New image steganographic methods using run-length approach

被引:51
|
作者
Chang, Chin-Chen
Lin, Chih-Yang
Wang, Yu-Zheng
机构
[1] Feng Chia Univ, Dept Comp Sci & Informat Engn, Taichung 40724, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
关键词
steganography; data hiding; run-length encoding;
D O I
10.1016/j.ins.2006.02.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study proposes two efficient data hiding methods incorporating both run-length encoding and modular arithmetic. The first method, BRL (hiding bitmap files by run-length), is suitable for embedding simple data with long streams of repeating bits; the second method, GRL (hiding general files by run-length), is good for embedding complicated data with short streams of repeating bits. Both of the new methods embed secret data in each nonoverlapping block composed of only two consecutive pixels, with the image quality controlled by a modular operation. In addition, the concept of run-length encoding - namely recording the number of repeating bits in the secret data and the bit value itself - is applied for simplicity and efficiency. The experimental results demonstrate that BRL and GRL have their own strengths with respect to different types of secret data. Furthermore, on the average, both can outperform other well-accepted image steganographic methods in terms of image quality and embedding capacity. (C) 2006 Elsevier Inc. All rights reserved.
引用
收藏
页码:3393 / 3408
页数:16
相关论文
共 50 条
  • [21] A Novel Linguistic Steganography Based on Synonym Run-Length Encoding
    Xiang, Lingyun
    Wang, Xinhui
    Yang, Chunfang
    Liu, Peng
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (02): : 313 - 322
  • [22] An algorithm for the rapid computation of boundaries of run-length encoded regions
    Quek, FKH
    PATTERN RECOGNITION, 2000, 33 (10) : 1637 - 1649
  • [23] MOARLE: Matrix Operation Accelerator Based on Run-Length Encoding
    Oyamada, Masafumi
    Liu, Jianquan
    Narita, Kazuyo
    Araki, Takuya
    WEB TECHNOLOGIES AND APPLICATIONS, APWEB 2014, 2014, 8709 : 425 - 436
  • [24] A Novel Algorithm of Buffer Construction Based on Run-length Encoding
    Wang, Jiechen
    Cui, Can
    Pu, Yingxia
    Ma, Jinsong
    Chen, Gang
    CARTOGRAPHIC JOURNAL, 2010, 47 (03) : 198 - 210
  • [25] Efficient retrieval of approximate palindromes in a run-length encoded string
    Chen, Kuan-Yu
    Hsu, Ping-Hui
    Chao, Kun-Mao
    THEORETICAL COMPUTER SCIENCE, 2012, 432 : 28 - 37
  • [26] Data hiding using run length matching
    School of Computer Information, Yeungjin College, 218 Bokhyun-Dong, Buk-Gu, Daegu 702-721, Korea, Republic of
    不详
    Int. J. Intell. Inf. Database Syst., 2009, 3 (311-325): : 311 - 325
  • [27] Reversible Data Hiding using Block-wise Histogram Shifting and Run-length Encoding
    Murthy, Kandala Sree Rama
    Manikandan, V. M.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (05) : 74 - 80
  • [28] HYSA: HYbrid Steganographic Approach using multiple steganography methods
    Sajedi, Hedieh
    Jamzad, Mansour
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (10) : 1173 - 1184
  • [29] Reversible Data Hiding using Block-wise Histogram Shifting and Run-length Encoding
    Murthy K.S.R.
    Manikandan V.M.
    1600, Science and Information Organization (12): : 74 - 80
  • [30] New Image Steganographic Method Using RLC & Modular Arithmetic
    Naimi, Hossein Miar
    Ramazannia, Bagher
    ICSPC: 2007 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2007, : 744 - 747