Dictionary module and UDC: Two new approaches to enhance embedding capacity of a steganographic channel
dc.contributor.author | Potdar, Vidyasagar | |
dc.contributor.author | Han, Song | |
dc.contributor.author | Chang, Elizabeth | |
dc.date.accessioned | 2017-01-30T15:17:06Z | |
dc.date.available | 2017-01-30T15:17:06Z | |
dc.date.created | 2008-11-12T23:21:41Z | |
dc.date.issued | 2005 | |
dc.identifier.citation | Potdar, Vidyasagar and Han, Song and Chang, Elizabeth. 2005. : Dictionary module and UDC: Two new approaches to enhance embedding capacity of a steganographic channel, in Dillon, T. and Yu, X. and Chan, E. (ed), INDIN 2005: 3rd International Conference on Industrial Informatics, Frontier Technologies for the Future of Industry and Business, Aug 10 2005, pp. 697-700. Perth, WA: IEEE. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/44899 | |
dc.identifier.doi | 10.1109/INDIN.2005.1560460 | |
dc.description.abstract |
In this paper we present a new technique to enhance embedding capacity of a steganographic channel by preprocessing the secret data. Here we limit ourselves to textual data only. By preprocessing we don't mean compression; secret data can be compressed after it has been preprocessed by our technique. We introduce the concept of Scrambled Letters, User Defined Codes and the Dictionary Module to explain our technique. All these concepts when applied together give a phenomenal embedding capacity. Theoretical results show that we can achieve at least 25-30% increase in embedding capacity. We introduce two techniques, one in which we only apply the dictionary concept while the other in which we use the user defined codes along with the dictionary approach. The former technique is generic and can be applied to any form of textual data, whereas the latter can only be applied to pure text, i.e. without any form of graphics like images or graphs. Once the data is preprocessed by using our technique it can be easily embedded in any steganographic cover medium by using any steganographic algorithm. | |
dc.publisher | IEEE | |
dc.subject | Steganography | |
dc.subject | Scrambled Letters | |
dc.subject | GLM Algorithm | |
dc.subject | Dictionary Module | |
dc.subject | Data Embedding - Capacity | |
dc.subject | User Defined ASCII Codes | |
dc.title | Dictionary module and UDC: Two new approaches to enhance embedding capacity of a steganographic channel | |
dc.type | Conference Paper | |
dcterms.source.startPage | 697 | |
dcterms.source.endPage | 700 | |
dcterms.source.title | 3rd IEEE International Conference on Industrial Informatics (INDIN 2005) | |
dcterms.source.series | 3rd IEEE International Conference on Industrial Informatics (INDIN 2005) | |
dcterms.source.isbn | 0-7803-9094-6 | |
dcterms.source.conference | INDIN 2005: 3rd International Conference on Industrial Informatics, Frontier Technologies for the Future of Industry and Business | |
dcterms.source.conference-start-date | Aug 10 2005 | |
dcterms.source.conferencelocation | Perth, WA | |
dcterms.source.place | Perth, WA | |
curtin.note |
Copyright 2005 IEEE. Reprinted from: 2005 3rd IEEE International Conference on Industrial Informatics (INDIN) Perth, Australia 10-12 August 2005. IEEE Catalog Number 05EX1057 | |
curtin.note |
This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Curtin University of Technology's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. | |
curtin.note |
By choosing to view this document, you agree to all provisions of the copyright laws protecting it. | |
curtin.department | Centre for Extended Enterprises and Business Intelligence | |
curtin.identifier | EPR-546 | |
curtin.accessStatus | Open access | |
curtin.faculty | Curtin Business School | |
curtin.faculty | School of Information Systems |