This letter improves two adaptive steganographic methods in Refs. [5], [6], which utilize the remainders of two consecutive pixels to record the information of secret data. Through analysis, we point out that they perform mistakenly under some conditions, and the recipient cannot extract the secret data exactly. We correct these by enlarging the adjusting range of the remainders of two consecutive pixels within the block in the embedding procedure. Furthermore, the readjusting phase in Ref. [6] is improved by allowing every two-pixel block to be fully modified, and then the sender can select the best choice that introduces the smallest embedding distortion. Experimental results show that the improved method not only extracts secret data exactly but also reduces the embedding distortion.
Xin LIAO
Hunan University
Qiaoyan WEN
Beijing University of Posts and Telecommunications
Jie ZHANG
Beijing University of Posts and Telecommunications
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Xin LIAO, Qiaoyan WEN, Jie ZHANG, "Improving the Adaptive Steganographic Methods Based on Modulus Function" in IEICE TRANSACTIONS on Fundamentals,
vol. E96-A, no. 12, pp. 2731-2734, December 2013, doi: 10.1587/transfun.E96.A.2731.
Abstract: This letter improves two adaptive steganographic methods in Refs. [5], [6], which utilize the remainders of two consecutive pixels to record the information of secret data. Through analysis, we point out that they perform mistakenly under some conditions, and the recipient cannot extract the secret data exactly. We correct these by enlarging the adjusting range of the remainders of two consecutive pixels within the block in the embedding procedure. Furthermore, the readjusting phase in Ref. [6] is improved by allowing every two-pixel block to be fully modified, and then the sender can select the best choice that introduces the smallest embedding distortion. Experimental results show that the improved method not only extracts secret data exactly but also reduces the embedding distortion.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E96.A.2731/_p
Copy
@ARTICLE{e96-a_12_2731,
author={Xin LIAO, Qiaoyan WEN, Jie ZHANG, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Improving the Adaptive Steganographic Methods Based on Modulus Function},
year={2013},
volume={E96-A},
number={12},
pages={2731-2734},
abstract={This letter improves two adaptive steganographic methods in Refs. [5], [6], which utilize the remainders of two consecutive pixels to record the information of secret data. Through analysis, we point out that they perform mistakenly under some conditions, and the recipient cannot extract the secret data exactly. We correct these by enlarging the adjusting range of the remainders of two consecutive pixels within the block in the embedding procedure. Furthermore, the readjusting phase in Ref. [6] is improved by allowing every two-pixel block to be fully modified, and then the sender can select the best choice that introduces the smallest embedding distortion. Experimental results show that the improved method not only extracts secret data exactly but also reduces the embedding distortion.},
keywords={},
doi={10.1587/transfun.E96.A.2731},
ISSN={1745-1337},
month={December},}
Copy
TY - JOUR
TI - Improving the Adaptive Steganographic Methods Based on Modulus Function
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 2731
EP - 2734
AU - Xin LIAO
AU - Qiaoyan WEN
AU - Jie ZHANG
PY - 2013
DO - 10.1587/transfun.E96.A.2731
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E96-A
IS - 12
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - December 2013
AB - This letter improves two adaptive steganographic methods in Refs. [5], [6], which utilize the remainders of two consecutive pixels to record the information of secret data. Through analysis, we point out that they perform mistakenly under some conditions, and the recipient cannot extract the secret data exactly. We correct these by enlarging the adjusting range of the remainders of two consecutive pixels within the block in the embedding procedure. Furthermore, the readjusting phase in Ref. [6] is improved by allowing every two-pixel block to be fully modified, and then the sender can select the best choice that introduces the smallest embedding distortion. Experimental results show that the improved method not only extracts secret data exactly but also reduces the embedding distortion.
ER -