New image steganographic methods using run-length approach

被引:51
|
作者
Chang, Chin-Chen
Lin, Chih-Yang
Wang, Yu-Zheng
机构
[1] Feng Chia Univ, Dept Comp Sci & Informat Engn, Taichung 40724, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
关键词
steganography; data hiding; run-length encoding;
D O I
10.1016/j.ins.2006.02.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study proposes two efficient data hiding methods incorporating both run-length encoding and modular arithmetic. The first method, BRL (hiding bitmap files by run-length), is suitable for embedding simple data with long streams of repeating bits; the second method, GRL (hiding general files by run-length), is good for embedding complicated data with short streams of repeating bits. Both of the new methods embed secret data in each nonoverlapping block composed of only two consecutive pixels, with the image quality controlled by a modular operation. In addition, the concept of run-length encoding - namely recording the number of repeating bits in the secret data and the bit value itself - is applied for simplicity and efficiency. The experimental results demonstrate that BRL and GRL have their own strengths with respect to different types of secret data. Furthermore, on the average, both can outperform other well-accepted image steganographic methods in terms of image quality and embedding capacity. (C) 2006 Elsevier Inc. All rights reserved.
引用
收藏
页码:3393 / 3408
页数:16
相关论文
共 50 条
  • [41] VQ image steganographic method with high embedding capacity using multi-way search approach
    Chang, CC
    Lin, CY
    Wang, YZ
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2005, 3683 : 1058 - 1064
  • [42] GEOMETRY COMPRESSION FOR TIME-VARYING MESHES USING COARSE AND FINE LEVELS OF QUANTIZATION AND RUN-LENGTH ENCODING
    Han, Seung-Ryong
    Yamasaki, Toshihiko
    Aizawa, Kiyoharu
    2008 15TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-5, 2008, : 1045 - 1048
  • [43] Approximate Matching for Run-Length Encoded Strings Is 3SUM-Hard
    Chen, Kuan-Yu
    Hsu, Ping-Hui
    Chao, Kun-Mao
    COMBINATORIAL PATTERN MATCHING, PROCEEDINGS, 2009, 5577 : 168 - 179
  • [44] The hiding of secret data using the run length matching method
    Jung, Ki-Hyun
    Yu, Jae-Gil
    Kim, Se-Min
    Kim, Ki-Jong
    Byun, Jin-Yong
    Yoo, Kee-Young
    AGENT AND MULTI-AGENT SYSTEMS: TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS, 2007, 4496 : 1027 - +
  • [45] StegCure: An Amalgamation of Different Steganographic Methods in GIF Image
    Por, L. Y.
    Lai, W. K.
    Alireza, Z.
    Delina, B.
    PROCEEDINGS OF THE 12TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTERS , PTS 1-3: NEW ASPECTS OF COMPUTERS, 2008, : 420 - +
  • [46] Fast Algorithms for the Shortest Unique Palindromic Substring Problem on Run-Length Encoded Strings
    Kiichi Watanabe
    Yuto Nakashima
    Shunsuke Inenaga
    Hideo Bannai
    Masayuki Takeda
    Theory of Computing Systems, 2020, 64 : 1273 - 1291
  • [47] Fast Algorithms for the Shortest Unique Palindromic Substring Problem on Run-Length Encoded Strings
    Watanabe, Kiichi
    Nakashima, Yuto
    Inenaga, Shunsuke
    Bannai, Hideo
    Takeda, Masayuki
    THEORY OF COMPUTING SYSTEMS, 2020, 64 (07) : 1273 - 1291
  • [48] Efficient generation of CGH of 3-D objects by use of run-length encoding and look-up table methods
    Kim, Seung-Cheol
    Lee, Sang-Tae
    Kim, Eun-Soo
    PRACTICAL HOLOGRAPHY XXIII: MATERIALS AND APPLICATIONS, 2009, 7233
  • [49] Haar Wavelet Transform Image Compression Using Run Length Encoding
    Sahoo, Rashmita
    Roy, Sangita
    Chaudhuri, Sheli Sinha
    2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,
  • [50] New Algorithm for Binary Connected-Component Labeling Based on Run-Length Encoding and Union-Find Sets
    王洪涛
    罗长洲
    王渝
    郭贺
    赵述芳
    Journal of Beijing Institute of Technology, 2010, 19 (01) : 71 - 75