Proceedings of the First International Workshop on Information Hiding
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
An information-theoretic model for steganography
Information and Computation
Perturbed quantization steganography with wet paper codes
Proceedings of the 2004 workshop on Multimedia and security
Robust watermarking based on DWT and nonnegative matrix factorization
Computers and Electrical Engineering
Adaptive color image watermarking based on a modified improved pixel-wise masking technique
Computers and Electrical Engineering
Feature based robust watermarking using image normalization
Computers and Electrical Engineering
Invariant image watermarking using multi-scale Harris detector and wavelet moments
Computers and Electrical Engineering
YASS: yet another steganographic scheme that resists blind steganalysis
IH'07 Proceedings of the 9th international conference on Information hiding
An extended matrix encoding algorithm for steganography of high embedding efficiency
Computers and Electrical Engineering
Steganalysis of Embedding in Two Least-Significant Bits
IEEE Transactions on Information Forensics and Security
Matrix embedding for large payloads
IEEE Transactions on Information Forensics and Security
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
This paper firstly reviews a classical data hiding scheme based on weight matrix, and then indicates the possibility of improving the embedding efficiency and payload of it when it is applied to grayscale images. An improved steganographic scheme is subsequently proposed to not only accomplish the goal of improving the performance, but also remedy a security vulnerability of previous scheme in a special case of fully-embedding pattern by employing random permutation rather than binary matrix exclusive-or operation. Different from two-bit modification in Tseng's scheme, we use the pixel as the element of embedded block F"i, i.e. [F"i]"j","k@?[0,255]. We can add or subtract a given value to the SUM arbitrarily by modifying only one pixel, which guarantees the imperceptibility effectively. Additionally, the embedding efficiency and payload of proposed scheme will be both increasing at the same time. The experimental results also demonstrate that the proposed scheme is superior to the previous technique in terms of performance and security.