Improving side-informed JPEG steganography using two-dimensional decomposition embedding method
Abstract Side-informed JPEG steganography is a renowned technology of concealing information for the high resistance to blind detection. The existed popular side-informed JPEG steganographic algorithms use binary embedding method with the corresponding binary distortion function. Then, the embedding...
Ausführliche Beschreibung
Autor*in: |
Bao, Zhenkun [verfasserIn] |
---|
Format: |
Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2016 |
---|
Schlagwörter: |
---|
Anmerkung: |
© Springer Science+Business Media New York 2016 |
---|
Übergeordnetes Werk: |
Enthalten in: Multimedia tools and applications - Springer US, 1995, 76(2016), 12 vom: 16. Aug., Seite 14345-14374 |
---|---|
Übergeordnetes Werk: |
volume:76 ; year:2016 ; number:12 ; day:16 ; month:08 ; pages:14345-14374 |
Links: |
---|
DOI / URN: |
10.1007/s11042-016-3823-2 |
---|
Katalog-ID: |
OLC2035035570 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | OLC2035035570 | ||
003 | DE-627 | ||
005 | 20230503193022.0 | ||
007 | tu | ||
008 | 200819s2016 xx ||||| 00| ||eng c | ||
024 | 7 | |a 10.1007/s11042-016-3823-2 |2 doi | |
035 | |a (DE-627)OLC2035035570 | ||
035 | |a (DE-He213)s11042-016-3823-2-p | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 070 |a 004 |q VZ |
100 | 1 | |a Bao, Zhenkun |e verfasserin |4 aut | |
245 | 1 | 0 | |a Improving side-informed JPEG steganography using two-dimensional decomposition embedding method |
264 | 1 | |c 2016 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a © Springer Science+Business Media New York 2016 | ||
520 | |a Abstract Side-informed JPEG steganography is a renowned technology of concealing information for the high resistance to blind detection. The existed popular side-informed JPEG steganographic algorithms use binary embedding method with the corresponding binary distortion function. Then, the embedding methods and binary distortion functions of popular side-informed JPEG steganographic algorithms are analyzed and the wasted secure capacity by using the binary embedding operation is pointed out. Thus, the detection resistance of the side-informed JPEG steganographic algorithms can be improved if the embedding operation is changed to ternary mode which causes less changes than binary embedding at same payload. The problem of using ternary embedding is to define a suitable ternary distortion function. To solve this, a two-dimensional decomposition embedding method is proposed in this paper. The proposed ternary distortion function is defined by transforming the problem into two different binary distortion functions of two layers that based on the ternary entropy decomposition. Meanwhile, the proposed method ensures the minimal value of the distortion function on each layer can be reached in theory. Several popular side-inform JPEG steganographic algorithms (NPQ, EBS, and SI-UNIWARD) are improved through defining ternary distortion function by the proposed method. The experimental results on parameters, blind detection and processing time show that the proposed method increases the blind detection resistance of side-informed steganographic algorithm with acceptable computation complexity. | ||
650 | 4 | |a Steganography | |
650 | 4 | |a Side-informed JPEG steganography | |
650 | 4 | |a Two-dimensional decomposition | |
650 | 4 | |a Adaptive steganography | |
650 | 4 | |a Double-layer embedding | |
700 | 1 | |a Luo, Xiangyang |0 (orcid)0000-0003-3225-4649 |4 aut | |
700 | 1 | |a Zhang, Weiming |4 aut | |
700 | 1 | |a Yang, Chunfang |4 aut | |
700 | 1 | |a Liu, Fenlin |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Multimedia tools and applications |d Springer US, 1995 |g 76(2016), 12 vom: 16. Aug., Seite 14345-14374 |w (DE-627)189064145 |w (DE-600)1287642-2 |w (DE-576)052842126 |x 1380-7501 |7 nnns |
773 | 1 | 8 | |g volume:76 |g year:2016 |g number:12 |g day:16 |g month:08 |g pages:14345-14374 |
856 | 4 | 1 | |u https://doi.org/10.1007/s11042-016-3823-2 |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-MAT | ||
912 | |a SSG-OLC-BUB | ||
912 | |a SSG-OLC-MKW | ||
912 | |a GBV_ILN_70 | ||
951 | |a AR | ||
952 | |d 76 |j 2016 |e 12 |b 16 |c 08 |h 14345-14374 |
author_variant |
z b zb x l xl w z wz c y cy f l fl |
---|---|
matchkey_str |
article:13807501:2016----::mrvnsdifrejeseaorpysntoiesoadcm |
hierarchy_sort_str |
2016 |
publishDate |
2016 |
allfields |
10.1007/s11042-016-3823-2 doi (DE-627)OLC2035035570 (DE-He213)s11042-016-3823-2-p DE-627 ger DE-627 rakwb eng 070 004 VZ Bao, Zhenkun verfasserin aut Improving side-informed JPEG steganography using two-dimensional decomposition embedding method 2016 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2016 Abstract Side-informed JPEG steganography is a renowned technology of concealing information for the high resistance to blind detection. The existed popular side-informed JPEG steganographic algorithms use binary embedding method with the corresponding binary distortion function. Then, the embedding methods and binary distortion functions of popular side-informed JPEG steganographic algorithms are analyzed and the wasted secure capacity by using the binary embedding operation is pointed out. Thus, the detection resistance of the side-informed JPEG steganographic algorithms can be improved if the embedding operation is changed to ternary mode which causes less changes than binary embedding at same payload. The problem of using ternary embedding is to define a suitable ternary distortion function. To solve this, a two-dimensional decomposition embedding method is proposed in this paper. The proposed ternary distortion function is defined by transforming the problem into two different binary distortion functions of two layers that based on the ternary entropy decomposition. Meanwhile, the proposed method ensures the minimal value of the distortion function on each layer can be reached in theory. Several popular side-inform JPEG steganographic algorithms (NPQ, EBS, and SI-UNIWARD) are improved through defining ternary distortion function by the proposed method. The experimental results on parameters, blind detection and processing time show that the proposed method increases the blind detection resistance of side-informed steganographic algorithm with acceptable computation complexity. Steganography Side-informed JPEG steganography Two-dimensional decomposition Adaptive steganography Double-layer embedding Luo, Xiangyang (orcid)0000-0003-3225-4649 aut Zhang, Weiming aut Yang, Chunfang aut Liu, Fenlin aut Enthalten in Multimedia tools and applications Springer US, 1995 76(2016), 12 vom: 16. Aug., Seite 14345-14374 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:76 year:2016 number:12 day:16 month:08 pages:14345-14374 https://doi.org/10.1007/s11042-016-3823-2 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 76 2016 12 16 08 14345-14374 |
spelling |
10.1007/s11042-016-3823-2 doi (DE-627)OLC2035035570 (DE-He213)s11042-016-3823-2-p DE-627 ger DE-627 rakwb eng 070 004 VZ Bao, Zhenkun verfasserin aut Improving side-informed JPEG steganography using two-dimensional decomposition embedding method 2016 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2016 Abstract Side-informed JPEG steganography is a renowned technology of concealing information for the high resistance to blind detection. The existed popular side-informed JPEG steganographic algorithms use binary embedding method with the corresponding binary distortion function. Then, the embedding methods and binary distortion functions of popular side-informed JPEG steganographic algorithms are analyzed and the wasted secure capacity by using the binary embedding operation is pointed out. Thus, the detection resistance of the side-informed JPEG steganographic algorithms can be improved if the embedding operation is changed to ternary mode which causes less changes than binary embedding at same payload. The problem of using ternary embedding is to define a suitable ternary distortion function. To solve this, a two-dimensional decomposition embedding method is proposed in this paper. The proposed ternary distortion function is defined by transforming the problem into two different binary distortion functions of two layers that based on the ternary entropy decomposition. Meanwhile, the proposed method ensures the minimal value of the distortion function on each layer can be reached in theory. Several popular side-inform JPEG steganographic algorithms (NPQ, EBS, and SI-UNIWARD) are improved through defining ternary distortion function by the proposed method. The experimental results on parameters, blind detection and processing time show that the proposed method increases the blind detection resistance of side-informed steganographic algorithm with acceptable computation complexity. Steganography Side-informed JPEG steganography Two-dimensional decomposition Adaptive steganography Double-layer embedding Luo, Xiangyang (orcid)0000-0003-3225-4649 aut Zhang, Weiming aut Yang, Chunfang aut Liu, Fenlin aut Enthalten in Multimedia tools and applications Springer US, 1995 76(2016), 12 vom: 16. Aug., Seite 14345-14374 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:76 year:2016 number:12 day:16 month:08 pages:14345-14374 https://doi.org/10.1007/s11042-016-3823-2 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 76 2016 12 16 08 14345-14374 |
allfields_unstemmed |
10.1007/s11042-016-3823-2 doi (DE-627)OLC2035035570 (DE-He213)s11042-016-3823-2-p DE-627 ger DE-627 rakwb eng 070 004 VZ Bao, Zhenkun verfasserin aut Improving side-informed JPEG steganography using two-dimensional decomposition embedding method 2016 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2016 Abstract Side-informed JPEG steganography is a renowned technology of concealing information for the high resistance to blind detection. The existed popular side-informed JPEG steganographic algorithms use binary embedding method with the corresponding binary distortion function. Then, the embedding methods and binary distortion functions of popular side-informed JPEG steganographic algorithms are analyzed and the wasted secure capacity by using the binary embedding operation is pointed out. Thus, the detection resistance of the side-informed JPEG steganographic algorithms can be improved if the embedding operation is changed to ternary mode which causes less changes than binary embedding at same payload. The problem of using ternary embedding is to define a suitable ternary distortion function. To solve this, a two-dimensional decomposition embedding method is proposed in this paper. The proposed ternary distortion function is defined by transforming the problem into two different binary distortion functions of two layers that based on the ternary entropy decomposition. Meanwhile, the proposed method ensures the minimal value of the distortion function on each layer can be reached in theory. Several popular side-inform JPEG steganographic algorithms (NPQ, EBS, and SI-UNIWARD) are improved through defining ternary distortion function by the proposed method. The experimental results on parameters, blind detection and processing time show that the proposed method increases the blind detection resistance of side-informed steganographic algorithm with acceptable computation complexity. Steganography Side-informed JPEG steganography Two-dimensional decomposition Adaptive steganography Double-layer embedding Luo, Xiangyang (orcid)0000-0003-3225-4649 aut Zhang, Weiming aut Yang, Chunfang aut Liu, Fenlin aut Enthalten in Multimedia tools and applications Springer US, 1995 76(2016), 12 vom: 16. Aug., Seite 14345-14374 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:76 year:2016 number:12 day:16 month:08 pages:14345-14374 https://doi.org/10.1007/s11042-016-3823-2 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 76 2016 12 16 08 14345-14374 |
allfieldsGer |
10.1007/s11042-016-3823-2 doi (DE-627)OLC2035035570 (DE-He213)s11042-016-3823-2-p DE-627 ger DE-627 rakwb eng 070 004 VZ Bao, Zhenkun verfasserin aut Improving side-informed JPEG steganography using two-dimensional decomposition embedding method 2016 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2016 Abstract Side-informed JPEG steganography is a renowned technology of concealing information for the high resistance to blind detection. The existed popular side-informed JPEG steganographic algorithms use binary embedding method with the corresponding binary distortion function. Then, the embedding methods and binary distortion functions of popular side-informed JPEG steganographic algorithms are analyzed and the wasted secure capacity by using the binary embedding operation is pointed out. Thus, the detection resistance of the side-informed JPEG steganographic algorithms can be improved if the embedding operation is changed to ternary mode which causes less changes than binary embedding at same payload. The problem of using ternary embedding is to define a suitable ternary distortion function. To solve this, a two-dimensional decomposition embedding method is proposed in this paper. The proposed ternary distortion function is defined by transforming the problem into two different binary distortion functions of two layers that based on the ternary entropy decomposition. Meanwhile, the proposed method ensures the minimal value of the distortion function on each layer can be reached in theory. Several popular side-inform JPEG steganographic algorithms (NPQ, EBS, and SI-UNIWARD) are improved through defining ternary distortion function by the proposed method. The experimental results on parameters, blind detection and processing time show that the proposed method increases the blind detection resistance of side-informed steganographic algorithm with acceptable computation complexity. Steganography Side-informed JPEG steganography Two-dimensional decomposition Adaptive steganography Double-layer embedding Luo, Xiangyang (orcid)0000-0003-3225-4649 aut Zhang, Weiming aut Yang, Chunfang aut Liu, Fenlin aut Enthalten in Multimedia tools and applications Springer US, 1995 76(2016), 12 vom: 16. Aug., Seite 14345-14374 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:76 year:2016 number:12 day:16 month:08 pages:14345-14374 https://doi.org/10.1007/s11042-016-3823-2 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 76 2016 12 16 08 14345-14374 |
allfieldsSound |
10.1007/s11042-016-3823-2 doi (DE-627)OLC2035035570 (DE-He213)s11042-016-3823-2-p DE-627 ger DE-627 rakwb eng 070 004 VZ Bao, Zhenkun verfasserin aut Improving side-informed JPEG steganography using two-dimensional decomposition embedding method 2016 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media New York 2016 Abstract Side-informed JPEG steganography is a renowned technology of concealing information for the high resistance to blind detection. The existed popular side-informed JPEG steganographic algorithms use binary embedding method with the corresponding binary distortion function. Then, the embedding methods and binary distortion functions of popular side-informed JPEG steganographic algorithms are analyzed and the wasted secure capacity by using the binary embedding operation is pointed out. Thus, the detection resistance of the side-informed JPEG steganographic algorithms can be improved if the embedding operation is changed to ternary mode which causes less changes than binary embedding at same payload. The problem of using ternary embedding is to define a suitable ternary distortion function. To solve this, a two-dimensional decomposition embedding method is proposed in this paper. The proposed ternary distortion function is defined by transforming the problem into two different binary distortion functions of two layers that based on the ternary entropy decomposition. Meanwhile, the proposed method ensures the minimal value of the distortion function on each layer can be reached in theory. Several popular side-inform JPEG steganographic algorithms (NPQ, EBS, and SI-UNIWARD) are improved through defining ternary distortion function by the proposed method. The experimental results on parameters, blind detection and processing time show that the proposed method increases the blind detection resistance of side-informed steganographic algorithm with acceptable computation complexity. Steganography Side-informed JPEG steganography Two-dimensional decomposition Adaptive steganography Double-layer embedding Luo, Xiangyang (orcid)0000-0003-3225-4649 aut Zhang, Weiming aut Yang, Chunfang aut Liu, Fenlin aut Enthalten in Multimedia tools and applications Springer US, 1995 76(2016), 12 vom: 16. Aug., Seite 14345-14374 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:76 year:2016 number:12 day:16 month:08 pages:14345-14374 https://doi.org/10.1007/s11042-016-3823-2 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 76 2016 12 16 08 14345-14374 |
language |
English |
source |
Enthalten in Multimedia tools and applications 76(2016), 12 vom: 16. Aug., Seite 14345-14374 volume:76 year:2016 number:12 day:16 month:08 pages:14345-14374 |
sourceStr |
Enthalten in Multimedia tools and applications 76(2016), 12 vom: 16. Aug., Seite 14345-14374 volume:76 year:2016 number:12 day:16 month:08 pages:14345-14374 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Steganography Side-informed JPEG steganography Two-dimensional decomposition Adaptive steganography Double-layer embedding |
dewey-raw |
070 |
isfreeaccess_bool |
false |
container_title |
Multimedia tools and applications |
authorswithroles_txt_mv |
Bao, Zhenkun @@aut@@ Luo, Xiangyang @@aut@@ Zhang, Weiming @@aut@@ Yang, Chunfang @@aut@@ Liu, Fenlin @@aut@@ |
publishDateDaySort_date |
2016-08-16T00:00:00Z |
hierarchy_top_id |
189064145 |
dewey-sort |
270 |
id |
OLC2035035570 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2035035570</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230503193022.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200819s2016 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s11042-016-3823-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2035035570</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s11042-016-3823-2-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">070</subfield><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bao, Zhenkun</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Improving side-informed JPEG steganography using two-dimensional decomposition embedding method</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2016</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer Science+Business Media New York 2016</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Side-informed JPEG steganography is a renowned technology of concealing information for the high resistance to blind detection. The existed popular side-informed JPEG steganographic algorithms use binary embedding method with the corresponding binary distortion function. Then, the embedding methods and binary distortion functions of popular side-informed JPEG steganographic algorithms are analyzed and the wasted secure capacity by using the binary embedding operation is pointed out. Thus, the detection resistance of the side-informed JPEG steganographic algorithms can be improved if the embedding operation is changed to ternary mode which causes less changes than binary embedding at same payload. The problem of using ternary embedding is to define a suitable ternary distortion function. To solve this, a two-dimensional decomposition embedding method is proposed in this paper. The proposed ternary distortion function is defined by transforming the problem into two different binary distortion functions of two layers that based on the ternary entropy decomposition. Meanwhile, the proposed method ensures the minimal value of the distortion function on each layer can be reached in theory. Several popular side-inform JPEG steganographic algorithms (NPQ, EBS, and SI-UNIWARD) are improved through defining ternary distortion function by the proposed method. The experimental results on parameters, blind detection and processing time show that the proposed method increases the blind detection resistance of side-informed steganographic algorithm with acceptable computation complexity.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Steganography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Side-informed JPEG steganography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Two-dimensional decomposition</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Adaptive steganography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Double-layer embedding</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Luo, Xiangyang</subfield><subfield code="0">(orcid)0000-0003-3225-4649</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Weiming</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yang, Chunfang</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Fenlin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Multimedia tools and applications</subfield><subfield code="d">Springer US, 1995</subfield><subfield code="g">76(2016), 12 vom: 16. Aug., Seite 14345-14374</subfield><subfield code="w">(DE-627)189064145</subfield><subfield code="w">(DE-600)1287642-2</subfield><subfield code="w">(DE-576)052842126</subfield><subfield code="x">1380-7501</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:76</subfield><subfield code="g">year:2016</subfield><subfield code="g">number:12</subfield><subfield code="g">day:16</subfield><subfield code="g">month:08</subfield><subfield code="g">pages:14345-14374</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s11042-016-3823-2</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-BUB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MKW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">76</subfield><subfield code="j">2016</subfield><subfield code="e">12</subfield><subfield code="b">16</subfield><subfield code="c">08</subfield><subfield code="h">14345-14374</subfield></datafield></record></collection>
|
author |
Bao, Zhenkun |
spellingShingle |
Bao, Zhenkun ddc 070 misc Steganography misc Side-informed JPEG steganography misc Two-dimensional decomposition misc Adaptive steganography misc Double-layer embedding Improving side-informed JPEG steganography using two-dimensional decomposition embedding method |
authorStr |
Bao, Zhenkun |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)189064145 |
format |
Article |
dewey-ones |
070 - News media, journalism & publishing 004 - Data processing & computer science |
delete_txt_mv |
keep |
author_role |
aut aut aut aut aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
1380-7501 |
topic_title |
070 004 VZ Improving side-informed JPEG steganography using two-dimensional decomposition embedding method Steganography Side-informed JPEG steganography Two-dimensional decomposition Adaptive steganography Double-layer embedding |
topic |
ddc 070 misc Steganography misc Side-informed JPEG steganography misc Two-dimensional decomposition misc Adaptive steganography misc Double-layer embedding |
topic_unstemmed |
ddc 070 misc Steganography misc Side-informed JPEG steganography misc Two-dimensional decomposition misc Adaptive steganography misc Double-layer embedding |
topic_browse |
ddc 070 misc Steganography misc Side-informed JPEG steganography misc Two-dimensional decomposition misc Adaptive steganography misc Double-layer embedding |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
hierarchy_parent_title |
Multimedia tools and applications |
hierarchy_parent_id |
189064145 |
dewey-tens |
070 - News media, journalism & publishing 000 - Computer science, knowledge & systems |
hierarchy_top_title |
Multimedia tools and applications |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 |
title |
Improving side-informed JPEG steganography using two-dimensional decomposition embedding method |
ctrlnum |
(DE-627)OLC2035035570 (DE-He213)s11042-016-3823-2-p |
title_full |
Improving side-informed JPEG steganography using two-dimensional decomposition embedding method |
author_sort |
Bao, Zhenkun |
journal |
Multimedia tools and applications |
journalStr |
Multimedia tools and applications |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2016 |
contenttype_str_mv |
txt |
container_start_page |
14345 |
author_browse |
Bao, Zhenkun Luo, Xiangyang Zhang, Weiming Yang, Chunfang Liu, Fenlin |
container_volume |
76 |
class |
070 004 VZ |
format_se |
Aufsätze |
author-letter |
Bao, Zhenkun |
doi_str_mv |
10.1007/s11042-016-3823-2 |
normlink |
(ORCID)0000-0003-3225-4649 |
normlink_prefix_str_mv |
(orcid)0000-0003-3225-4649 |
dewey-full |
070 004 |
title_sort |
improving side-informed jpeg steganography using two-dimensional decomposition embedding method |
title_auth |
Improving side-informed JPEG steganography using two-dimensional decomposition embedding method |
abstract |
Abstract Side-informed JPEG steganography is a renowned technology of concealing information for the high resistance to blind detection. The existed popular side-informed JPEG steganographic algorithms use binary embedding method with the corresponding binary distortion function. Then, the embedding methods and binary distortion functions of popular side-informed JPEG steganographic algorithms are analyzed and the wasted secure capacity by using the binary embedding operation is pointed out. Thus, the detection resistance of the side-informed JPEG steganographic algorithms can be improved if the embedding operation is changed to ternary mode which causes less changes than binary embedding at same payload. The problem of using ternary embedding is to define a suitable ternary distortion function. To solve this, a two-dimensional decomposition embedding method is proposed in this paper. The proposed ternary distortion function is defined by transforming the problem into two different binary distortion functions of two layers that based on the ternary entropy decomposition. Meanwhile, the proposed method ensures the minimal value of the distortion function on each layer can be reached in theory. Several popular side-inform JPEG steganographic algorithms (NPQ, EBS, and SI-UNIWARD) are improved through defining ternary distortion function by the proposed method. The experimental results on parameters, blind detection and processing time show that the proposed method increases the blind detection resistance of side-informed steganographic algorithm with acceptable computation complexity. © Springer Science+Business Media New York 2016 |
abstractGer |
Abstract Side-informed JPEG steganography is a renowned technology of concealing information for the high resistance to blind detection. The existed popular side-informed JPEG steganographic algorithms use binary embedding method with the corresponding binary distortion function. Then, the embedding methods and binary distortion functions of popular side-informed JPEG steganographic algorithms are analyzed and the wasted secure capacity by using the binary embedding operation is pointed out. Thus, the detection resistance of the side-informed JPEG steganographic algorithms can be improved if the embedding operation is changed to ternary mode which causes less changes than binary embedding at same payload. The problem of using ternary embedding is to define a suitable ternary distortion function. To solve this, a two-dimensional decomposition embedding method is proposed in this paper. The proposed ternary distortion function is defined by transforming the problem into two different binary distortion functions of two layers that based on the ternary entropy decomposition. Meanwhile, the proposed method ensures the minimal value of the distortion function on each layer can be reached in theory. Several popular side-inform JPEG steganographic algorithms (NPQ, EBS, and SI-UNIWARD) are improved through defining ternary distortion function by the proposed method. The experimental results on parameters, blind detection and processing time show that the proposed method increases the blind detection resistance of side-informed steganographic algorithm with acceptable computation complexity. © Springer Science+Business Media New York 2016 |
abstract_unstemmed |
Abstract Side-informed JPEG steganography is a renowned technology of concealing information for the high resistance to blind detection. The existed popular side-informed JPEG steganographic algorithms use binary embedding method with the corresponding binary distortion function. Then, the embedding methods and binary distortion functions of popular side-informed JPEG steganographic algorithms are analyzed and the wasted secure capacity by using the binary embedding operation is pointed out. Thus, the detection resistance of the side-informed JPEG steganographic algorithms can be improved if the embedding operation is changed to ternary mode which causes less changes than binary embedding at same payload. The problem of using ternary embedding is to define a suitable ternary distortion function. To solve this, a two-dimensional decomposition embedding method is proposed in this paper. The proposed ternary distortion function is defined by transforming the problem into two different binary distortion functions of two layers that based on the ternary entropy decomposition. Meanwhile, the proposed method ensures the minimal value of the distortion function on each layer can be reached in theory. Several popular side-inform JPEG steganographic algorithms (NPQ, EBS, and SI-UNIWARD) are improved through defining ternary distortion function by the proposed method. The experimental results on parameters, blind detection and processing time show that the proposed method increases the blind detection resistance of side-informed steganographic algorithm with acceptable computation complexity. © Springer Science+Business Media New York 2016 |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 |
container_issue |
12 |
title_short |
Improving side-informed JPEG steganography using two-dimensional decomposition embedding method |
url |
https://doi.org/10.1007/s11042-016-3823-2 |
remote_bool |
false |
author2 |
Luo, Xiangyang Zhang, Weiming Yang, Chunfang Liu, Fenlin |
author2Str |
Luo, Xiangyang Zhang, Weiming Yang, Chunfang Liu, Fenlin |
ppnlink |
189064145 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1007/s11042-016-3823-2 |
up_date |
2024-07-03T23:32:09.238Z |
_version_ |
1803602655175507968 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2035035570</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230503193022.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200819s2016 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s11042-016-3823-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2035035570</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s11042-016-3823-2-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">070</subfield><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bao, Zhenkun</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Improving side-informed JPEG steganography using two-dimensional decomposition embedding method</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2016</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer Science+Business Media New York 2016</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Side-informed JPEG steganography is a renowned technology of concealing information for the high resistance to blind detection. The existed popular side-informed JPEG steganographic algorithms use binary embedding method with the corresponding binary distortion function. Then, the embedding methods and binary distortion functions of popular side-informed JPEG steganographic algorithms are analyzed and the wasted secure capacity by using the binary embedding operation is pointed out. Thus, the detection resistance of the side-informed JPEG steganographic algorithms can be improved if the embedding operation is changed to ternary mode which causes less changes than binary embedding at same payload. The problem of using ternary embedding is to define a suitable ternary distortion function. To solve this, a two-dimensional decomposition embedding method is proposed in this paper. The proposed ternary distortion function is defined by transforming the problem into two different binary distortion functions of two layers that based on the ternary entropy decomposition. Meanwhile, the proposed method ensures the minimal value of the distortion function on each layer can be reached in theory. Several popular side-inform JPEG steganographic algorithms (NPQ, EBS, and SI-UNIWARD) are improved through defining ternary distortion function by the proposed method. The experimental results on parameters, blind detection and processing time show that the proposed method increases the blind detection resistance of side-informed steganographic algorithm with acceptable computation complexity.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Steganography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Side-informed JPEG steganography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Two-dimensional decomposition</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Adaptive steganography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Double-layer embedding</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Luo, Xiangyang</subfield><subfield code="0">(orcid)0000-0003-3225-4649</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Weiming</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yang, Chunfang</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Fenlin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Multimedia tools and applications</subfield><subfield code="d">Springer US, 1995</subfield><subfield code="g">76(2016), 12 vom: 16. Aug., Seite 14345-14374</subfield><subfield code="w">(DE-627)189064145</subfield><subfield code="w">(DE-600)1287642-2</subfield><subfield code="w">(DE-576)052842126</subfield><subfield code="x">1380-7501</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:76</subfield><subfield code="g">year:2016</subfield><subfield code="g">number:12</subfield><subfield code="g">day:16</subfield><subfield code="g">month:08</subfield><subfield code="g">pages:14345-14374</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s11042-016-3823-2</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-BUB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MKW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">76</subfield><subfield code="j">2016</subfield><subfield code="e">12</subfield><subfield code="b">16</subfield><subfield code="c">08</subfield><subfield code="h">14345-14374</subfield></datafield></record></collection>
|
score |
7.399131 |