Please use this identifier to cite or link to this item:
http://hdl.handle.net/11455/38148
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lou, D.C. | en_US |
dc.contributor.author | 蔡垂雄 | zh_TW |
dc.contributor.author | Wu, N.I. | en_US |
dc.contributor.author | Wang, C.M. | en_US |
dc.contributor.author | Lin, Z.H. | en_US |
dc.contributor.author | Tsai, C.S. | en_US |
dc.contributor.author | 王宗銘 | zh_TW |
dc.date | 2010 | zh_TW |
dc.date.accessioned | 2014-06-06T08:00:33Z | - |
dc.date.available | 2014-06-06T08:00:33Z | - |
dc.identifier.issn | 0164-1212 | zh_TW |
dc.identifier.uri | http://hdl.handle.net/11455/38148 | - |
dc.description.abstract | This paper presents a novel adaptive steganographic scheme that is capable of both preventing visual degradation and providing a large embedding capacity. The embedding capacity of each pixel is dynamically determined by the local complexity of the cover image, allowing us to maintain good visual quality as well as embedding a large amount of secret messages. We classify pixels into three levels based on the variance of the local complexity of the cover image. When determining which level of local complexity a pixel should belong to, we take human vision sensitivity into consideration. This ensures that the visual artifacts appeared in the stego image are imperceptible, and the difference between the original and stego image is indistinguishable by the human visual system. The pixel classification assures that the embedding capacity offered by a cover image is bounded by the embedding capacity imposed on three levels that are distinguished by two boundary thresholds values. This allows us to derive a combination ratio of the maximal embedding capacity encountered with at each level. Consequently, our scheme is capable of determining two threshold values according to the desired demand of the embedding capacity requested by the user. Experimental results demonstrated that our adaptive steganographic algorithm produces insignificant visual distortion due to the hidden message. It provides high embedding capacity superior to that offered by a number of existing schemes. Our algorithm can resist the RS steganalysis attack, and it is statistically invisible for the attack of histogram comparison. The proposed scheme is simple, efficient and feasible for adaptive steganographic applications. (C) 2010 Elsevier Inc. All rights reserved. | en_US |
dc.language.iso | en_US | zh_TW |
dc.relation | Journal of Systems and Software | en_US |
dc.relation.ispartofseries | Journal of Systems and Software, Volume 83, Issue 7, Page(s) 1236-1248. | en_US |
dc.relation.uri | http://dx.doi.org/10.1016/j.jss.2010.01.050 | en_US |
dc.subject | Steganography | en_US |
dc.subject | Local complexity analysis | en_US |
dc.subject | Human vision sensitivity | en_US |
dc.subject | secret image | en_US |
dc.subject | capacity | en_US |
dc.subject | authentication | en_US |
dc.title | A novel adaptive steganography based on local complexity and human vision sensitivity | en_US |
dc.type | Journal Article | zh_TW |
dc.identifier.doi | 10.1016/j.jss.2010.01.050 | zh_TW |
item.openairetype | Journal Article | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.languageiso639-1 | en_US | - |
item.grantfulltext | none | - |
item.fulltext | no fulltext | - |
item.cerifentitytype | Publications | - |
crisitem.author.dept | 資訊科學與工程學系所 | - |
crisitem.author.parentorg | 理學院 | - |
Appears in Collections: | 資訊科學與工程學系所 |
TAIR Related Article
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.