Abstract
Based on the ring of integers modulo 2r, Chen-Pan-Tseng (2000) introduced a block-based scheme (CPT scheme) which permits in each block F of size m ×n of a given binary image B to embed \(r =\lfloor {\rm log}_2(k+1)\rfloor\). secret bits by changing at most two entries of F, where k = mn. As shown, the highest number of embedded secret bits for at most two bits to be changed in each block of k positions of F in any CPT-based schemes is rmax = \(\lfloor {\rm log}_2(1+k (k+1)/2)\rfloor\), approximately 2r-1, twice as much as r asymptotically, and this can reached approximately in our CPTE1 scheme by using modules on the ring Z 2 of integers modulo 2. A new modified scheme-CPTE2 to control the quality of the embedded blocks, in the same way as Tseng-Pan’s method (2001), is established. Approximately, CPTE2 scheme gives 2r-2 embedded bits in F, twice as much as r-1 bits given by Tseng-Pan’ scheme, while the quality is the same.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chen, Y., Pan, H., Tseng, Y.: A secure of data hiding scheme for two-color images. In: IEEE Symposium on Computers and Communications (2000)
Wu, M.Y., Lee, J.H.: Anovel data embedding method for two-color fascimile images. In: Proceedings of International Symposium on Multimedia Information Processing, Chung-Li, Taiwan, R.O.C. (1998)
Mirsattari, N.S., Haghani, P., Jamzad, M.: Feature Watermarking in Digital Documents For Retrieval and Authentication. In: 11th International CSI Computer Conference, CSICC 2006, Iran (2006)
Tseng, Y.-C., Pan, H.-K.: Secure and Invisible Data Hiding in 2-Color Images. In: Proceedings of INFOCOM 2001, pp. 887–896 (2001)
Hioki, H.: A modified CPT scheme for embedding data into binary images. In: Proc. of Pacific Rim Workshop on Digital Steganography 2003, pp. 32–44 (July 2003)
Zhang, X., Wang, S.: Analysis of Parity Assignment Steganography in palette Images. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3683, pp. 1025–1031. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Phan, T.H., Nguyen, H.T. (2011). On the Maximality of Secret Data Ratio in CPTE Schemes. In: Nguyen, N.T., Kim, CG., Janiak, A. (eds) Intelligent Information and Database Systems. ACIIDS 2011. Lecture Notes in Computer Science(), vol 6591. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20039-7_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-20039-7_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-20038-0
Online ISBN: 978-3-642-20039-7
eBook Packages: Computer ScienceComputer Science (R0)