2012
DOI: 10.4304/jmm.7.4.295-302
|View full text |Cite
|
Sign up to set email alerts
|

Optimized LSB Matching Steganography Based on Fisher Information

Abstract:

This paper proposes an optimized LSB matching steganography based on Fisher Information. The embedding algorithm is designed to solve the optimization problem, in which Fisher information is the objective function and embedding transferring probabilities are variables to be optimized. Fisher information is the quadratic function of the embedding transferring probabilities, and the coefficients of quadratic term are determined by the joint probability distribution of cover elements. By modeling the groups of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…Sun et al in demonstrated how the security of LSB embedding could be improved on the basis of Fisher information. Their experiments adopted receiver operating characteristic curves to evaluate the security improvement of their embedding against the traditional LSB.…”
Section: Related Workmentioning
confidence: 99%
“…Sun et al in demonstrated how the security of LSB embedding could be improved on the basis of Fisher information. Their experiments adopted receiver operating characteristic curves to evaluate the security improvement of their embedding against the traditional LSB.…”
Section: Related Workmentioning
confidence: 99%
“…The second set addresses the larger benchmarks, and we will discuss the impact of hardware compiler optimizations on the delay. All benchmarks used by the experiments are compiled for the Xilinx Virtex5 (XC5VLX110T) FPGAs [17]. In this FPGA, the DSP block is called DSP48E whose total number is 64, and the number of LUT is 69120 and the number of the input of the LUT is 6.…”
Section: B Algorithm Descriptionmentioning
confidence: 99%
“…Currently, there are no steganography techniques designed for digital television. Furthermore, similar implementations are limited to the use of audio [6] and images [7,8] as cover media. The most important related works consist of academic articles on watermaking (similar to steganography with the important difference that the data to be concealed is related to the cover file).…”
Section: Introductionmentioning
confidence: 99%