Improving the Adaptive Steganographic Methods Based on Modulus Function

نویسندگان

  • Xin Liao
  • Qiaoyan Wen
  • Jie Zhang
چکیده

This letter improves two adaptive steganographic methods in Refs. [5], [6], which utilize the remainders of two consecutive pixels to record the information of secret data. Through analysis, we point out that they perform mistakenly under some conditions, and the recipient cannot extract the secret data exactly. We correct these by enlarging the adjusting range of the remainders of two consecutive pixels within the block in the embedding procedure. Furthermore, the readjusting phase in Ref. [6] is improved by allowing every two-pixel block to be fully modified, and then the sender can select the best choice that introduces the smallest embedding distortion. Experimental results show that the improved method not only extracts secret data exactly but also reduces the embedding distortion. key words: steganography, adaptive steganographic methods, pixel-value differencing, modulus function

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Effect of daily life executive functions training on symptoms and adaptive skills in children with attention deficit/ hyperactivity disorder

Attention Deficit/Hyperactivity Disorder (ADHD) is a neuro-developmental disorder which was diagnosed by three features including: attention deficit, hyperactivity and impulsivity. This study aimed to determine the effect of executive function training based on daily life on reducing symptoms and improving adaptive skills in children with ADHD. 16 children aged 7-10 years old with ADHD were sel...

متن کامل

Improved Steganographic Method Preserving Pixel-Value Differencing Histogram with Modulus Function

We herein advance a secure steganographic algorithm that uses a turnover policy and a novel adjusting process. Although the method of Wang et al. uses Pixel-Value Differencing (PVD) and their modulus function provides high capacity and good image quality, the embedding process causes a number of artifacts, such as abnormal increases and fluctuations in the PVD histogram, which may reveal the ex...

متن کامل

Efficient Public Key Steganography Secure Against Adaptive Chosen Stegotext Attacks

We provide construction of steganographic schemes secure against adaptive chosen stegotext attacks. Our constructions achieve embedding rate equals to the Shannon entropy bound on steganographic channel capacity. Further the covertext distribution can be given as either an integrable probability function or as a random covertext sampler. We also introduce steganographic codes that are of intere...

متن کامل

A DCT-based Mod4 steganographic method

This paper presents a novel Mod4 steganographic method in discrete cosine transform (DCT) domain. Mod4 is a blind steganographic method. A group of 2 2 spatially adjacent quantized DCT coefficients (GQC) is selected as the valid message carrier. The modulus 4 arithmetic operation is then applied to the valid GQC to embed a pair of bits. When modification is required for data embedding, the shor...

متن کامل

Target Detection in Bistatic Passive Radars by Using Adaptive Processing Based on Correntropy Cost Function

In this paper a novel method is introduced for target detection in bistatic passive radars which uses the concept of correntropy to distinguish correct targets from false detections. In proposed method the history of each cell of ambiguity function is modeled as a stochastic process. Then the stochastic processes consist the noise are differentiated from those consisting targets by constructing...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEICE Transactions

دوره 96-A  شماره 

صفحات  -

تاریخ انتشار 2013