Analysis of Encoding Methods Contributing to the Payload of Steganography

Article Preview

Abstract:

In this paper, we compare Huffman coding and Arithmetic coding with ASCII coding to observe their contribution to steganography. This way is to compress the embedded information first for enhance the payload of a cover image. There are many wonderful coding methods to compress this kind of string, such as Huffman coding and Arithmetic coding. The experiment results indicate that Huffman coding and Arithmetic coding as an important preprocess step of steganography can effectively reduce the amount of secret information with efficient encoding performance. And a theory opinion related to payload calculation is proposed which can be used to describe the relationship among the three parameters of steganography: imperceptibility, information embedding efficiency and payload.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 756-759)

Pages:

1912-1915

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Jianhong Sun, Yingjiang Li, Junsheng Li, A Scheme of LSB Steganography Based on Concept of Finding Optimization Pixels Selection, Software Engineering and Knowledge Engineering: Theory and Practice Advances in Intelligent and Soft Computing Volume 115(2012).

DOI: 10.1007/978-3-642-25349-2_21

Google Scholar

[2] J. Mielikainen, LSB matching revisited, IEEE Signal Process. Letter, vol. 13, no. 5(2006) pp.285-287.

DOI: 10.1109/lsp.2006.870357

Google Scholar

[3] Xiaolong Li, Bin Yang, Daofang Cheng and Tieyong Zeng, A Generalization of LSB Matching, IEEE Signal Process. Letter, vol. 16, NO. 2(2009) p.69~72.

DOI: 10.1109/lsp.2008.2008947

Google Scholar

[4] R. Crandall, Some notes on steganography, Steganography Mailing List [online]. Available: http: /os. inf. tu-dresden. de/westfeld/crandall. pdf. (1998).

Google Scholar

[5] Li Xiao-long and Yang Bin, Analysis on Embedding-efficiency of LSB Matching (In Chinese), Journal of Nanjing University of Science and Technology, Vol. 32 No. 4(2008) pp.429-433.

Google Scholar

[6] El-Sayed M. El-Alfy, Azzat A. Al-Sadi, High-Capacity Image Steganography Based on Overlapped Pixel Differences and Modulus Function, Networked Digital Technologies Communications in Computer and Information Science, Vol. 294, (2012) pp.243-252.

DOI: 10.1007/978-3-642-30567-2_20

Google Scholar

[7] Elham Ghasemi, Jamshid Shanbehzadeh, Nima Fassihi, High Capacity Image Steganography Based on Genetic Algorithm and Wavelet Transform, Intelligent Control and Innovative Computing Lecture Notes in Electrical Engineering, Vol. 110(2012) pp.395-404.

DOI: 10.1007/978-1-4614-1695-1_30

Google Scholar

[8] P. Thiyagarajan, V. Natarajan, G. Aghila, V. Prasanna Venkatesan, R. Anitha, Pattern based 3D image Steganography, 3D Research, December (2012), 4: 1.

DOI: 10.1007/3dres.01(2013)1

Google Scholar