Minimizing the Embedding Impact Using Network Flow Algorithms

Article Preview

Abstract:

A novel method of minimizing the embedding impact is proposed in this paper. Optimal embedding is achieved using network flow algorithms by considering the modifications on the cover image as flows of pixels among different states. This method is not an independent steganographic scheme, but rather it minimizes the embedding impact after the embedding process and it’s compatible with the majority of embedding techniques. Due to its dependence on the embedding process, many optimization problems, such as the minimization of a globally interactive distortion function, that are intractable during the embedding process can be solved with relatively low computational cost by rectifying the modifications on the cover image after the embedding process. A distortion function based on Kullback-Leibler divergence is provided as a concrete example to illustrate the basic idea of this method.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 341-342)

Pages:

478-483

Citation:

Online since:

September 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] K. Solanki, K. Sullivan, U. Madhow, B. S. Manjunath, and S. Chandrasekaran, in: Proc. ICIP. II–1118–21 (2005).

Google Scholar

[2] W Shuo-Zhong, XP Zhang, Z Wei-Ming: Chinese Journal of Computers, 32(7), 1247-1263 (2009).

Google Scholar

[3] C. Cachin: LNCS: 2nd Int'l Workshop on Information Hiding, vol. 1525, pp.306-318 (1998).

Google Scholar

[4] A. D. Ker: IEEE Signal Processing Letters, 12(6), 441-444, (2005).

Google Scholar

[5] J. Harmsen and W. Pearlman, in: Proc. SPIE Security Watermarking Multimedia Contents, vol. 5020, (E. J. Delp III and P.W. Wong, Eds. ), p.131–142 (2003).

Google Scholar

[6] N. Provos, P. Honeyman: IEEE Security and Privacy Journal, vol. 1(3), 32-44, May/Jun (2003).

Google Scholar

[7] R. Chandramouli, N. Memon, in: Proc. SPIE Electronic Imaging, Santa Clara, CA, Jan (2003).

Google Scholar

[8] A. Westfeld, in: Proc. 4th Int'l Workshop Information Hiding, Springer-Verlag, 289-302, (2001).

Google Scholar

[9] J. Fridrich, M. Goljan, and D. Hogea, in: Proc. 5th Int'l Workshop Information Hiding, Springer-Verlag, (2002).

Google Scholar

[10] J. Fridrich, T. Pevný, and J. Kodovský, in: Proc. 9th ACM Multimedia & Security Workshop (J. Dittmann and J. Fridrich, eds. ), (Dallas, TX), pp.3-14, September 20-21, (2007).

DOI: 10.1145/1288869.1288872

Google Scholar

[11] J. Fridrich, T. Filler, in: Proc. SPIE Electronic Imaging, 02-03, Photonics West, January (2007).

Google Scholar

[12] T. Filler, J. Judas, J. Fridrich: IEEE Trans. on Info. Forensics and Security, to appear (2011).

Google Scholar

[13] T. Filler, J. Fridrich: IEEE Trans. on Info. Forensics and Security, 5(4), 705-720, Sep (2010).

Google Scholar

[14] J. Fridrich, in: Proc. ACM MM&S Workshop, Geneva, September 26-27, pp.2-10 (2006).

Google Scholar

[15] R.K. Ahuja, T.L. Magnanti, and J.B. Orlin: Network Flows: Theory, Algorithms, and Applications. Prentice Hall (1993).

Google Scholar