Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector

被引:6
作者
Chang, Chin-Chen [1 ,3 ]
Lee, Jung-San [1 ]
Le, T. Hoang Ngan [2 ]
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Nat Sci Univ, Dept Comp Sci, Hcmc, Vietnam
[3] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
关键词
Security; Wet paper coding; Steganography; Indicator; Fuzzy edge detector; CODES;
D O I
10.1016/j.dsp.2009.11.005
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Data hiding technique can facilitate security and the safe transmission of important information in the digital domain, which generally requires a high embedding payload and good stego image quality. Recently, a steganographic framework known as wet paper coding has been utilized as an effective strategy in image hiding to achieve the requirements of high embedding payload, good quality and robust security. In this paper, besides employing this mechanism as a fundamental stage, we take advantage of two novel techniques, namely, an efficient n-indicator and a fuzzy edge detector. The first is to increase the robustness of the proposed system to guard against being detected or traced by the statistics methods while allowing the receiver without knowledge of secret data positions to retrieve the embedded information. The second is to improve the payload and enhance the quality of stego image. The experimental results show that our proposed scheme outperforms its ability to reduce the conflict among three steganography requirements. (C) 2009 Elsevier Inc. All rights reserved.
引用
收藏
页码:1286 / 1307
页数:22
相关论文
共 25 条
[1]   Improving BTC image compression using a fuzzy complement edge operator [J].
Amarunnishad, T. M. ;
Govindan, V. K. ;
Mathew, Abraham T. .
SIGNAL PROCESSING, 2008, 88 (12) :2989-2997
[2]  
AMARUNNISHAD TM, 2006, IEEE P 14 INT C ADV, V20, P344
[3]   A geometric approach to edge detection [J].
Bezdek, JC ;
Chandrasekhar, R ;
Attikiouzel, Y .
IEEE TRANSACTIONS ON FUZZY SYSTEMS, 1998, 6 (01) :52-75
[4]  
Bierbrauer J, 2008, LECT NOTES COMPUT SC, V4920, P1, DOI 10.1007/978-3-540-69019-1_1
[5]  
Böhme R, 2004, LECT NOTES COMPUT SC, V3200, P82
[6]   Genetic watermarking for zerotree-based applications [J].
Chu, Shu-Chuan ;
Huang, Hsiang-Cheh ;
Shi, Yan ;
Wu, Ssu-Yi ;
Shieh, Chin-Shiuh .
CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2008, 27 (02) :171-182
[7]  
Franz E, 2003, LECT NOTES COMPUT SC, V2578, P278
[8]  
Fridrich J, 2005, LECT NOTES COMPUT SC, V3727, P204
[9]   Writing on wet paper [J].
Fridrich, J ;
Goljan, M ;
Lisonek, P ;
Soukal, D .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (10) :3923-3935
[10]  
Fridrich J, 2000, LECT NOTES COMPUT SC, V1768, P47