Reversible Steganographic Method with High Payload for JPEG Images
スポンサーリンク
概要
- 論文の詳細を見る
This paper presents a lossless steganography method based on the multiple-base notation approach for JPEG images. Embedding a large amount of secret data in a JPEG-compressed image is a challenge since modifying the quantized DCT coefficients may cause serious image distortion. We propose two main strategies to deal with this problem: (1) we embed the secret values in the middle-frequency of the quantized DCT coefficients, and (2) we limit the number of nonzero values of the quantized DCT coefficients that participate in the embedding process. We also investigated the effect of modifying the standard quantization table. The experimental results show that the proposed method can embed twice as much secret data as the irreversible embedding method of Iwata et al. under the same number of embedded sets. The results also demonstrate how three important factors: (1) the quantization table, (2) the number of selected nonzero quantized DCT coefficients, and (3) the number of selected sets, influence the image quality and embedding capacity.
- (社)電子情報通信学会の論文
- 2008-03-01
著者
-
Chang Chin-chen
Department Of Information Engineering And Computer Science Feng Chia University
-
Chang Chin-chen
Department Of Computer Science And Information Engineering National Chung Cheng University
-
Wang Yu-zheng
Department Of Computer Science And Information Engineering National Chung Cheng University
-
Lin Chih-yang
Department Of Computer Science And Information Engineering National Chung Cheng University
-
CHANG Chin-Chen
Department of Computer Science and Information Engineering, National Chung Cheng University
関連論文
- Reversible Steganographic Method with High Payload for JPEG Images
- Reversible Data Hiding in the VQ-Compressed Domain(Image Processing and Video Processing)
- A Steganographic Method for Hiding Secret Data Using Side Match Vector Quantization(Application Information Security)
- Password Authentication without the Server Public Key(Fundamental Theories for Communications)
- LSB-Based Steganography Using Reflected Gray Code
- Hiding Secret Information Using Adaptive Side-Match VQ(Application Information Security)
- A Secure Multicast Framework in Large and High-Mobility Network Groups
- Secure Key Transfer Protocol Based on Secret Sharing for Group Communications