Skip to main content

On the Maximality of Secret Data Ratio in CPTE Schemes

  • Conference paper
Intelligent Information and Database Systems (ACIIDS 2011)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 6591))

Included in the following conference series:

Abstract

Based on the ring of integers modulo 2r, Chen-Pan-Tseng (2000) introduced a block-based scheme (CPT scheme) which permits in each block F of size m ×n of a given binary image B to embed \(r =\lfloor {\rm log}_2(k+1)\rfloor\). secret bits by changing at most two entries of F, where k = mn. As shown, the highest number of embedded secret bits for at most two bits to be changed in each block of k positions of F in any CPT-based schemes is rmax = \(\lfloor {\rm log}_2(1+k (k+1)/2)\rfloor\), approximately 2r-1, twice as much as r asymptotically, and this can reached approximately in our CPTE1 scheme by using modules on the ring Z 2 of integers modulo 2. A new modified scheme-CPTE2 to control the quality of the embedded blocks, in the same way as Tseng-Pan’s method (2001), is established. Approximately, CPTE2 scheme gives 2r-2 embedded bits in F, twice as much as r-1 bits given by Tseng-Pan’ scheme, while the quality is the same.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chen, Y., Pan, H., Tseng, Y.: A secure of data hiding scheme for two-color images. In: IEEE Symposium on Computers and Communications (2000)

    Google Scholar 

  2. Wu, M.Y., Lee, J.H.: Anovel data embedding method for two-color fascimile images. In: Proceedings of International Symposium on Multimedia Information Processing, Chung-Li, Taiwan, R.O.C. (1998)

    Google Scholar 

  3. Mirsattari, N.S., Haghani, P., Jamzad, M.: Feature Watermarking in Digital Documents For Retrieval and Authentication. In: 11th International CSI Computer Conference, CSICC 2006, Iran (2006)

    Google Scholar 

  4. Tseng, Y.-C., Pan, H.-K.: Secure and Invisible Data Hiding in 2-Color Images. In: Proceedings of INFOCOM 2001, pp. 887–896 (2001)

    Google Scholar 

  5. Hioki, H.: A modified CPT scheme for embedding data into binary images. In: Proc. of Pacific Rim Workshop on Digital Steganography 2003, pp. 32–44 (July 2003)

    Google Scholar 

  6. Zhang, X., Wang, S.: Analysis of Parity Assignment Steganography in palette Images. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3683, pp. 1025–1031. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Phan, T.H., Nguyen, H.T. (2011). On the Maximality of Secret Data Ratio in CPTE Schemes. In: Nguyen, N.T., Kim, CG., Janiak, A. (eds) Intelligent Information and Database Systems. ACIIDS 2011. Lecture Notes in Computer Science(), vol 6591. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20039-7_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20039-7_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20038-0

  • Online ISBN: 978-3-642-20039-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics