Improving the modified matrix encoding on steganography method

Yong Soo Choi, Hyoung Joong Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

In this paper, we present a steganographic method that improves some existing data hiding methods. This method works in compressed domain (JPEG) of image. In most of the previous methods, they usually change coefficients to hide information. And some methods tried to enhance the performance of general steganographic method like F5 including Matrix Encoding. In above papers, they achieve to reduce the distortion after hiding data into coefficient of compressed domain. We have been analyzed the effect of quantization table during data hiding on compressed domain. Finally, we considered that there would be more chance to reduce the distortion of steganographic method. As the result, this paper provides little bit more improved result in view of image qualify. This result can give some contribution for future steganographic methods which will work in compressed domain like JPEG.

Original languageEnglish
Title of host publication5th International Conference on Information Assurance and Security, IAS 2009
Pages205-208
Number of pages4
DOIs
Publication statusPublished - 2009
Event5th International Conference on Information Assurance and Security, IAS 2009 - Xian, China
Duration: 2009 Aug 182009 Sept 20

Publication series

Name5th International Conference on Information Assurance and Security, IAS 2009
Volume1

Other

Other5th International Conference on Information Assurance and Security, IAS 2009
Country/TerritoryChina
CityXian
Period09/8/1809/9/20

Keywords

  • Compression
  • Data hiding
  • JPEG
  • Matrix encoding
  • Quantization
  • Steganography

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Computer Science Applications
  • Hardware and Architecture
  • Software

Fingerprint

Dive into the research topics of 'Improving the modified matrix encoding on steganography method'. Together they form a unique fingerprint.

Cite this