“…After the bit implantation task, the official image, known as the cover image, is termed as the stego image. 16]. In such applications, the process of damaging the cover information in the stego image is a good technique because then any third party will not be able to guess and retrieve the cover secrets from the transmitted stego [12,14,16].…”
Section: Introductionmentioning
confidence: 99%
“…16]. In such applications, the process of damaging the cover information in the stego image is a good technique because then any third party will not be able to guess and retrieve the cover secrets from the transmitted stego [12,14,16]. At the receiver end, the decoder extracts the implanted secrets and reconstructs the original cover image by a reversible mechanism.…”
Section: Introductionmentioning
confidence: 99%
“…The image distortion is performed by either the data implantation rules [12][13][14] or by applying an encryption process before the start of the bit implantation process [15,16]. In the premier case, the data implantation rules translate each block of pixels by an equal amount in a direction while implanting bits.…”
Section: Introductionmentioning
confidence: 99%
“…Still, the block shifting strategy cannot ensure pure distortions of the cover image because it leaves lots of the cover blocks as unchanged while implanting the message chunk of 0 bits only. Many applications [14][15][16], therefore, first destroy the cover image entirely by an encryption process and then embed the data bits into these destroyed values. These pre-distortion based embedding schemes suffer from less embedding capacity because, for the constraint of maintenance of reversibility, these schemes implant a bit either in a working pixel [15] or in a block of pixels [16].…”
Section: Introductionmentioning
confidence: 99%
“…Many applications [14][15][16], therefore, first destroy the cover image entirely by an encryption process and then embed the data bits into these destroyed values. These pre-distortion based embedding schemes suffer from less embedding capacity because, for the constraint of maintenance of reversibility, these schemes implant a bit either in a working pixel [15] or in a block of pixels [16]. Additionally, many of these schemes, e.g., [15], implant a large quantity of assistant information.…”
Many clandestine applications send their secret information, e.g., investigation reports, to a destination by implanting them into an image document, like forensic evidence. In that case, both the document and the implanted information are secret and equally important. To protect the document's information, called the cover information, from being disclosed, many reversible data embedding (RDE) schemes first destroy the cover information intentionally and then embed secrets into these destroyed contents. A reversible process in the receiver end retrieves both the implanted secrets and the cover information. The existing schemes suffer from less embedding capacity, i.e., embedded bits per pixel (bpp), because their reversible processes either are unable to implant bit(s) into every pixel or implant a chunk of message bits into a group of pixels where the length of the message bits is smaller than the number of pixels in the group. The article proposes a novel distortion-based RDE scheme that achieves an embedding capacity of 2 n bpp, where 0 ≤ n ≤ 3. The proposed scheme destroys the information in the image before and after the data implantation task to strongly obliterate both the cover information and the embedded bits. During implementing this proposed process, the scheme establishes seven levels of encapsulated securities and, thus, strengthens the security of the scheme. The maximum embedding capacity and the lowest level of image distortion that are achieved by the proposed scheme are 8 bpp and 5 dB, respectively. These two values significantly dominate the same figures that are achieved in its competing schemes.
“…After the bit implantation task, the official image, known as the cover image, is termed as the stego image. 16]. In such applications, the process of damaging the cover information in the stego image is a good technique because then any third party will not be able to guess and retrieve the cover secrets from the transmitted stego [12,14,16].…”
Section: Introductionmentioning
confidence: 99%
“…16]. In such applications, the process of damaging the cover information in the stego image is a good technique because then any third party will not be able to guess and retrieve the cover secrets from the transmitted stego [12,14,16]. At the receiver end, the decoder extracts the implanted secrets and reconstructs the original cover image by a reversible mechanism.…”
Section: Introductionmentioning
confidence: 99%
“…The image distortion is performed by either the data implantation rules [12][13][14] or by applying an encryption process before the start of the bit implantation process [15,16]. In the premier case, the data implantation rules translate each block of pixels by an equal amount in a direction while implanting bits.…”
Section: Introductionmentioning
confidence: 99%
“…Still, the block shifting strategy cannot ensure pure distortions of the cover image because it leaves lots of the cover blocks as unchanged while implanting the message chunk of 0 bits only. Many applications [14][15][16], therefore, first destroy the cover image entirely by an encryption process and then embed the data bits into these destroyed values. These pre-distortion based embedding schemes suffer from less embedding capacity because, for the constraint of maintenance of reversibility, these schemes implant a bit either in a working pixel [15] or in a block of pixels [16].…”
Section: Introductionmentioning
confidence: 99%
“…Many applications [14][15][16], therefore, first destroy the cover image entirely by an encryption process and then embed the data bits into these destroyed values. These pre-distortion based embedding schemes suffer from less embedding capacity because, for the constraint of maintenance of reversibility, these schemes implant a bit either in a working pixel [15] or in a block of pixels [16]. Additionally, many of these schemes, e.g., [15], implant a large quantity of assistant information.…”
Many clandestine applications send their secret information, e.g., investigation reports, to a destination by implanting them into an image document, like forensic evidence. In that case, both the document and the implanted information are secret and equally important. To protect the document's information, called the cover information, from being disclosed, many reversible data embedding (RDE) schemes first destroy the cover information intentionally and then embed secrets into these destroyed contents. A reversible process in the receiver end retrieves both the implanted secrets and the cover information. The existing schemes suffer from less embedding capacity, i.e., embedded bits per pixel (bpp), because their reversible processes either are unable to implant bit(s) into every pixel or implant a chunk of message bits into a group of pixels where the length of the message bits is smaller than the number of pixels in the group. The article proposes a novel distortion-based RDE scheme that achieves an embedding capacity of 2 n bpp, where 0 ≤ n ≤ 3. The proposed scheme destroys the information in the image before and after the data implantation task to strongly obliterate both the cover information and the embedded bits. During implementing this proposed process, the scheme establishes seven levels of encapsulated securities and, thus, strengthens the security of the scheme. The maximum embedding capacity and the lowest level of image distortion that are achieved by the proposed scheme are 8 bpp and 5 dB, respectively. These two values significantly dominate the same figures that are achieved in its competing schemes.
Some steganography methods for gray-scale image can be extended to true RGB color image by treating each of its three color channels as a gray-scale image. In modern popular steganography, most embedding changes are highly concentrated on those complex textural regions with smaller embedding distortions. However, the existing steganalysis methods for color images directly extract steganalytic features from the whole image. In this paper, we propose a content-adaptive steganalysis strategy for color images. The new strategy aims to extract spatial rich model features from each color channel and just extract color rich model features from the pixels that may have been modified. In order to locate those suspected pixels, we first calculate the embedding costs of each channel, and then a subset of pixels with smaller embedding costs is selected. Experimental results show that the proposed strategy performs better than the state-of-the-art color image steganalysis method.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.