Wuu, C. N. Shyi, and S. H. Kuo, “A Data Hiding Scheme with High Embedding Capacity Based on General Improving Exploiting Modification Direction method” HIS2009(Accepted), Aug. 2009.
7 R. Z. Wang, C. F. Lin, and J. C. Lin, “Image Hiding by Optimal LSB Substitution and Genetic Algorithm,” Pattern Recognition, Vol.34, No.3, pp.671-683, 2001.
8 H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang, “Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods,” IEE Proceedings-Vision, Image and Signal Processing, Vol.152, No.5, pp.611-615, October 2005.
9 X. Zhang and S. Wang, “Efficient Steganographic Embedding by Exploiting Modification Direction,” IEEE Comm. Letters, Vol.10, No.11, pp.1-3, Nov. 2006.
Associate Professor Wen Chung Kuo
DGT - Taiwan
simon.wkuo@msa.hinet.net
Dr. Jiin Chiou Cheng
- Taiwan
Dr. Chun Cheng Wang
-