A new steganographic scheme based on vector quantisation and search-order coding
#1

Abstract:
In this paper, the authors propose a new steganographic scheme based on vector quantisation (VQ) andsearch-order coding (SOC).The capacity of the proposed scheme is higher than others based on VQand the quality ofstego-image is acceptive. In general, the capacity of the schemes based on VQ is usually 1-bit per block. In 2004, Yuet al. proposed a scheme to increase the capacity to 3-bit per pair of blocks. In the proposed scheme, the authorsutilised multiple codebooks and chose the combinations of per pair of blocks, to embed the secret data.The capacitywas increased to 6-bit per pair of blocks, and the quality was identical Yu et al.’s scheme.
1 Introduction
Computer and network communication techniques havedeveloped quickly in recent years People attach greatimportance to secret communication. For this reason,hidden information is being proposed. Hidden informationtechniques are mainly classified into two categories:copyright marking and steganography [1]. Copyrightmarking such as a signature or a trademark is used toembed copyright information into the host image, thusensuring the copyright. The emphasis on copyrightmarking is that the watermark hidden in the host imagemust be able to be retrieved, even if the stego-image hasbeen subjected to lots of manipulation, such as cropping,lossy compression, resizing etc. A watermark is usually verysmall and composed of visible and imperceptible images.Steganography is different from watermarking. The goal ofsteganography is to embed secret data into the host image, insuch a way that the interceptors perceive its presence. In otherwords, steganography provides a secret communication [2].The key issues in steganography are how to embed moresecret data and yet maintain the stego-image’s good quality.The technique of data hiding in images can be classifiedinto two categories: data hiding in spatial domain schemesand data hiding in frequency domain schemes. Neither datahiding in spatial domain schemes nor data hiding infrequency domain schemes can be used in other domains.The most well-known data hiding scheme in the spatialdomain is least-significant-bits substitution (LSB) [3]. Ituses the invisible to the human visual system differencesbetween the host image and stego-image to hide data.There are many well-known schemes based on LSB, suchas optimal LSB, LSB matching, pixel-value differencingmultiple-based notational system, and using side match[4–11]. There are some data hiding schemes using vectorquantisation (VQ) compression in the spatial domain,those are different from the schemes mentioned above[1, 12–15]. Due to a high compression of VQ, thecapacity for hiding data and the data traffic are much lessthan the mentioned schemes.In this paper, our proposed scheme is in the spatialdomain, based on VQ and search-order coding (SOC) [14,16]. Prior to this research, the capacity of the schemesbased on VQ was usually 1-bit per block [1, 12, 13]. In2004, Yu et al. [15] proposed a scheme to increase thecapacity to 3-bit per pair of blocks. In this paper, we usemultiple codebooks and choose different combinations ofper pair of blocks. The capacity is increased to 6-bit perpair of blocks, and the quality is as good as in Yu et al.’sscheme.


Download full report
http://ieeexplore.ieeeiel5/4149689/52100...er=5210062
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: mail order system database projectaining and placement, steganographic matlab codes, pyramid scheme vector marketing cutco, order, m p adhyapak transfer order 2016, selection of scheduling vector in error control coding, runge kutta 4th order matlab code,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,074 15-02-2017, 03:40 PM
Last Post: jaseela123d
  A New Cell-Counting-Based Attack against Tor 1 730 14-02-2017, 11:26 AM
Last Post: ijasti
  DYNAMIC SEARCH ALGORITHM IN UNSTRUCTURED PEER-TO-PEER NETWORKS--PARALLEL AND DISTRIBU electronics seminars 9 7,382 14-07-2015, 02:25 PM
Last Post: seminar report asees
  Sales Order Processing computer science technology 3 3,139 03-09-2013, 08:37 PM
Last Post: [email protected]
  Desktop Search Engine seminar presentation 5 4,104 06-01-2013, 12:24 AM
Last Post: Guest
Wink Development of a Repository and Search Engine for Alumni of College (RASE) computer science crazy 5 5,271 28-12-2012, 12:26 PM
Last Post: seminar details
  Repository and Search Engine for Alumni of college smart paper boy 1 2,838 28-12-2012, 12:26 PM
Last Post: seminar details
  A Search Engine Using Case Based Reasoning nit_cal 1 1,623 21-12-2012, 11:01 AM
Last Post: seminar details
Thumbs Down Samba Search Engine nit_cal 1 1,474 21-12-2012, 11:00 AM
Last Post: seminar details
  Search Engine Electrical Fan 1 1,571 21-12-2012, 11:00 AM
Last Post: seminar details

Forum Jump: