Loading…
New Image Steganographic Method Using RLC & Modular Arithmetic
Using advantages of previous algorithms along with a novel point, a new low destructive image steganographic method is proposed. The host image is segmented into blocks of pairs of successive pixels. The secret data are hidden in these two-pixel blocks. The secret data is considered as a stream of b...
Saved in:
Main Authors: | , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 747 |
container_issue | |
container_start_page | 744 |
container_title | |
container_volume | |
creator | Naimi, H.M. Ramazannia, B. |
description | Using advantages of previous algorithms along with a novel point, a new low destructive image steganographic method is proposed. The host image is segmented into blocks of pairs of successive pixels. The secret data are hidden in these two-pixel blocks. The secret data is considered as a stream of bits and is coded using run length coding. Here 0 and 1 s are run values and the number of run values in each run is run count. There are two novel points in this paper, as the first the RLC coded secret bit stream is rearranged so that there is no need to embed run values, and only run counts are embedded. This point reduces the volume of embedded data considerably. As the second point, the run counts greater than a predefined value are embedded in more than one block, limiting local destruction. The embedding process incorporates the modular arithmetic. Using different experiments under various conditions, the proposed algorithm was compared to the last published method. In all experiments, for the same size of embedded data the proposed algorithm has 4 to 12 db lower destruction than the last algorithm. |
doi_str_mv | 10.1109/ICSPC.2007.4728426 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4728426</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4728426</ieee_id><sourcerecordid>4728426</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-fb52f2787978b7ca7ebb9230b0357b179afad572bf1c92fdf1b9faa441f875e53</originalsourceid><addsrcrecordid>eNpVUM1Kw0AYXJGCpeYF9LInb4n7bXbzZS9CCf4E0lasPZfdZDdZaZqSRMS3N2IvzmUYGIaZIeQGWATA1H2ebV-ziDOGkUCeCp5ckEBhCoILATxO5OU_LdMZmf_aFZcAVyQYhg82QUgBIpmTh7X9onmra0u3o631sat7fWp8SVd2bLqK7gZ_rOlbkdE7uuqqz4Pu6bL3Y9Pa0ZfXZOb0YbDBmRdk9_T4nr2ExeY5z5ZF6AHlGDojueOY4tTMYKnRGqN4zAyLJRpApZ2uJHLjoFTcVQ6MclpPC1yK0sp4QW7_cr21dn_qfav77_35gfgHboNLtA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>New Image Steganographic Method Using RLC & Modular Arithmetic</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Naimi, H.M. ; Ramazannia, B.</creator><creatorcontrib>Naimi, H.M. ; Ramazannia, B.</creatorcontrib><description>Using advantages of previous algorithms along with a novel point, a new low destructive image steganographic method is proposed. The host image is segmented into blocks of pairs of successive pixels. The secret data are hidden in these two-pixel blocks. The secret data is considered as a stream of bits and is coded using run length coding. Here 0 and 1 s are run values and the number of run values in each run is run count. There are two novel points in this paper, as the first the RLC coded secret bit stream is rearranged so that there is no need to embed run values, and only run counts are embedded. This point reduces the volume of embedded data considerably. As the second point, the run counts greater than a predefined value are embedded in more than one block, limiting local destruction. The embedding process incorporates the modular arithmetic. Using different experiments under various conditions, the proposed algorithm was compared to the last published method. In all experiments, for the same size of embedded data the proposed algorithm has 4 to 12 db lower destruction than the last algorithm.</description><identifier>ISBN: 9781424412358</identifier><identifier>ISBN: 1424412358</identifier><identifier>EISBN: 9781424412365</identifier><identifier>EISBN: 1424412366</identifier><identifier>DOI: 10.1109/ICSPC.2007.4728426</identifier><identifier>LCCN: 200792511</identifier><language>eng</language><publisher>IEEE</publisher><subject>Arithmetic ; Data mining ; Image coding ; Image segmentation ; Limiting ; Modular Arirhmatic ; Pixel ; Run Length Coding ; Signal processing algorithms ; Speech ; Steganography ; Streaming media</subject><ispartof>2007 IEEE International Conference on Signal Processing and Communications, 2007, p.744-747</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4728426$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2057,27924,54919</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4728426$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Naimi, H.M.</creatorcontrib><creatorcontrib>Ramazannia, B.</creatorcontrib><title>New Image Steganographic Method Using RLC & Modular Arithmetic</title><title>2007 IEEE International Conference on Signal Processing and Communications</title><addtitle>ICSPC</addtitle><description>Using advantages of previous algorithms along with a novel point, a new low destructive image steganographic method is proposed. The host image is segmented into blocks of pairs of successive pixels. The secret data are hidden in these two-pixel blocks. The secret data is considered as a stream of bits and is coded using run length coding. Here 0 and 1 s are run values and the number of run values in each run is run count. There are two novel points in this paper, as the first the RLC coded secret bit stream is rearranged so that there is no need to embed run values, and only run counts are embedded. This point reduces the volume of embedded data considerably. As the second point, the run counts greater than a predefined value are embedded in more than one block, limiting local destruction. The embedding process incorporates the modular arithmetic. Using different experiments under various conditions, the proposed algorithm was compared to the last published method. In all experiments, for the same size of embedded data the proposed algorithm has 4 to 12 db lower destruction than the last algorithm.</description><subject>Arithmetic</subject><subject>Data mining</subject><subject>Image coding</subject><subject>Image segmentation</subject><subject>Limiting</subject><subject>Modular Arirhmatic</subject><subject>Pixel</subject><subject>Run Length Coding</subject><subject>Signal processing algorithms</subject><subject>Speech</subject><subject>Steganography</subject><subject>Streaming media</subject><isbn>9781424412358</isbn><isbn>1424412358</isbn><isbn>9781424412365</isbn><isbn>1424412366</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2007</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNpVUM1Kw0AYXJGCpeYF9LInb4n7bXbzZS9CCf4E0lasPZfdZDdZaZqSRMS3N2IvzmUYGIaZIeQGWATA1H2ebV-ziDOGkUCeCp5ckEBhCoILATxO5OU_LdMZmf_aFZcAVyQYhg82QUgBIpmTh7X9onmra0u3o631sat7fWp8SVd2bLqK7gZ_rOlbkdE7uuqqz4Pu6bL3Y9Pa0ZfXZOb0YbDBmRdk9_T4nr2ExeY5z5ZF6AHlGDojueOY4tTMYKnRGqN4zAyLJRpApZ2uJHLjoFTcVQ6MclpPC1yK0sp4QW7_cr21dn_qfav77_35gfgHboNLtA</recordid><startdate>200711</startdate><enddate>200711</enddate><creator>Naimi, H.M.</creator><creator>Ramazannia, B.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200711</creationdate><title>New Image Steganographic Method Using RLC & Modular Arithmetic</title><author>Naimi, H.M. ; Ramazannia, B.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-fb52f2787978b7ca7ebb9230b0357b179afad572bf1c92fdf1b9faa441f875e53</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2007</creationdate><topic>Arithmetic</topic><topic>Data mining</topic><topic>Image coding</topic><topic>Image segmentation</topic><topic>Limiting</topic><topic>Modular Arirhmatic</topic><topic>Pixel</topic><topic>Run Length Coding</topic><topic>Signal processing algorithms</topic><topic>Speech</topic><topic>Steganography</topic><topic>Streaming media</topic><toplevel>online_resources</toplevel><creatorcontrib>Naimi, H.M.</creatorcontrib><creatorcontrib>Ramazannia, B.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Naimi, H.M.</au><au>Ramazannia, B.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>New Image Steganographic Method Using RLC & Modular Arithmetic</atitle><btitle>2007 IEEE International Conference on Signal Processing and Communications</btitle><stitle>ICSPC</stitle><date>2007-11</date><risdate>2007</risdate><spage>744</spage><epage>747</epage><pages>744-747</pages><isbn>9781424412358</isbn><isbn>1424412358</isbn><eisbn>9781424412365</eisbn><eisbn>1424412366</eisbn><abstract>Using advantages of previous algorithms along with a novel point, a new low destructive image steganographic method is proposed. The host image is segmented into blocks of pairs of successive pixels. The secret data are hidden in these two-pixel blocks. The secret data is considered as a stream of bits and is coded using run length coding. Here 0 and 1 s are run values and the number of run values in each run is run count. There are two novel points in this paper, as the first the RLC coded secret bit stream is rearranged so that there is no need to embed run values, and only run counts are embedded. This point reduces the volume of embedded data considerably. As the second point, the run counts greater than a predefined value are embedded in more than one block, limiting local destruction. The embedding process incorporates the modular arithmetic. Using different experiments under various conditions, the proposed algorithm was compared to the last published method. In all experiments, for the same size of embedded data the proposed algorithm has 4 to 12 db lower destruction than the last algorithm.</abstract><pub>IEEE</pub><doi>10.1109/ICSPC.2007.4728426</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781424412358 |
ispartof | 2007 IEEE International Conference on Signal Processing and Communications, 2007, p.744-747 |
issn | |
language | eng |
recordid | cdi_ieee_primary_4728426 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Arithmetic Data mining Image coding Image segmentation Limiting Modular Arirhmatic Pixel Run Length Coding Signal processing algorithms Speech Steganography Streaming media |
title | New Image Steganographic Method Using RLC & Modular Arithmetic |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T23%3A46%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=New%20Image%20Steganographic%20Method%20Using%20RLC%20&%20Modular%20Arithmetic&rft.btitle=2007%20IEEE%20International%20Conference%20on%20Signal%20Processing%20and%20Communications&rft.au=Naimi,%20H.M.&rft.date=2007-11&rft.spage=744&rft.epage=747&rft.pages=744-747&rft.isbn=9781424412358&rft.isbn_list=1424412358&rft_id=info:doi/10.1109/ICSPC.2007.4728426&rft.eisbn=9781424412365&rft.eisbn_list=1424412366&rft_dat=%3Cieee_6IE%3E4728426%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i175t-fb52f2787978b7ca7ebb9230b0357b179afad572bf1c92fdf1b9faa441f875e53%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4728426&rfr_iscdi=true |