Paper Title:
Minimizing the Embedding Impact Using Network Flow Algorithms
  Abstract

A novel method of minimizing the embedding impact is proposed in this paper. Optimal embedding is achieved using network flow algorithms by considering the modifications on the cover image as flows of pixels among different states. This method is not an independent steganographic scheme, but rather it minimizes the embedding impact after the embedding process and it’s compatible with the majority of embedding techniques. Due to its dependence on the embedding process, many optimization problems, such as the minimization of a globally interactive distortion function, that are intractable during the embedding process can be solved with relatively low computational cost by rectifying the modifications on the cover image after the embedding process. A distortion function based on Kullback-Leibler divergence is provided as a concrete example to illustrate the basic idea of this method.

  Info
Periodical
Advanced Materials Research (Volumes 341-342)
Edited by
Liu Guiping
Pages
478-483
DOI
10.4028/www.scientific.net/AMR.341-342.478
Citation
W. Q. Li, H. Wang, C. Nian, H. Wei, H. Y. You, "Minimizing the Embedding Impact Using Network Flow Algorithms", Advanced Materials Research, Vols. 341-342, pp. 478-483, 2012
Online since
September 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Wien Hong, Tung Shou Chen, Chih Wei Shiu, Mei Chen Wu
Abstract:This paper proposes a lossless data embedding method for Block Truncation Coding (BTC) compressed images based on prediction and histogram...
182
Authors: Gandharba Swain, Saroj Kumar Lenka
Chapter 7: Machining
Abstract:In this paper we are proposing a new Image steganography technique for secure communication between sender and receiver. At the sender we...
835
Authors: Feno Heriniaina Rabevohitra, Jun Sang
Chapter 12: Computer-Aided Design, Manufacturing and Engineering
Abstract:A steganographic scheme for JPEG compressed image with high capacity and with good quality of the stego-image was presented. A quantization...
5118
Authors: Min Qing Zhang, Xiao Ling Yang, Gang Wei Su
Chapter 9: Signal & Data Processing Technology and System
Abstract:Based on wet paper code, integer wavelet and matrix coding, this paper constructs a new steganographic algorithm. Combine with the advantage...
1225
Authors: Xue Yi Ye, Guo Peng Lu, Wei Fang Zhou, Yun Lu Wang
Chapter 15: Information Security Technology
Abstract:Aiming at the JSTC’s shortcomings, we present an improved JPEG Steganographic method using Syndrome-Trellis Codes with Wetness-Scale in this...
2990