embedding rate
Recently Published Documents


TOTAL DOCUMENTS

67
(FIVE YEARS 32)

H-INDEX

5
(FIVE YEARS 3)

2021 ◽  
pp. 1-23
Author(s):  
Brian A. Powell

This work explores the extent to which LSB embedding can be made secure against structural steganalysis through a modification of cover image statistics prior to message embedding. LSB embedding disturbs the statistics of consecutive k-tuples of pixels, and a kth-order structural attack detects hidden messages with lengths in proportion to the size of the imbalance amongst sets of k-tuples. To protect against kth-order structural attacks, cover modifications involve the redistribution of k-tuples among the different sets so that symmetries of the cover image are broken, then repaired through the act of LSB embedding so that the stego image bears the statistics of the original cover. We find this is only feasible for securing against up to 3rd-order attacks since higher-order protections result in virtually zero embedding capacities. To protect against 3rd-order attacks, we perform a redistribution of triplets that also preserves the statistics of pairs. This is done by embedding into only certain pixels of each sextuplet, constraining the maximum embedding rate to be ⩽ 2 / 3 bits per channel. Testing on a variety of image formats, we report best performance for JPEG-compressed images with a mean maximum embedding rate undetectable by 2nd- and 3rd-order attacks of 0.21 bpc.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Chuanpeng Guo ◽  
Wei Yang ◽  
Mengxia Shuai ◽  
Liusheng Huang

Traditional machine learning-based steganalysis methods on compressed speech have achieved great success in the field of communication security. However, previous studies lacked mathematical modeling of the correlation between codewords, and there is still room for improvement in steganalysis for small-sized and low embedding rate samples. To deal with the challenge, we use Bayesian networks to measure different types of correlations between codewords in linear prediction code and present F3SNet—a four-step strategy: embedding, encoding, attention, and classification for quantization index modulation steganalysis of compressed speech based on the hierarchical attention network. Among them, embedding converts codewords into high-density numerical vectors, encoding uses the memory characteristics of LSTM to retain more information by distributing it among all its vectors, and attention further determines which vectors have a greater impact on the final classification result. To evaluate the performance of F3SNet, we make a comprehensive comparison of F3SNet with existing steganography methods. Experimental results show that F3SNet surpasses the state-of-the-art methods, particularly for small-sized and low embedding rate samples.


2021 ◽  
Vol 31 (1) ◽  
Author(s):  
Meng Luo ◽  
Dandan Zhu ◽  
Juntao Lin ◽  
Xinhua Zhou ◽  
Changge Zheng ◽  
...  

Abstract Background Biological pesticides, especially baculovirus, often lose their activity under the influence of external light, temperature, and other changes. This limited the application of them. The present study was aimed to prolong the biological activity and ensure the efficacy of a biological pesticide using microencapsulation technology. Results In this study, gelatin/carboxymethylcellulose (CMC)-Spodoptera litura nucleopolyhedrovirus microcapsules were prepared. The morphological characteristics, apparent morphology, embedding rate, virus loading, particle size, laboratory virulence, and UV resistance of the microencapsulated virus, were tested. The best conditions for preparing gelatin /CMC-S. litura nucleopolyhedrovirus microcapsules include the gelatin/CMC ratio of 9:1, wall material concentration of 1%, core material/wall ration ratio of 1:2, re-condensation pH of 4.67, and curing time of 1 h. The prepared microcapsules of S. litura nucleopolyhedrovirus exhibited a good external appearance and spherical shapes with an average particle size of 13 μm, an embedding rate of 62.53%, and a drug loading of 43.87%. The virulence test showed that the microencapsulated virus lost by 2.21 times of its initial activity than the untreated virus. After being treated with field exposure, the gelatin/CMC shell of the microcapsule can better protect the virus in the wild environment. Conclusion Microencapsulation improves the tolerance of S. litura nuclear polyhedrosis virus to ultraviolet radiation. These results will provide ideas for the research of stable and efficient baculovirus preparations and further promote the application and promotion of environmental friendly biological pesticides.


Computers ◽  
2021 ◽  
Vol 10 (7) ◽  
pp. 86
Author(s):  
Jijun Wang ◽  
Soo Fun Tan

Separable Reversible Data Hiding in Encryption Image (RDH-EI) has become widely used in clinical and military applications, social cloud and security surveillance in recent years, contributing significantly to preserving the privacy of digital images. Aiming to address the shortcomings of recent works that directed to achieve high embedding rate by compensating image quality, security, reversible and separable properties, we propose a two-tuples coding method by considering the intrinsic adjacent pixels characteristics of the carrier image, which have a high redundancy between high-order bits. Subsequently, we construct RDH-EI scheme by using high-order bits compression, low-order bits combination, vacancy filling, data embedding and pixel diffusion. Unlike the conventional RDH-EI practices, which have suffered from the deterioration of the original image while embedding additional data, the content owner in our scheme generates the embeddable space in advance, thus lessening the risk of image destruction on the data hider side. The experimental results indicate the effectiveness of our scheme. A ratio of 28.91% effectively compressed the carrier images, and the embedding rate increased to 1.753 bpp with a higher image quality, measured in the PSNR of 45.76 dB.


Mathematics ◽  
2021 ◽  
Vol 9 (13) ◽  
pp. 1577
Author(s):  
Jyun-Jie Wang ◽  
Chi-Yuan Lin ◽  
Sheng-Chih Yang ◽  
Hsi-Yuan Chang ◽  
Yin-Chen Lin

Matrix embedding (ME) code is a commonly used steganography technique, which uses linear block codes to improve embedding efficiency. However, its main disadvantage is the inability to perform maximum likelihood decoding due to the high complexity of decoding large ME codes. As such, it is difficult to improve the embedding efficiency. The proposed q-ary embedding code can provide excellent embedding efficiency and is suitable for various embedding rates (large and small payloads). This article discusses that by using perforation technology, a convolutional code with a high embedding rate can be easily converted into a convolutional code with a low embedding rate. By keeping the embedding rate of the (2, 1) convolutional code unchanged, convolutional codes with different embedding rates can be designed through puncturing.


2021 ◽  
Author(s):  
Hassan Mohamed ◽  
Amr Abdelaziz ◽  
Ahmed Elliethy ◽  
Hussein A. Aly

<pre>Steganography in multimedia aims to embed secret data into an innocent multimedia cover object. The embedding introduces some distortion to the cover object and produces a corresponding stego-object. The embedding distortion is measured by a cost function that determines the probability of detection of the existence of secret embedded data. An accurate definition of the cost function and its relation to the maximum embedding rate is the keystone for the proper evaluation of a steganographic system. Additionally, the statistical distribution of multimedia sources follows the Gibbs distribution which is a complex statistical model that prohibits a thorough mathematical analysis.</pre><pre>Previous multimedia steganographic approaches either assume a relaxed statistical distribution of multimedia sources or presume a proposition on the maximum embedding rate then try to prove the correctness of the proposition. Alternatively, this paper introduces an analytical procedure for calculating the maximum embedding rate within multimedia cover objects through a constrained optimization problem that governs the relationship between the maximum embedding rate and the probability of detection by any steganographic detector. In the optimization problem, we use the KL-divergence between the statistical distributions for the cover and the stego-objects to be our cost function as it upper limits the performance of the optimal steganographic detector. To solve the optimization problem, we establish an equivalence between the Gibbs and the correlated-multivariate-quantized-Gaussian distributions for mathematical thorough analysis. The solution to our optimization problem provides an analytical form for the maximum embedding rate in terms of the WrightOmega function. Moreover, we prove that the achieved maximum embedding rate comes in agreement with the well-known square root law (SRL) of steganography. We also establish the relationship between the achieved maximum embedding rate and the experimental results obtained from several embedding and detection steganographic techniques.</pre>


2021 ◽  
Author(s):  
Hassan Mohamed ◽  
Amr Abdelaziz ◽  
Ahmed Elliethy ◽  
Hussein A. Aly

<pre>Steganography in multimedia aims to embed secret data into an innocent multimedia cover object. The embedding introduces some distortion to the cover object and produces a corresponding stego-object. The embedding distortion is measured by a cost function that determines the probability of detection of the existence of secret embedded data. An accurate definition of the cost function and its relation to the maximum embedding rate is the keystone for the proper evaluation of a steganographic system. Additionally, the statistical distribution of multimedia sources follows the Gibbs distribution which is a complex statistical model that prohibits a thorough mathematical analysis.</pre><pre>Previous multimedia steganographic approaches either assume a relaxed statistical distribution of multimedia sources or presume a proposition on the maximum embedding rate then try to prove the correctness of the proposition. Alternatively, this paper introduces an analytical procedure for calculating the maximum embedding rate within multimedia cover objects through a constrained optimization problem that governs the relationship between the maximum embedding rate and the probability of detection by any steganographic detector. In the optimization problem, we use the KL-divergence between the statistical distributions for the cover and the stego-objects to be our cost function as it upper limits the performance of the optimal steganographic detector. To solve the optimization problem, we establish an equivalence between the Gibbs and the correlated-multivariate-quantized-Gaussian distributions for mathematical thorough analysis. The solution to our optimization problem provides an analytical form for the maximum embedding rate in terms of the WrightOmega function. Moreover, we prove that the achieved maximum embedding rate comes in agreement with the well-known square root law (SRL) of steganography. We also establish the relationship between the achieved maximum embedding rate and the experimental results obtained from several embedding and detection steganographic techniques.</pre>


2021 ◽  
Vol 13 (4) ◽  
pp. 71-89
Author(s):  
Ting-ting Su ◽  
Yan Ke ◽  
Yi Ding ◽  
Jia Liu

This paper proposes a lossless data hiding scheme in learning with errors (LWE)-encrypted domain based on key-switching technique. Lossless data hiding and extraction could be realized by a third party without knowing the private key for decryption. Key-switching-based least-significant-bit (KSLSB) data hiding method has been designed during the lossless data hiding process. The owner of the plaintext first encrypts the plaintext by using LWE encryption and uploads ciphertext to a (trusted or untrusted) third server. Then the server performs KSLSB to obtain a marked ciphertext. To enable the third party to manage ciphertext flexibly and keep the plaintext secret, the embedded data can be extracted from the marked ciphertext without using the private key of LWE encryption in the proposed scheme. Experimental results demonstrate that data hiding would not compromise the security of LWE encryption, and the embedding rate is 1 bit per bit of plaintext without introducing any loss into the directly decrypted result.


Symmetry ◽  
2021 ◽  
Vol 13 (6) ◽  
pp. 1072
Author(s):  
Arun Kumar Rai ◽  
Neeraj Kumar ◽  
Rajeev Kumar ◽  
Hari Om ◽  
Satish Chand ◽  
...  

In this paper, a high capacity reversible data hiding technique using a parametric binary tree labeling scheme is proposed. The proposed parametric binary tree labeling scheme is used to label a plaintext image’s pixels as two different categories, regular pixels and irregular pixels, through a symmetric or asymmetric process. Regular pixels are only utilized for secret payload embedding whereas irregular pixels are not utilized. The proposed technique efficiently exploits intra-block correlation, based on the prediction mean of the block by symmetry or asymmetry. Further, the proposed method utilizes blocks that are selected for their pixel correlation rather than exploiting all the blocks for secret payload embedding. In addition, the proposed scheme enhances the encryption performance by employing standard encryption techniques, unlike other block based reversible data hiding in encrypted images. Experimental results show that the proposed technique maximizes the embedding rate in comparison to state-of-the-art reversible data hiding in encrypted images, while preserving privacy of the original contents.


2021 ◽  
pp. 1-12
Author(s):  
J. Jerisha Liby ◽  
T Jaya

This manuscript proposes a new data hiding approach that is used in watermark applications in video by transforming the RGB model to HSV model. This method initially estimates the number of frames needed to embed the data (watermark). Then two sets of RGB (Red, Green, Blue) coefficients (R1, G1, B1), (R2, G2, B2) are converted to HSV (Hue, saturation, values) Coefficients (H1, S1, V1) and (H2, S2, V2). The ‘Value’ Coefficients V1 and V2 are used to embed the watermark, since there exists a strong correlation between the adjacent ‘Value’ Coefficients. The same process is repeated on adjacent HSV coefficients till the watermark is fully embedded. After embedding the data HSV coefficients are again converted back to RGB coefficients. During the extraction phase, the data is extracted by transforming the RGB coefficient to HSV coefficients. One bit of information can be extracted from two adjacent HSV coefficients. Experimental outcomes show that the proposed watermarking approach is efficiently against attacks, viz noise, filtering, etc. Also, the proposed method performs better than traditional watermarking methods with the help of embedding rate (bpp), Structural similarity index measurement (SSIM), Visual quality (PSNR), Normalized cross-correlation (NC).


Sign in / Sign up

Export Citation Format

Share Document