3/2013 - 16 |
Enhanced Segment Compression Steganographic AlgorithmBUCUR, I. G. , STANESCU, D. , STRATULAT, M. |
Extra paper information in |
Click to see author's profile in SCOPUS, IEEE Xplore, Web of Science |
Download PDF (1,177 KB) | Citation | Downloads: 953 | Views: 4,081 |
Author keywords
digital image, digital signatures, image coding, information security
References keywords
steganography(8), image(8), digital(6), watermarking(5), hiding(5), processing(4)
No common words between the references section and the paper title.
About this article
Date of Publication: 2013-08-31
Volume 13, Issue 3, Year 2013, On page(s): 101 - 106
ISSN: 1582-7445, e-ISSN: 1844-7600
Digital Object Identifier: 10.4316/AECE.2013.03016
Web of Science Accession Number: 000326321600016
SCOPUS ID: 84884911174
Abstract
Steganography is the science and art of concealing messages using techniques that allow only the sender and receiver to know of the messages existence and be able to decipher it. In this article, we would like to present a new steganographic technique for concealing digital images: the Enhanced Segment Compression Steganographic Algorithm (ESCSA). We start by mentioning several desired properties that we have taken into consideration for our algorithm. Next, we define some quality metrics with which we can measure how well / to what extent those properties are achieved. A detailed presentation of the component parts of the algorithm follows, accompanied by quantitative analyses of parameters of interest. Finally, we discuss the strengths and weaknesses of our algorithm. In addition, we make a few suggestions regarding possible further refinements of the ESCSA. |
References | | | Cited By «-- Click to see who has cited this paper |
[1] Frank Y. Shih, Digital Watermarking and Steganography: Fundamentals and Techniques, CRC Press, ISBN 978-1-4200-4757-8, Boca Raton, FL, SUA, 2008
[2] Hajizadeh, M., Helfroush, M. S., Dehghani, M. J., Tashk, A., A Robust Blind Image Watermarking Method Using Local Maximum Amplitude Wavelet Coefficient Quantization, Advances in Electrical and Computer Engineering, vol.10, Issue 3,ISSN: 1582-7445,2010 [3] S.G.Hoggar, "Mathematics of Digital Images", Cambridge University Press, 2006, ISBN-13 9780521780292 [4] Ingemar J. Cox et al, Digital Watermarking and Steganography, 2nd edition, Morgan Kaufmann, ISBN 978-0-12-372585-1, Burlington, MA, SUA, 2008 [5] Daniela Stanescu, Ioan-Gabriel Bucur, Mircea Stratulat, Segment Compression Steganographic Algorithm, International Joint Conference on Computational Cybernetics and Technical Informatics (ICCC-CONTI), ISBN 978-1-4244-7432-5, 2010, pp. 349-354 [6] Eric Cole, Hiding in Plain Sight: Steganography and the Art of Covert Communication, Wiley Publishing, ISBN 0-471-44449-9, Indianapolis, IN, SUA, 2003 [7] Stefan Katzenbeisser, Fabien A. P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, ISBN 1-58053-035-4, Norwood, MA, SUA, 2000 [8] Dafas P., Stathaki T., Digital Image Watermarking using block-based Karhunen-Loeve Transform, Image and Signal Processing and Analysis, ISPA2003, Poceeding of the 3th International Symposium, 18-20, sept. 2003, ISBN: 953-184-061-X, pp1072-1075, vol.2 [9] Michael Gastpar, Pier Luigi Dragotti, Martin Vetterli, The Distribute Karhunen-Loeve Transform, IEEE Transaction on Information Theory, vol. 52, no.12, dec. 2006, pp 512-522 [CrossRef] [Web of Science Times Cited 121] [SCOPUS Times Cited 144] [10] Gregory Kipper, Investigator's Guide to Steganography, CRC Press, ISBN 0849324335, Boca Raton, FL, SUA, 2004 [11] Daniela Sanescu, Valentin Stangaciu, Ioana Gergulescu, Mircea Stratulat, Steganography on Embedded Device, 5th International Symposium on Applied Computational Intelligence and Informatics, SACI 2009, ISBN:978-1-4244-4478-6, Timisoara, 2009, pp.313-317 [12] Boncelet C., MarvelL., Lossless Compression- Based Stegnalysis of LSB Embedded Images, 41st Annual Conference on Information Sciences and Systems, CISS'07,Baltimore, 14-16 March 2007, ISBN:1-4244-1037-1, pp.923-926 [13] Feng H., Effros M., On the rate-distortion performance and computational efficiency of the Karhunen-Loeve Transformfor lossy data compression, IEEE Transaction on Image Processing, feb. 2002, vol.11, Issue2, pp.113-122 [CrossRef] [Web of Science Times Cited 19] [SCOPUS Times Cited 22] [14] Ki-Hyun Jung, Kyeoung-Ju Ha, Kee- Young Yoo, Image Data Hiding Method Based on Multi-Pixel Differencing and LSB Substitution Methods, International Conference on Convergence and Hybrid, Informatin Technology, ICHIT'08, Daejeon, 28-30 Aug., 2008, ISBN: 978-0-7695-3328-5, pp. 355-358 [15] Xiaolong Li, Tieyong Zeng, Bin Yang, Improvement of the Embedding Efficiency of LSB Matching by Sum and Difference Converting Set, IEEE International Conference on Multimedia, Hannover, June 23, 2008, pp.09-212 [16] W. Burger, M. Burger, Digital Image Processing, Springer, 2008, ISBN:978-1-84628-379-6 [CrossRef] [17] Chang C-C., Chou H., Lin c-C., Colour Image-hiding scheme using human visual system, Imaging Science Journal, Oxford, UK, sept. 2006, vol. 54, nr.3, pp.152-163 [CrossRef] [Web of Science Times Cited 3] [SCOPUS Times Cited 3] [18] Eric Cole, Hiding in Plain Sight: Steganography and the Art of Convert Communicating, Wiley Publishing, Inc., Indianapolis, SUA, ISBN: 0-471-44449-9, 2009 [19] Kawaguci E , Eason R., Large Capacity Steganography, U.S.Patent no. 6,473,516, oct. 29, 2002 [20] He Junhui Tang, Shaohua Wu Tingting, On the Security of Steganographic Techniques, Congress on Image and Signal Processing, CIPS, 2008, China, 27-30, May, pp716-719, vol.5 [21] A. Amaricai, O. Boncalo "Implementation of very high radix division in FPGAs" IET Electronics Letters, Vol.48, Issue 18, 2012 [22] [Online] Available: Temporary on-line reference link removed - see the PDF document --- [37] [Online] Available: Temporary on-line reference link removed - see the PDF document Web of Science® Citations for all references: 143 TCR SCOPUS® Citations for all references: 169 TCR Web of Science® Average Citations per reference: 6 ACR SCOPUS® Average Citations per reference: 7 ACR TCR = Total Citations for References / ACR = Average Citations per Reference We introduced in 2010 - for the first time in scientific publishing, the term "References Weight", as a quantitative indication of the quality ... Read more Citations for references updated on 2024-11-15 23:35 in 30 seconds. Note1: Web of Science® is a registered trademark of Clarivate Analytics. Note2: SCOPUS® is a registered trademark of Elsevier B.V. Disclaimer: All queries to the respective databases were made by using the DOI record of every reference (where available). Due to technical problems beyond our control, the information is not always accurate. Please use the CrossRef link to visit the respective publisher site. |
Faculty of Electrical Engineering and Computer Science
Stefan cel Mare University of Suceava, Romania
All rights reserved: Advances in Electrical and Computer Engineering is a registered trademark of the Stefan cel Mare University of Suceava. No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from the Editor. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Faculty of Electrical Engineering and Computer Science, Stefan cel Mare University of Suceava, Romania, if and only if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.
Permission for other use: The copyright owner's consent does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific written permission must be obtained from the Editor for such copying. Direct linking to files hosted on this website is strictly prohibited.
Disclaimer: Whilst every effort is made by the publishers and editorial board to see that no inaccurate or misleading data, opinions or statements appear in this journal, they wish to make it clear that all information and opinions formulated in the articles, as well as linguistic accuracy, are the sole responsibility of the author.