Data hiding using run length matching

被引:0
作者
School of Computer Information, Yeungjin College, 218 Bokhyun-Dong, Buk-Gu, Daegu 702-721, Korea, Republic of [1 ]
不详 [2 ]
机构
[1] School of Computer Information, Yeungjin College, Daegu 702-721, 218 Bokhyun-Dong, Buk-Gu
[2] Dept. of Computer Engineering, Kyungpook National University, Daegu 702-701, 1370 Sankuk-Dong, Buk-Gu
来源
Int. J. Intell. Inf. Database Syst. | 2009年 / 3卷 / 311-325期
关键词
Data hiding; Reduced run length matching; RLM; RRLM; Run length encoding; Run length matching; Steganography;
D O I
10.1504/IJIIDS.2009.027689
中图分类号
学科分类号
摘要
This paper proposes two data hiding methods based on run length matching encoding. All of the proposed methods use the location of accumulated run length values where it compares the run length of the cover data with that of the secret data. The run length matching (RLM) method uses the run length table, which is constructed from the cover data and secret data. The reduced run length matching (RRLM) method calculates the difference value before making the run length encoding table. The experimental results demonstrate that RLM and RRLM have their own strengths with respect to different types of data and run length encoding value matching. Copyright © 2009, Inderscience Publishers.
引用
收藏
页码:311 / 325
页数:14
相关论文
共 10 条
[1]  
Anderson R.J., Petitcolas F.A.P., On the limits of steganography, IEEE Journal on Selected Areas in Communications, 16, 4, pp. 474-481, (1998)
[2]  
Chang C.C., Tseng H.W., A steganographic method for digital images using side-match, Pattern Recognition Letters, 25, 12, pp. 1431-1437, (2004)
[3]  
Chang C.C., Lin C.Y., Wang Y.Z., New image steganographic methods using run-length approach, Information Sciences, 176, 22, pp. 3393-3408, (2006)
[4]  
Gonzalez R.C., Woods R.E., Digital Image Processing, (2002)
[5]  
Johnson N.F., Jajodia S., Exploring steganography: Seeing the unseen, Computer Practices, the flagship magazine of the IEEE Computer Society, pp. 26-34, (1998)
[6]  
Jung K.H., Yu J.G., Kim S.M., Kim K.J., Byun J.Y., Yoo K.Y., The hiding of secret data using the run length matching method, Proceedings of Agent and Multi-Agent Systems: Technologies and Applications, 4496, pp. 1027-1034, (2007)
[7]  
Petitcolas F.A.P., Anderson R.J., Kuhn M.G., Information hiding - a survey, Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, 87, 7, pp. 1062-1078, (1999)
[8]  
Wang R.Z., Su C.H., Secret image sharing with smaller shadow images, Pattern Recognition Letters, 27, 6, pp. 551-555, (2006)
[9]  
Wu D.C., Tsai W.H., A steganographic method for images by pixel-differencing, Pattern Recognition Letters, 24, 9-10, pp. 1613-1626, (2003)
[10]  
Zollner J., Federrath H., Klimant H., Pfitzmann A., Piotraschke R., Westfeld A., Wicke G., Wolf G., Modeling the security of steganographic systems, 2nd Workshop on Information Hiding, pp. 345-355, (1998)