Image Steganographic Scheme Based on Double-layer Magic Matrix

被引:0
|
作者
Shen, Jau-Ji [1 ]
Lee, Chin-Feng [2 ]
Li, Yen-Hsi [1 ]
Agrawal, Somya [2 ]
机构
[1] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung, Taiwan
[2] Chaoyang Univ Technol, Dept Informat Management, Taichung, Taiwan
关键词
data hiding; irreversible data hiding; steganography algorithm; magic matrix scheme;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Data hiding is a technique used for embedding secret messages in a carrier medium which cannot be perceived by human eye. In the data hiding scheme based on the magic matrix, previous methods exploited a magic matrix with various shapes to carry secret messages, but the embedding capacity was often limited. Inspired by the magic matrix scheme using magic signet proposed by Lee et al., the proposed method develops a double-layer magic matrix scheme to enhance the embedding capacity. Under the framework of a double-layer matrix, we tested many combinations of different signet sizes which can carry secret data in various notational number systems. The experimental results show that the proposed scheme had a higher embedding capacity and good image quality compared to the previous methods.
引用
收藏
页码:462 / 467
页数:6
相关论文
共 50 条
  • [11] An Image Steganographic Scheme Based on Support Vector Regression
    Wu, Hsien-Chu
    Liu, Kuo-Ching
    Chang, Jun-Dong
    Huang, Ching-Hui
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 519 - +
  • [12] RETRACTED: A Double-Layer Image Encryption Scheme Based on Chaotic Maps and DNA Strand Displacement (Retracted Article)
    Tang, Zhen
    Yin, Zhixiang
    Wang, Risheng
    Wang, Xiyuan
    Yang, Jing
    Cui, Jianzhong
    JOURNAL OF CHEMISTRY, 2022, 2022
  • [13] Robust Beamforming Method Based on Double-layer Reconstruction of Covariance Matrix
    Cao Silei
    Li Tianyu
    Wang Yao
    2020 SIGNAL PROCESSING - ALGORITHMS, ARCHITECTURES, ARRANGEMENTS, AND APPLICATIONS (SPA), 2020, : 53 - 57
  • [14] A robust beamforming algorithm based on double-layer reconstruction of covariance matrix
    Cao S.
    Zeng W.
    Wang L.
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2021, 47 (08): : 1605 - 1611
  • [15] ELECTRICAL DOUBLE-LAYER INTERACTIONS WITH IMAGE CHARGES
    BRATKO, D
    JONSSON, B
    WENNERSTROM, H
    CHEMICAL PHYSICS LETTERS, 1986, 128 (5-6) : 449 - 454
  • [16] Double-Layer Data Embedding Scheme Based on Three-Pixel Differences
    Chiao-Chih Huang
    Chi-Shiang Chan
    JournalofElectronicScienceandTechnology, 2011, 9 (04) : 297 - 300
  • [17] Efficient authentication scheme for double-layer satellite network
    Zhu H.
    Wu H.
    Zhao H.
    Zhao Y.
    Li H.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (03): : 1 - 9
  • [18] ANALYSIS OF AFTER IMAGE IN DOUBLE-LAYER TARGET IMAGE ORTHICON
    HOSHIYAMA, T
    OKADA, S
    TAKIZAWA, K
    NAKAJIMA, T
    KAJIYAMA, Y
    NEC RESEARCH & DEVELOPMENT, 1970, (18): : 55 - +
  • [19] NDFT-based Image Steganographic Scheme with Discrimination of Tampers
    Wang, Hongxia
    Fan, Mingquan
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (12): : 2340 - 2354
  • [20] A Reversible Image Steganographic Scheme Based on SMVQ and Huffman Coding
    Jiang, Ji-Han
    Shie, Shih-Chieh
    Chung, WeiDer
    Syu, Wei-Jyun
    2013 INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO (ICCVE), 2013, : 486 - 487