New image steganographic methods using run-length approach

被引:51
|
作者
Chang, Chin-Chen
Lin, Chih-Yang
Wang, Yu-Zheng
机构
[1] Feng Chia Univ, Dept Comp Sci & Informat Engn, Taichung 40724, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
关键词
steganography; data hiding; run-length encoding;
D O I
10.1016/j.ins.2006.02.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study proposes two efficient data hiding methods incorporating both run-length encoding and modular arithmetic. The first method, BRL (hiding bitmap files by run-length), is suitable for embedding simple data with long streams of repeating bits; the second method, GRL (hiding general files by run-length), is good for embedding complicated data with short streams of repeating bits. Both of the new methods embed secret data in each nonoverlapping block composed of only two consecutive pixels, with the image quality controlled by a modular operation. In addition, the concept of run-length encoding - namely recording the number of repeating bits in the secret data and the bit value itself - is applied for simplicity and efficiency. The experimental results demonstrate that BRL and GRL have their own strengths with respect to different types of secret data. Furthermore, on the average, both can outperform other well-accepted image steganographic methods in terms of image quality and embedding capacity. (C) 2006 Elsevier Inc. All rights reserved.
引用
收藏
页码:3393 / 3408
页数:16
相关论文
共 50 条
  • [31] Fast algorithms for computing the constrained LCS of run-length encoded strings
    Ann, Hsing-Yen
    Yang, Chang-Biau
    Tseng, Chiou-Ting
    Hor, Chiou-Yi
    THEORETICAL COMPUTER SCIENCE, 2012, 432 : 1 - 9
  • [32] Binary jumbled string matching for highly run-length compressible texts
    Badkobeh, Golnaz
    Fici, Gabriele
    Kroon, Steve
    Liptak, Zsuzsanna
    INFORMATION PROCESSING LETTERS, 2013, 113 (17) : 604 - 608
  • [33] RLH: Bitmap compression technique based on run-length and Huffman encoding
    Stabno, Michal
    Wrembel, Robert
    INFORMATION SYSTEMS, 2009, 34 (4-5) : 400 - 414
  • [34] Lyndon Factorization Algorithms for Small Alphabets and Run-Length Encoded Strings
    Ghuman, Sukhpal Singh
    Giaquinta, Emanuele
    Tarhio, Jorma
    ALGORITHMS, 2019, 12 (06)
  • [35] Computing similarity of run-length encoded strings with affine gap penalty
    Kim, Jin Wook
    Amir, Amihood
    Landau, Gad A.
    Park, Kunsoo
    THEORETICAL COMPUTER SCIENCE, 2008, 395 (2-3) : 268 - 282
  • [36] Dynamic rank/select structures with applications to run-length encoded texts
    Lee, Sunho
    Park, Kunsoo
    THEORETICAL COMPUTER SCIENCE, 2009, 410 (43) : 4402 - 4413
  • [37] Adaptive Run-length Encoding Circuit Based on Cascaded Structure for Target Region Data Extraction of Remote Sensing Image
    Li, Haoyang
    Zheng, Hong
    Han, Chuanzhao
    PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCE ON INTEGRATED CIRCUITS AND MICROSYSTEMS (ICICM), 2016, : 20 - 27
  • [38] A fast algorithm for finding the positions of all squares in a run-length encoded string
    Liu, J. J.
    Huang, G. S.
    Wang, Y. L.
    THEORETICAL COMPUTER SCIENCE, 2009, 410 (38-40) : 3942 - 3948
  • [39] Chain code lossless compression using move-to-front transform and adaptive run-length encoding
    Zalik, Borut
    Lukac, Niko
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2014, 29 (01) : 96 - 106
  • [40] A New Steganographic Method For Grayscale Image Using Graph Coloring Problem
    Douiri, Sidi Mohamed
    Medeni, Mohamed Boy Ould
    Elbernoussi, Souad
    Souidi, El Mamoun
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (02): : 521 - 527