A Steganographic Method Based on Remainder Function with Weight Matching Embedding Rate

Author(s):  
Siyi Fu ◽  
Wan-lung Lee ◽  
Wei Sun
Computers ◽  
2021 ◽  
Vol 10 (7) ◽  
pp. 86
Author(s):  
Jijun Wang ◽  
Soo Fun Tan

Separable Reversible Data Hiding in Encryption Image (RDH-EI) has become widely used in clinical and military applications, social cloud and security surveillance in recent years, contributing significantly to preserving the privacy of digital images. Aiming to address the shortcomings of recent works that directed to achieve high embedding rate by compensating image quality, security, reversible and separable properties, we propose a two-tuples coding method by considering the intrinsic adjacent pixels characteristics of the carrier image, which have a high redundancy between high-order bits. Subsequently, we construct RDH-EI scheme by using high-order bits compression, low-order bits combination, vacancy filling, data embedding and pixel diffusion. Unlike the conventional RDH-EI practices, which have suffered from the deterioration of the original image while embedding additional data, the content owner in our scheme generates the embeddable space in advance, thus lessening the risk of image destruction on the data hider side. The experimental results indicate the effectiveness of our scheme. A ratio of 28.91% effectively compressed the carrier images, and the embedding rate increased to 1.753 bpp with a higher image quality, measured in the PSNR of 45.76 dB.


2017 ◽  
Vol 2017 ◽  
pp. 1-11 ◽  
Author(s):  
Yuan-Yu Tsai ◽  
Tsung-Chieh Cheng ◽  
Yao-Hsien Huang

This study proposes a low-complexity region-based authentication algorithm for three-dimensional (3D) polygonal models, based on local geometrical property evaluation. A vertex traversal scheme with a secret key is adopted to classify each vertex into one of two categories: embeddable vertices and reference vertices. An embeddable vertex is one with an authentication code embedded. The algorithm then uses reference vertices to calculate local geometrical properties for the corresponding embeddable vertices. For each embeddable vertex, we feed the number of reference vertices and local properties into a hash function to generate the authentication code. The embeddable vertex is then embedded with the authentication code, which is based on a simple message-digit substitution scheme. The proposed algorithm is of low complexity and distortion-controllable and possesses a higher and more adaptive embedding capacity and a higher embedding rate than most existing region-based authentication algorithms for 3D polygonal models. The experimental results demonstrate the feasibility of the proposed algorithm.


2021 ◽  
Vol 2021 (4) ◽  
Author(s):  
Guanda Lin ◽  
Gang Yang

Abstract Form factors, as quantities involving both local operators and asymptotic particle states, contain information of both the spectrum of operators and the on-shell amplitudes. So far the studies of form factors have been mostly focused on the large Nc planar limit, with a few exceptions of Sudakov form factors. In this paper, we discuss the systematical construction of full color dependent form factors with generic local operators. We study the color decomposition for form factors and discuss the general strategy of using on-shell unitarity cut method. As concrete applications, we compute the full two-loop non-planar minimal form factors for both half-BPS operators and non-BPS operators in the SU(2) sector in $$ \mathcal{N} $$ N = 4 SYM. Another important aspect is to investigate the color-kinematics (CK) duality for form factors of high-length operators. Explicit CK dual representation is found for the two-loop half-BPS minimal form factors with arbitrary number of external legs. The full-color two-loop form factor result provides an independent check of the infrared dipole formula for two-loop n-point amplitudes. By extracting the UV divergences, we also reproduce the known non-planar SU(2) dilatation operator at two loops. As for the finite remainder function, interestingly, the non-planar part is found to contain a new maximally transcendental part beyond the known planar result.


2014 ◽  
Vol 6 (4) ◽  
pp. 1-13 ◽  
Author(s):  
Qi Tang ◽  
Guoli Ma ◽  
Weiming Zhang ◽  
Nenghai Yu

As the blueprint of vital activities of most living things on earth, DNA has important status and must be protected perfectly. And in current DNA databases, each sequence is stored with several notes that help to describe that sequence. However, these notes have no contribution to the protection of sequences. In this paper, the authors propose a reversible data hiding method for DNA sequences, which could be used either to embed sequence-related annotations, or to detect and restore tampers. When embedding sequence annotations, the methods works in low embedding rate mode. Only several bits of annotations are embedded. When used for tamper detection and tamper restoration, all possible embedding positions are utilized to assure the maximum restoration capacity.


Mathematics ◽  
2020 ◽  
Vol 8 (9) ◽  
pp. 1452
Author(s):  
Yuyuan Sun ◽  
Yuliang Lu ◽  
Jinrui Chen ◽  
Weiming Zhang ◽  
Xuehu Yan

The (k,n)-threshold Secret Image Sharing scheme (SISS) is a solution to image protection. However, the shadow images generated by traditional SISS are noise-like, easily arousing deep suspicions, so that it is significant to generate meaningful shadow images. One solution is to embed the shadow images into meaningful natural images and visual quality should be considered first. Limited by embedding rate, the existing schemes have made concessions in size and visual quality of shadow images, and few of them take the ability of anti-steganalysis into consideration. In this paper, a meaningful SISS that is based on Natural Steganography (MSISS-NS) is proposed. The secret image is firstly divided into n small-sized shadow images with Chinese Reminder Theorem, which are then embedded into RAW images to simulate the images with higher ISO parameters with NS. In MSISS-NS, the visual quality of shadow images is improved significantly. Additionally, as the payload of cover images with NS is larger than the size of small-sized shadow images, the scheme performs well not only in visual camouflage, but also in other aspects, like lossless recovery, no pixel expansion, and resisting steganalysis.


1958 ◽  
Vol 31 (3) ◽  
pp. 137
Author(s):  
N. A. Draim
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document