IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Adaptive Image Steganography Based on Structural Similarity Metric

Adaptive Image Steganography Based on Structural Similarity Metric
View Sample PDF
Author(s): Guangjie Liu (Nanjing University of Science and Technology, China), Shiguo Lian (France Telecom R&D (Orange Labs) Beijing, China), Yuewei Dai (Nanjing University of Science and Technology, China)and Zhiquan Wang (Nanjing University of Science and Technology, China)
Copyright: 2009
Pages: 18
Source title: Handbook of Research on Secure Multimedia Distribution
Source Author(s)/Editor(s): Shiguo Lian (SAMI Lab, France Telecom R&D Beijing, China)and Yan Zhang (Simula Research Laboratory, Norway)
DOI: 10.4018/978-1-60566-262-6.ch024

Purchase

View Adaptive Image Steganography Based on Structural Similarity Metric on the publisher's website for pricing and purchasing information.

Abstract

Image steganography is a common form of information hiding which embeds as many message bits into images and keep the introduced distortion imperceptible. How to balance the trade-off between the capacity and imperceptibility has become a very important issue in the researches of steganography. In this chapter, we discuss one kind of the solution for disposing the trade-off, named adaptive image steganography. After a brief review, we present two methods based on structural similarity metric. The first one is based on the generalized LSB, in which the substitution depth vector is obtained via the dynamic programming under the constraint of an allowable distortion. The second method is proposed to use adaptive quantization-embedder to carry message bits. Different from the first method, the distortion index is constructed by contrast-correlation distortion. The other difference is that the parameters of the adaptive quantization embedder are embedded into the image containing message bits by the reversible da a hiding method. Beside that, we also bring forward some attractive directions worthy of being studied in the future. Furthermore, we find that the existing methods do not have a good way to control the amount of information and the distortion as an extract manner, and most schemes are designed just according to the experiences and experiments.

Related Content

Nithin Kalorth, Vidya Deshpande. © 2024. 7 pages.
Nitesh Behare, Vinayak Chandrakant Shitole, Shubhada Nitesh Behare, Shrikant Ganpatrao Waghulkar, Tabrej Mulla, Suraj Ashok Sonawane. © 2024. 24 pages.
T.S. Sujith. © 2024. 13 pages.
C. Suganya, M. Vijayakumar. © 2024. 11 pages.
B. Harry, Vijayakumar Muthusamy. © 2024. 19 pages.
Munise Hayrun Sağlam, Ibrahim Kirçova. © 2024. 19 pages.
Elif Karakoç Keskin. © 2024. 19 pages.
Body Bottom