New image steganographic methods using run-length approach

被引:51
|
作者
Chang, Chin-Chen
Lin, Chih-Yang
Wang, Yu-Zheng
机构
[1] Feng Chia Univ, Dept Comp Sci & Informat Engn, Taichung 40724, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
关键词
steganography; data hiding; run-length encoding;
D O I
10.1016/j.ins.2006.02.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study proposes two efficient data hiding methods incorporating both run-length encoding and modular arithmetic. The first method, BRL (hiding bitmap files by run-length), is suitable for embedding simple data with long streams of repeating bits; the second method, GRL (hiding general files by run-length), is good for embedding complicated data with short streams of repeating bits. Both of the new methods embed secret data in each nonoverlapping block composed of only two consecutive pixels, with the image quality controlled by a modular operation. In addition, the concept of run-length encoding - namely recording the number of repeating bits in the secret data and the bit value itself - is applied for simplicity and efficiency. The experimental results demonstrate that BRL and GRL have their own strengths with respect to different types of secret data. Furthermore, on the average, both can outperform other well-accepted image steganographic methods in terms of image quality and embedding capacity. (C) 2006 Elsevier Inc. All rights reserved.
引用
收藏
页码:3393 / 3408
页数:16
相关论文
共 50 条
  • [1] Binary medical image compression using the volumetric run-length approach
    Aldemir, Erdogan
    Tohumoglu, Gulay
    Selver, M. Alper
    IMAGING SCIENCE JOURNAL, 2019, 67 (03) : 123 - 135
  • [2] An Adaptive JPEG Steganographic Scheme Based on Run-Length Statistical Complexity
    WEN Juan
    ZHANG Jie
    ZHOU Jie
    LI Yan
    XUE Yiming
    Chinese Journal of Electronics, 2018, 27 (01) : 52 - 59
  • [3] An Adaptive JPEG Steganographic Scheme Based on Run-Length Statistical Complexity
    Wen Juan
    Zhang Jie
    Zhou Jie
    Li Yan
    Xue Yiming
    CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (01) : 52 - 59
  • [4] Steganographic access control in data hiding using run-length encoding and modulo-operations
    Lee, Chin-Feng
    Weng, Chi-Yao
    Sharma, Aneesh
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (02) : 139 - 148
  • [5] PARTIAL EIGENVALUE DECOMPOSITION FOR LARGE IMAGE SETS USING RUN-LENGTH ENCODING
    ROSEBOROUGH, JB
    MURASE, H
    PATTERN RECOGNITION, 1995, 28 (03) : 421 - 430
  • [6] Robust template matching using run-length encoding
    Lee, Hunsue
    Suh, Sungho
    Cho, Hansang
    APPLICATIONS OF DIGITAL IMAGE PROCESSING XXXVIII, 2015, 9599
  • [7] Apply Run-length Encoding on Pixel Differences to Do Image Hiding
    Tai, Wei-Liang
    Chan, Chi-Shiang
    Chu, Chien-An
    2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2013,
  • [8] Run-length encoding for volumetric texture
    Xu, DH
    Kurani, AS
    Furst, JD
    Raicu, DS
    Proceedings of the Fourth IASTED International Conference on Visualization, Imaging, and Image Processing, 2004, : 534 - 539
  • [9] Fast Multi-band Blending Using Run-Length Encoding
    Zhao, Yili
    Qian, Wenhua
    Xu, Dan
    2015 14TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN AND COMPUTER GRAPHICS (CAD/GRAPHICS), 2015, : 224 - 225
  • [10] Distinct squares in run-length encoded strings
    Liu, J. J.
    THEORETICAL COMPUTER SCIENCE, 2010, 411 (49) : 4235 - 4241