Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
97 tokens/sec
GPT-4o
53 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images (2004.11974v1)

Published 24 Apr 2020 in cs.MM

Abstract: Digital steganography is becoming a common tool for protecting sensitive communications in various applications such as crime(terrorism) prevention whereby law enforcing personals need to remotely compare facial images captured at the scene of crime with faces databases of known criminals(suspects); exchanging military maps or surveillance video in hostile environment(situations); privacy preserving in the healthcare systems when storing or exchanging patient medical images(records); and prevent bank customers accounts(records) from being accessed illegally by unauthorized users. Existing digital steganography schemes for embedding secret images in cover image files tend not to exploit various redundancies in the secret image bit-stream to deal with the various conflicting requirements on embedding capacity, stego-image quality, and un-detectibility. This paper is concerned with the development of innovative image procedures and data hiding schemes that exploit, as well as increase, similarities between secret image bit-stream and the cover image LSB plane. This will be achieved in two novel steps involving manipulating both the secret and the cover images,prior to embedding, to achieve higher 0:1 ratio in both the secret image bit-stream and the cover image LSB plane. The above two steps strategy has been exploited to use a bit-plane(s) mapping technique, instead of bit-plane(s) replacement to make each cover pixel usable for secret embedding. This paper will demonstrate that this strategy produces stego-images that have minimal distortion, high embedding efficiency, reasonably good stego-image quality and robustness against 3 well-known targeted steganalysis tools.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (3)
  1. Alan A. Abdulla (2 papers)
  2. Harin Sellahewa (5 papers)
  3. Sabah A. Jassim (5 papers)
Citations (66)

Summary

We haven't generated a summary for this paper yet.