{"title":"一种基于直方图重量化的数据隐藏算法","authors":"C. Teng, Y. Shiau, C. Chen","doi":"10.1109/ICCIT.2010.5711225","DOIUrl":null,"url":null,"abstract":"Steganography, a technique of data hiding, is becoming more and more significant with expansion of the Internet communication. As a result, various steganographic algorithms have been proposed in recent years, for example, Ni et al. have carried out a lossless data-hiding algorithm based on the histogram modification. In order to reinforce more security and more data embedding capacity, this paper extends the Ni's algorithm with a random permutation and a histogram re-quantization. To begin with, applying a random permutation, the security is not easy to be broken by a brute-force attack. In addition, the embedding capacity is able to be strengthened approximately 3 times by adopting a histogram re-quantization. As to our approach, it is visually indistinguishable between a cover image and a stegoimage with a large embedding capacity.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A data hiding algorithm based on histogram re-quantization\",\"authors\":\"C. Teng, Y. Shiau, C. Chen\",\"doi\":\"10.1109/ICCIT.2010.5711225\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Steganography, a technique of data hiding, is becoming more and more significant with expansion of the Internet communication. As a result, various steganographic algorithms have been proposed in recent years, for example, Ni et al. have carried out a lossless data-hiding algorithm based on the histogram modification. In order to reinforce more security and more data embedding capacity, this paper extends the Ni's algorithm with a random permutation and a histogram re-quantization. To begin with, applying a random permutation, the security is not easy to be broken by a brute-force attack. In addition, the embedding capacity is able to be strengthened approximately 3 times by adopting a histogram re-quantization. As to our approach, it is visually indistinguishable between a cover image and a stegoimage with a large embedding capacity.\",\"PeriodicalId\":131337,\"journal\":{\"name\":\"5th International Conference on Computer Sciences and Convergence Information Technology\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"5th International Conference on Computer Sciences and Convergence Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCIT.2010.5711225\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"5th International Conference on Computer Sciences and Convergence Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIT.2010.5711225","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A data hiding algorithm based on histogram re-quantization
Steganography, a technique of data hiding, is becoming more and more significant with expansion of the Internet communication. As a result, various steganographic algorithms have been proposed in recent years, for example, Ni et al. have carried out a lossless data-hiding algorithm based on the histogram modification. In order to reinforce more security and more data embedding capacity, this paper extends the Ni's algorithm with a random permutation and a histogram re-quantization. To begin with, applying a random permutation, the security is not easy to be broken by a brute-force attack. In addition, the embedding capacity is able to be strengthened approximately 3 times by adopting a histogram re-quantization. As to our approach, it is visually indistinguishable between a cover image and a stegoimage with a large embedding capacity.