Novel steganographic method based on generalized K -distance N -dimensional pixel matching

Verfasser / Beitragende:
[Bingwen Feng, Wei Lu, Wei Sun]
Ort, Verlag, Jahr:
2015
Enthalten in:
Multimedia Tools and Applications, 74/21(2015-11-01), 9623-9646
Format:
Artikel (online)
ID: 605447101
LEADER caa a22 4500
001 605447101
003 CHVBK
005 20210128100130.0
007 cr unu---uuuuu
008 210128e20151101xx s 000 0 eng
024 7 0 |a 10.1007/s11042-014-2140-x  |2 doi 
035 |a (NATIONALLICENCE)springer-10.1007/s11042-014-2140-x 
245 0 0 |a Novel steganographic method based on generalized K -distance N -dimensional pixel matching  |h [Elektronische Daten]  |c [Bingwen Feng, Wei Lu, Wei Sun] 
520 3 |a In this paper, a steganographic scheme adopting the concept of the generalized K d -distance N-dimensional pixel matching is proposed. The generalized pixel matching embeds a B-ary digit (B is a function of K and N) into a cover vector of length N, where the order-d Minkowski distance-measured embedding distortion is no larger than K. In contrast to other pixel matching-based schemes, a N-dimensional reference table is used. By choosing d, K, and N adaptively, an embedding strategy which is suitable for arbitrary relative capacity can be developed. Additionally, an optimization algorithm, namely successive iteration algorithm (SIA), is proposed to optimize the codeword assignment in the reference table. Benefited from the high dimensional embedding and the optimization algorithm, nearly maximal embedding efficiency is achieved. Compared with other content-free steganographic schemes, the proposed scheme provides better image quality and statistical security. Moreover, the proposed scheme performs comparable to state-of-the-art content-based approaches after combining with image models. 
540 |a Springer Science+Business Media New York, 2014 
690 7 |a Steganography  |2 nationallicence 
690 7 |a Pixel matching  |2 nationallicence 
690 7 |a N -dimensional neighborhood  |2 nationallicence 
690 7 |a Successive iteration algorithm (SIA)  |2 nationallicence 
690 7 |a Linear mapping function  |2 nationallicence 
700 1 |a Feng  |D Bingwen  |u The School of Information Science and Technology, Guangdong Key Laboratory of Information Security Technology, Sun Yat-sen University, 510006, Guangzhou, China  |4 aut 
700 1 |a Lu  |D Wei  |u The School of Information Science and Technology, Guangdong Key Laboratory of Information Security Technology, Sun Yat-sen University, 510006, Guangzhou, China  |4 aut 
700 1 |a Sun  |D Wei  |u The School of Software, Sun Yat-sen University, 510006, Guangzhou, China  |4 aut 
773 0 |t Multimedia Tools and Applications  |d Springer US; http://www.springer-ny.com  |g 74/21(2015-11-01), 9623-9646  |x 1380-7501  |q 74:21<9623  |1 2015  |2 74  |o 11042 
856 4 0 |u https://doi.org/10.1007/s11042-014-2140-x  |q text/html  |z Onlinezugriff via DOI 
898 |a BK010053  |b XK010053  |c XK010000 
900 7 |a Metadata rights reserved  |b Springer special CC-BY-NC licence  |2 nationallicence 
908 |D 1  |a research-article  |2 jats 
949 |B NATIONALLICENCE  |F NATIONALLICENCE  |b NL-springer 
950 |B NATIONALLICENCE  |P 856  |E 40  |u https://doi.org/10.1007/s11042-014-2140-x  |q text/html  |z Onlinezugriff via DOI 
950 |B NATIONALLICENCE  |P 700  |E 1-  |a Feng  |D Bingwen  |u The School of Information Science and Technology, Guangdong Key Laboratory of Information Security Technology, Sun Yat-sen University, 510006, Guangzhou, China  |4 aut 
950 |B NATIONALLICENCE  |P 700  |E 1-  |a Lu  |D Wei  |u The School of Information Science and Technology, Guangdong Key Laboratory of Information Security Technology, Sun Yat-sen University, 510006, Guangzhou, China  |4 aut 
950 |B NATIONALLICENCE  |P 700  |E 1-  |a Sun  |D Wei  |u The School of Software, Sun Yat-sen University, 510006, Guangzhou, China  |4 aut 
950 |B NATIONALLICENCE  |P 773  |E 0-  |t Multimedia Tools and Applications  |d Springer US; http://www.springer-ny.com  |g 74/21(2015-11-01), 9623-9646  |x 1380-7501  |q 74:21<9623  |1 2015  |2 74  |o 11042