By Topic

Novel Multi-bit and Multi-image Steganography Using Adaptive Embedding Algorithms with Minimum Error

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Rong-Jian Chen ; Dept. of Electron. Eng., Nat. United Univ., Miaoli, Taiwan ; Jui-Lin Lai ; Shi-Jinn Horng

This paper presents a novel multi-bit and multi-image steganography system using adaptive embedding algorithms with minimum error. These embedding algorithms can embed multi-bit (k-bit, k≥1) secret data into cover data only introduce minimum embedding errors which are restricted to ±(2k-1-1)2i-k according to the embedding location i. To achieve the goal of minimum embedding error, we introduced the adaptive embedding algorithms to adaptively evaluate the most similar value to replace the original one and which can be divided into three steps: (1) embed logo data into cover data, (2) adaptively adjust the least-significant bits (LSBs) of cover data, and (3) adaptively adjust the maximum-significant bits (MSBs) of cover data. Thus, we called them as adaptive 3-step embedding algorithms. The proposed embedding algorithms are not only achieving minimum error but also suitable to hardware implementation due to they are bit wise and based on logic, arithmetic and bit operations. After development of the adaptive 3-step embedding algorithms, we then built the multi-image steganography system to complicate the experiments of steganography. Many simulations show that the proposed adaptive 3-step embedding algorithms perform good embedding quality for steganography applications.

Published in:

Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2011 Fifth International Conference on

Date of Conference:

June 30 2011-July 2 2011