IHW '01 Proceedings of the 4th International Workshop on Information Hiding
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
The upper and lower bounds of the information-hiding capacity of digital images
Information Sciences: an International Journal
Adaptive embedding techniques for VQ-compressed images
Information Sciences: an International Journal
A high payload frequency-based reversible image hiding method
Information Sciences: an International Journal
On steganographic embedding efficiency
IH'06 Proceedings of the 8th international conference on Information hiding
LTSB steganalysis based on quartic equation
Transactions on data hiding and multimedia security II
Data hiding using run length matching
International Journal of Intelligent Information and Database Systems
New image steganographic methods using run-length approach
Information Sciences: an International Journal
Matrix embedding for large payloads
IEEE Transactions on Information Forensics and Security
Capacity and codes for embedding information in gray-scale signals
IEEE Transactions on Information Theory
Grid Colorings in Steganography
IEEE Transactions on Information Theory
Secret sharing with multi-cover adaptive steganography
Information Sciences: an International Journal
Hi-index | 0.07 |
Recently, a number of covering schemes proposed to exploit embedding capacity in covering images using matrix encoding. When binary secret data include a high frequency of repeated bit-blocks, a preprocessing phase is employed to compress secret data prior to the embedding process regardless of whether the compressed secret data still contain some repeated bit-blocks. This paper proposes two novel compact covering schemes, compact covering scheme (CCS) and intelligent compact covering scheme (ICCS), which directly compress and conceal the repeated bit-blocks of secret data bits into covering images within a single phase. The proposed schemes can exploit the embedding capacity and increase the embedding efficiency by reducing the required encoding operations. In addition, the proposed ICCS scheme can indicate up to which degree of repeated bit-blocks of secret data it can take advantage of in order to improve the embedding capacity. Experimental results demonstrate that the proposed ICCS method can significantly improve the embedding capacity when the ratio of the repeated bit-blocks over the total number of blocks is low. The proposed schemes are feasible for actual data-hiding applications.