Steganography using block-based adaptive threshold
Steganography is a technique to hide secret information in some other data (we call it a vessel) without leaving any apparent evidence of data alteration. All of the traditional steganographic techniques have limited information-hiding capacity. In this paper, we proposed a new method of the adaptiv...
Saved in:
Published in | 2007 22nd International Symposium on Computer and Information Sciences pp. 1 - 7 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.11.2007
|
Subjects | |
Online Access | Get full text |
ISBN | 142441363X 9781424413638 |
DOI | 10.1109/ISCIS.2007.4456844 |
Cover
Abstract | Steganography is a technique to hide secret information in some other data (we call it a vessel) without leaving any apparent evidence of data alteration. All of the traditional steganographic techniques have limited information-hiding capacity. In this paper, we proposed a new method of the adaptive steganography using complexity on bit planes of color image. Applying fixing threshold and variable length, if we insert information into all bit planes, all bit planes showed different image quality. Therefore, we investigated the complexity on bit plane and data, similarity insert information into bit planes. As a result, the proposed method increased the insertion capacity and improved the image quality as compared to fixing threshold and variable length method. |
---|---|
AbstractList | Steganography is a technique to hide secret information in some other data (we call it a vessel) without leaving any apparent evidence of data alteration. All of the traditional steganographic techniques have limited information-hiding capacity. In this paper, we proposed a new method of the adaptive steganography using complexity on bit planes of color image. Applying fixing threshold and variable length, if we insert information into all bit planes, all bit planes showed different image quality. Therefore, we investigated the complexity on bit plane and data, similarity insert information into bit planes. As a result, the proposed method increased the insertion capacity and improved the image quality as compared to fixing threshold and variable length method. |
Author | Jin-Suk Kang Mee Young Sung Yonghee You |
Author_xml | – sequence: 1 surname: Jin-Suk Kang fullname: Jin-Suk Kang organization: Univ. of Incheon, Incheon – sequence: 2 surname: Yonghee You fullname: Yonghee You organization: Univ. of Incheon, Incheon – sequence: 3 surname: Mee Young Sung fullname: Mee Young Sung organization: Univ. of Incheon, Incheon |
BookMark | eNo1j81KxDAUhSMq6Ix9Ad30BVpvknubZilFx8KAi87C3ZBM0h-tbWmqMG_vgOPZHL6z-OCs2NUwDp6xew4p56Afy6ooq1QAqBSRshzxgkVa5RwFIpcZ0iVb_YN8v2FRCB9wChIKolsmqsU3Zhib2UztMf4O3dDEth8Pn4k1wbvYODMt3Y-Pl3b2oR17d8eua9MHH517zXYvz7viNdm-bcriaZt0GpYkh1qTIjpYyjUI0DwDqzLnDZDNM0FwGrzQymGNYAmkMa7mKjNcgQSQa_bwp-289_tp7r7MfNyfX8pf8utGJA |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ISCIS.2007.4456844 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Xplore IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 9781424413645 1424413648 |
EndPage | 7 |
ExternalDocumentID | 4456844 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AARBI AAWTH ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IERZE OCL RIE RIL |
ID | FETCH-LOGICAL-i90t-80f95755cb5890209160b76dea05b86250160e297d4f40b503aadf176a1703003 |
IEDL.DBID | RIE |
ISBN | 142441363X 9781424413638 |
IngestDate | Wed Aug 27 01:54:53 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-80f95755cb5890209160b76dea05b86250160e297d4f40b503aadf176a1703003 |
PageCount | 7 |
ParticipantIDs | ieee_primary_4456844 |
PublicationCentury | 2000 |
PublicationDate | 2007-Nov. |
PublicationDateYYYYMMDD | 2007-11-01 |
PublicationDate_xml | – month: 11 year: 2007 text: 2007-Nov. |
PublicationDecade | 2000 |
PublicationTitle | 2007 22nd International Symposium on Computer and Information Sciences |
PublicationTitleAbbrev | ISCIS |
PublicationYear | 2007 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0000454255 |
Score | 1.4126706 |
Snippet | Steganography is a technique to hide secret information in some other data (we call it a vessel) without leaving any apparent evidence of data alteration. All... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | BPCS(Bit-Plane Complexity Steganography) Capacity Color Computer science Cryptography Data encapsulation Data engineering Data mining Digital Contents Image quality Protection Similarity Steganography Watermarking |
Title | Steganography using block-based adaptive threshold |
URI | https://ieeexplore.ieee.org/document/4456844 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8JAEJ4AJ0-oYHxnDx4tLN1H2zORgInGBEy4kX2VGJJCtFz89c5uW4zGg7e2h2a7091vdma-bwDuEhMrw9ACGp35iMdURVqrNBJ5mrA8CU0hfbXFs5y-8selWLbg_sCFcc6F4jM38Jchl2-3Zu9DZUOOaJ9y3oY2_mYVV-sQT_FScugeN9ytEZNs2Ug61fdpQ5qh2XA2H8_mlYJh_dYf7VUCuky68NSMqyoq2Qz2pR6Yz1-Sjf8d-DH0v3l85OWAUCfQcsUpdJtGDqRe1z2I56Vbq6JWrya-Fn5NNMLcJvIoZ4myauf3RVKi6T98xqoPi8nDYjyN6mYK0VtGSwSiPMNpF0YLn1lEL0FSnUjrFBUaTzXCK825OEsszznVgjKlbD5KpBr5PYGyM-gU28KdA9E8tlwzY7VhXLo0Ew4PLTLHxZ8L4dQF9PwMrHaVXMaq_vjLvx9fwVEIlwZ63zV0yve9u0GcL_VtMPAXbsaiKg |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFH5BPOgJFYy_7cGjg7L-2HYmElAgJmDCjbRrSwzJIDgu_vW23YbRePC27dB0fWm_1_fe9z2AhygNRUqsBaR15gMaYhFIKeKAmTgiJvJNIV21xYQP3ujznM1r8LjnwmitffGZbrtHn8tX63TnQmUdatE-pvQADi3uU1awtfYRFScmZx3kir3VJZzMK1Gn8j2uaDM46QynveG00DAsx_3RYMXjS78B42pmRVnJqr3LZTv9_CXa-N-pn0Drm8mHXvcYdQo1nZ1Bo2rlgMqd3YRwmuulyEr9auSq4ZdIWqBbBQ7nFBJKbNzJiHJr_A-Xs2rBrP806w2Csp1C8J7g3EKRSezCs1Qyl1u0fgLHMuJKC8ykvdcwpzWnwyRS1FAsGSZCKNONuOi6UwGTc6hn60xfAJI0VFSSVMmUUK7jhGl7beHGbn_DmBaX0HQrsNgUghmL8uev_v58D0eD2Xi0GA0nL9dw7IOnnux3A_V8u9O3FvVzeeeN_QUkdaV3 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2007+22nd+International+Symposium+on+Computer+and+Information+Sciences&rft.atitle=Steganography+using+block-based+adaptive+threshold&rft.au=Jin-Suk+Kang&rft.au=Yonghee+You&rft.au=Mee+Young+Sung&rft.date=2007-11-01&rft.pub=IEEE&rft.isbn=9781424413638&rft.spage=1&rft.epage=7&rft_id=info:doi/10.1109%2FISCIS.2007.4456844&rft.externalDocID=4456844 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424413638/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424413638/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424413638/sc.gif&client=summon&freeimage=true |