Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2006
DOI: 10.1016/j.ins.2006.02.008
|View full text |Cite
|
Sign up to set email alerts
|

New image steganographic methods using run-length approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2007
2007
2015
2015

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 62 publications
(33 citation statements)
references
References 14 publications
(37 reference statements)
0
33
0
Order By: Relevance
“…If we perform run-length compressed encoding to the sequential might-be-inundated DEM grid cells in raster rows, we can mark all the might-be-inundated cells and store them in memory. Run-length encoding is a typical compressed method for raster data (Chang et al, 2006;He et al, 2011), which encodes the cells with the same value in compression. Every run-length only needs to mark the cells with where it starts and where it ends, which reduces the data storage needs remarkably.…”
Section: Inundated Grid Cells Storing and Labelingmentioning
confidence: 99%
“…If we perform run-length compressed encoding to the sequential might-be-inundated DEM grid cells in raster rows, we can mark all the might-be-inundated cells and store them in memory. Run-length encoding is a typical compressed method for raster data (Chang et al, 2006;He et al, 2011), which encodes the cells with the same value in compression. Every run-length only needs to mark the cells with where it starts and where it ends, which reduces the data storage needs remarkably.…”
Section: Inundated Grid Cells Storing and Labelingmentioning
confidence: 99%
“…3. And the differencing tables are also used in our experiment as shown in Table 2 where the range of [0,7], [8,15], [16,31], [32,63], [64,127], and [128,255] is used in the difference table and the series of pseudo−random numbers as secret data are used as embeddable message bits. We also apply the peak signal−to−noise ratio (PSNR) to evaluate the quality of stego−image in order to estimate the payload capacity.…”
Section: Resultsmentioning
confidence: 99%
“…During the communication since everybody is aware of the exchange of messages, thus, there is always a threat from a malicious attacker. In order to protect the message and to avoid revealing the message transmission, a steganography method has been proposed [4][5][6][7][8].…”
Section: Introductionmentioning
confidence: 99%
“…The results are shown in Tables 3 and 4 when the embedding capacity is 80, 000 bits and 262, 144 bits, respectively. Furthermore, the proposed scheme also compares to [15,18] for the payload of about one hundred thousand, two hundred thousand and four hundred thousand binary images, respectively, shown in Table 5. From the comparison tables, we can find that our proposed scheme has high capacity and good image quality compared to the other schemes.…”
Section: Resultsmentioning
confidence: 99%
“…In 2006, Chang et al [15] proposed two new image steganographic methods using the run-length approach. There are two methods, one is BRL (hiding bitmap files by run-length), which focuses on binary images, and the other is GRL (hiding general data files by run-length).…”
Section: Run-length Encodingmentioning
confidence: 99%