Home   >   CSC-OpenAccess Library   >    Manuscript Information
Data Hiding Method With High Embedding Capacity Character
Wen Chung Kuo, Jiin Chiou Cheng, Chun Cheng Wang
Pages - 310 - 317     |    Revised - 30-12-2009     |    Published - 31-01-2010
Volume - 3   Issue - 6    |    Publication Date - January 2010  Table of Contents
data-hiding, stego-image, EMD, cover-image
Recently, the data hiding method based on the high embedding capacity by using improved EMD method was proposed by Kuo et al.[6]. They claimed that their scheme can not only hide a great deal of secret data but also keep high safety and good image quality. However, in their scheme, the sender and the receiver must share the synchronous random secret seed before they transmit the stego-image each other. Otherwise, they can not recover the correct secret information from the stego-image. In this paper we propose an improved scheme based on EMD and LSB matching method to overcome the above problem, in other words, the sender does not share the synchronous random secret seed the receiver before the stego-image is transmitted. Observing the experimental results, they show that our proposed scheme acquires high embedding capacity and acceptable stego-image quality.
CITED BY (3)  
1 Guo, and Wang Jun & certificate. (2015). Revised official formula of EMD high-capacity data hiding techniques. Information security communications, 21 (3), 3-12.
2 Parah, S. A., Sheikh, J. A., & Bhat, G. M. (2012). On the realization of a secure, high capacity data embedding technique using joint top-down and down-top embedding approach. Elixir Comp. Sci. & Engg.(49), 10141-10146.
3 Kuo, W. C., Chen, Y. L., Tsai, S. C., & Li, J. S. (2011, October). Single-packet IP Traceback with less logging. In Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2011 Seventh International Conference on (pp. 97-100). IEEE.
1 Google Scholar 
2 ScientificCommons 
3 Academic Index 
4 CiteSeerX 
5 refSeek 
6 iSEEK 
7 Socol@r  
8 ResearchGATE 
9 Bielefeld Academic Search Engine (BASE) 
10 OpenJ-Gate 
11 Scribd 
12 WorldCat 
13 SlideShare 
15 PdfSR 
A. Ker, “Steganalysis of LSB Matching in Grayscale Images,” IEEE Signal Processing Letters, Vol.12, No.6, pp.441- 444, June 2005.
C. C. Chang and W. C. Wu, “A Novel Data Hiding Scheme for Keeping High Stego-Image Quality,” Proceedings of the 12th International Conference on MultiMedia Modelling, Bijing, China, pp.225-232, January 2006.
C. F. Lee, Y. R. Wang, and C. C. Chang, “A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction,” IIHMSP 2007, Volume 1, Issue, pp.497 – 500, 26-28 Nov. 2007.
F. Cayre, C. Fontaine, and T. Furon, “Watermarking Security: Theory and Practice,” IEEE Trans. on Signal Processing Vol.53, No.10, pp.3976-3987, Oct. 2005.
H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang, “Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods,” IEE Proceedings-Vision, Image and Signal Processing, Vol.152, No.5, pp.611-615, October 2005.
J. Mielikainen, “LSB Matching Revisited,” IEEE Signal Processing Letters, Vol.13, No.5, pp.285-287, May 2006.
R. Z. Wang, C. F. Lin, and J. C. Lin, “Image Hiding by Optimal LSB Substitution and Genetic Algorithm,” Pattern Recognition, Vol.34, No.3, pp.671-683, 2001.
W. C. Kuo, L. C. Wuu, C. N. Shyi, and S. H. Kuo, “A Data Hiding Scheme with High Embedding Capacity Based on General Improving Exploiting Modification Direction method” HIS2009(Accepted), Aug. 2009.
X. Zhang and S. Wang, “Efficient Steganographic Embedding by Exploiting Modification Direction,” IEEE Comm. Letters, Vol.10, No.11, pp.1-3, Nov. 2006.
Associate Professor Wen Chung Kuo
DGT - Taiwan
Dr. Jiin Chiou Cheng
- Taiwan
Dr. Chun Cheng Wang