Loading…

New Image Steganographic Method Using RLC & Modular Arithmetic

Using advantages of previous algorithms along with a novel point, a new low destructive image steganographic method is proposed. The host image is segmented into blocks of pairs of successive pixels. The secret data are hidden in these two-pixel blocks. The secret data is considered as a stream of b...

Full description

Saved in:
Bibliographic Details
Main Authors: Naimi, H.M., Ramazannia, B.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 747
container_issue
container_start_page 744
container_title
container_volume
creator Naimi, H.M.
Ramazannia, B.
description Using advantages of previous algorithms along with a novel point, a new low destructive image steganographic method is proposed. The host image is segmented into blocks of pairs of successive pixels. The secret data are hidden in these two-pixel blocks. The secret data is considered as a stream of bits and is coded using run length coding. Here 0 and 1 s are run values and the number of run values in each run is run count. There are two novel points in this paper, as the first the RLC coded secret bit stream is rearranged so that there is no need to embed run values, and only run counts are embedded. This point reduces the volume of embedded data considerably. As the second point, the run counts greater than a predefined value are embedded in more than one block, limiting local destruction. The embedding process incorporates the modular arithmetic. Using different experiments under various conditions, the proposed algorithm was compared to the last published method. In all experiments, for the same size of embedded data the proposed algorithm has 4 to 12 db lower destruction than the last algorithm.
doi_str_mv 10.1109/ICSPC.2007.4728426
format conference_proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4728426</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4728426</ieee_id><sourcerecordid>4728426</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-fb52f2787978b7ca7ebb9230b0357b179afad572bf1c92fdf1b9faa441f875e53</originalsourceid><addsrcrecordid>eNpVUM1Kw0AYXJGCpeYF9LInb4n7bXbzZS9CCf4E0lasPZfdZDdZaZqSRMS3N2IvzmUYGIaZIeQGWATA1H2ebV-ziDOGkUCeCp5ckEBhCoILATxO5OU_LdMZmf_aFZcAVyQYhg82QUgBIpmTh7X9onmra0u3o631sat7fWp8SVd2bLqK7gZ_rOlbkdE7uuqqz4Pu6bL3Y9Pa0ZfXZOb0YbDBmRdk9_T4nr2ExeY5z5ZF6AHlGDojueOY4tTMYKnRGqN4zAyLJRpApZ2uJHLjoFTcVQ6MclpPC1yK0sp4QW7_cr21dn_qfav77_35gfgHboNLtA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>New Image Steganographic Method Using RLC &amp; Modular Arithmetic</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Naimi, H.M. ; Ramazannia, B.</creator><creatorcontrib>Naimi, H.M. ; Ramazannia, B.</creatorcontrib><description>Using advantages of previous algorithms along with a novel point, a new low destructive image steganographic method is proposed. The host image is segmented into blocks of pairs of successive pixels. The secret data are hidden in these two-pixel blocks. The secret data is considered as a stream of bits and is coded using run length coding. Here 0 and 1 s are run values and the number of run values in each run is run count. There are two novel points in this paper, as the first the RLC coded secret bit stream is rearranged so that there is no need to embed run values, and only run counts are embedded. This point reduces the volume of embedded data considerably. As the second point, the run counts greater than a predefined value are embedded in more than one block, limiting local destruction. The embedding process incorporates the modular arithmetic. Using different experiments under various conditions, the proposed algorithm was compared to the last published method. In all experiments, for the same size of embedded data the proposed algorithm has 4 to 12 db lower destruction than the last algorithm.</description><identifier>ISBN: 9781424412358</identifier><identifier>ISBN: 1424412358</identifier><identifier>EISBN: 9781424412365</identifier><identifier>EISBN: 1424412366</identifier><identifier>DOI: 10.1109/ICSPC.2007.4728426</identifier><identifier>LCCN: 200792511</identifier><language>eng</language><publisher>IEEE</publisher><subject>Arithmetic ; Data mining ; Image coding ; Image segmentation ; Limiting ; Modular Arirhmatic ; Pixel ; Run Length Coding ; Signal processing algorithms ; Speech ; Steganography ; Streaming media</subject><ispartof>2007 IEEE International Conference on Signal Processing and Communications, 2007, p.744-747</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4728426$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2057,27924,54919</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4728426$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Naimi, H.M.</creatorcontrib><creatorcontrib>Ramazannia, B.</creatorcontrib><title>New Image Steganographic Method Using RLC &amp; Modular Arithmetic</title><title>2007 IEEE International Conference on Signal Processing and Communications</title><addtitle>ICSPC</addtitle><description>Using advantages of previous algorithms along with a novel point, a new low destructive image steganographic method is proposed. The host image is segmented into blocks of pairs of successive pixels. The secret data are hidden in these two-pixel blocks. The secret data is considered as a stream of bits and is coded using run length coding. Here 0 and 1 s are run values and the number of run values in each run is run count. There are two novel points in this paper, as the first the RLC coded secret bit stream is rearranged so that there is no need to embed run values, and only run counts are embedded. This point reduces the volume of embedded data considerably. As the second point, the run counts greater than a predefined value are embedded in more than one block, limiting local destruction. The embedding process incorporates the modular arithmetic. Using different experiments under various conditions, the proposed algorithm was compared to the last published method. In all experiments, for the same size of embedded data the proposed algorithm has 4 to 12 db lower destruction than the last algorithm.</description><subject>Arithmetic</subject><subject>Data mining</subject><subject>Image coding</subject><subject>Image segmentation</subject><subject>Limiting</subject><subject>Modular Arirhmatic</subject><subject>Pixel</subject><subject>Run Length Coding</subject><subject>Signal processing algorithms</subject><subject>Speech</subject><subject>Steganography</subject><subject>Streaming media</subject><isbn>9781424412358</isbn><isbn>1424412358</isbn><isbn>9781424412365</isbn><isbn>1424412366</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2007</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNpVUM1Kw0AYXJGCpeYF9LInb4n7bXbzZS9CCf4E0lasPZfdZDdZaZqSRMS3N2IvzmUYGIaZIeQGWATA1H2ebV-ziDOGkUCeCp5ckEBhCoILATxO5OU_LdMZmf_aFZcAVyQYhg82QUgBIpmTh7X9onmra0u3o631sat7fWp8SVd2bLqK7gZ_rOlbkdE7uuqqz4Pu6bL3Y9Pa0ZfXZOb0YbDBmRdk9_T4nr2ExeY5z5ZF6AHlGDojueOY4tTMYKnRGqN4zAyLJRpApZ2uJHLjoFTcVQ6MclpPC1yK0sp4QW7_cr21dn_qfav77_35gfgHboNLtA</recordid><startdate>200711</startdate><enddate>200711</enddate><creator>Naimi, H.M.</creator><creator>Ramazannia, B.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200711</creationdate><title>New Image Steganographic Method Using RLC &amp; Modular Arithmetic</title><author>Naimi, H.M. ; Ramazannia, B.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-fb52f2787978b7ca7ebb9230b0357b179afad572bf1c92fdf1b9faa441f875e53</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2007</creationdate><topic>Arithmetic</topic><topic>Data mining</topic><topic>Image coding</topic><topic>Image segmentation</topic><topic>Limiting</topic><topic>Modular Arirhmatic</topic><topic>Pixel</topic><topic>Run Length Coding</topic><topic>Signal processing algorithms</topic><topic>Speech</topic><topic>Steganography</topic><topic>Streaming media</topic><toplevel>online_resources</toplevel><creatorcontrib>Naimi, H.M.</creatorcontrib><creatorcontrib>Ramazannia, B.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Naimi, H.M.</au><au>Ramazannia, B.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>New Image Steganographic Method Using RLC &amp; Modular Arithmetic</atitle><btitle>2007 IEEE International Conference on Signal Processing and Communications</btitle><stitle>ICSPC</stitle><date>2007-11</date><risdate>2007</risdate><spage>744</spage><epage>747</epage><pages>744-747</pages><isbn>9781424412358</isbn><isbn>1424412358</isbn><eisbn>9781424412365</eisbn><eisbn>1424412366</eisbn><abstract>Using advantages of previous algorithms along with a novel point, a new low destructive image steganographic method is proposed. The host image is segmented into blocks of pairs of successive pixels. The secret data are hidden in these two-pixel blocks. The secret data is considered as a stream of bits and is coded using run length coding. Here 0 and 1 s are run values and the number of run values in each run is run count. There are two novel points in this paper, as the first the RLC coded secret bit stream is rearranged so that there is no need to embed run values, and only run counts are embedded. This point reduces the volume of embedded data considerably. As the second point, the run counts greater than a predefined value are embedded in more than one block, limiting local destruction. The embedding process incorporates the modular arithmetic. Using different experiments under various conditions, the proposed algorithm was compared to the last published method. In all experiments, for the same size of embedded data the proposed algorithm has 4 to 12 db lower destruction than the last algorithm.</abstract><pub>IEEE</pub><doi>10.1109/ICSPC.2007.4728426</doi><tpages>4</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9781424412358
ispartof 2007 IEEE International Conference on Signal Processing and Communications, 2007, p.744-747
issn
language eng
recordid cdi_ieee_primary_4728426
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Arithmetic
Data mining
Image coding
Image segmentation
Limiting
Modular Arirhmatic
Pixel
Run Length Coding
Signal processing algorithms
Speech
Steganography
Streaming media
title New Image Steganographic Method Using RLC & Modular Arithmetic
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T23%3A46%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=New%20Image%20Steganographic%20Method%20Using%20RLC%20&%20Modular%20Arithmetic&rft.btitle=2007%20IEEE%20International%20Conference%20on%20Signal%20Processing%20and%20Communications&rft.au=Naimi,%20H.M.&rft.date=2007-11&rft.spage=744&rft.epage=747&rft.pages=744-747&rft.isbn=9781424412358&rft.isbn_list=1424412358&rft_id=info:doi/10.1109/ICSPC.2007.4728426&rft.eisbn=9781424412365&rft.eisbn_list=1424412366&rft_dat=%3Cieee_6IE%3E4728426%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i175t-fb52f2787978b7ca7ebb9230b0357b179afad572bf1c92fdf1b9faa441f875e53%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4728426&rfr_iscdi=true