Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, YK | en_US |
dc.contributor.author | Chen, LH | en_US |
dc.date.accessioned | 2014-12-08T15:42:01Z | - |
dc.date.available | 2014-12-08T15:42:01Z | - |
dc.date.issued | 2002-09-01 | en_US |
dc.identifier.issn | 0218-0014 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1142/S0218001402001952 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/28556 | - |
dc.description.abstract | The typical model of steganography has led the prisoners' problem, in which two persons attempt to communicate covertly without alerting the warden. The general way to achieve this task is to embed the message in an innocuous-looking medium. In this paper, an object-based geometric embedding technique is proposed for solving the prisoners' problem. The main idea is to embed secret data through distorting a given object and the distorted object still looks natural. In the embedding process, the secret message is first converted into coefficients of an affine transformation. Then, the coordinates of each pixel of a selected object in the cover-image are recomputed by this affine transformation. Since these coefficients are restricted in a specific range, the transformed object looks natural. In the extracting process, a coarse-to-fine iterative search is proposed to accelerate the object location and the message extraction. Experimental results show that all transformed objects can be located precisely and the whole hidden message can be extracted correctly even if the stego-image is stored in various compression formats and rates. Furthermore, the embedded message is robust enough when the stego-image format is converted from GIF to JPEG, and vice versa. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | information hiding | en_US |
dc.subject | steganography | en_US |
dc.subject | covert communication | en_US |
dc.subject | security | en_US |
dc.subject | affine transformation | en_US |
dc.title | Object-based image steganography using affine transformation | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1142/S0218001402001952 | en_US |
dc.identifier.journal | INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE | en_US |
dc.citation.volume | 16 | en_US |
dc.citation.issue | 6 | en_US |
dc.citation.spage | 681 | en_US |
dc.citation.epage | 696 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000178759400003 | - |
dc.citation.woscount | 4 | - |
Appears in Collections: | Articles |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.