Dictionary module and UDC: two new approaches to enhance embedding capacity of a steganographic channel
In this paper we present a new technique to enhance embedding capacity of a steganographic channel by preprocessing the secret data. We limit ourselves to textual data only. By preprocessing we don't mean compression; secret data can be compressed after it has been preprocessed by our technique...
Saved in:
| Published in | INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005 pp. 697 - 700 |
|---|---|
| Main Authors | , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
2005
|
| Subjects | |
| Online Access | Get full text |
| ISBN | 9780780390942 0780390946 |
| ISSN | 1935-4576 |
| DOI | 10.1109/INDIN.2005.1560460 |
Cover
| Abstract | In this paper we present a new technique to enhance embedding capacity of a steganographic channel by preprocessing the secret data. We limit ourselves to textual data only. By preprocessing we don't mean compression; secret data can be compressed after it has been preprocessed by our technique. We introduce the concept of scrambled letters, user defined codes and the dictionary module to explain our technique. All these concepts when applied together give a phenomenal embedding capacity. Theoretical results show that we can achieve at least 25-30% increase in embedding capacity. We introduce two techniques, one in which we only apply the dictionary concept while the other in which we use the user defined codes along with the dictionary approach. The former technique is generic and can be applied to any form of textual data, whereas the latter can only be applied to pure text, i.e. without any form of graphics like images or graphs. Once the data is preprocessed by using our technique it can be easily embedded in any steganographic cover medium by using any steganographic algorithm. |
|---|---|
| AbstractList | In this paper we present a new technique to enhance embedding capacity of a steganographic channel by preprocessing the secret data. We limit ourselves to textual data only. By preprocessing we don't mean compression; secret data can be compressed after it has been preprocessed by our technique. We introduce the concept of scrambled letters, user defined codes and the dictionary module to explain our technique. All these concepts when applied together give a phenomenal embedding capacity. Theoretical results show that we can achieve at least 25-30% increase in embedding capacity. We introduce two techniques, one in which we only apply the dictionary concept while the other in which we use the user defined codes along with the dictionary approach. The former technique is generic and can be applied to any form of textual data, whereas the latter can only be applied to pure text, i.e. without any form of graphics like images or graphs. Once the data is preprocessed by using our technique it can be easily embedded in any steganographic cover medium by using any steganographic algorithm. |
| Author | Potdar, V.M. Han, S. Chang, E. |
| Author_xml | – sequence: 1 givenname: V.M. surname: Potdar fullname: Potdar, V.M. organization: Sch. of Inf. Syst., Curtin Univ. of Technol., Perth, WA, Australia – sequence: 2 givenname: S. surname: Han fullname: Han, S. organization: Sch. of Inf. Syst., Curtin Univ. of Technol., Perth, WA, Australia – sequence: 3 givenname: E. surname: Chang fullname: Chang, E. organization: Sch. of Inf. Syst., Curtin Univ. of Technol., Perth, WA, Australia |
| BookMark | eNpFkE1qwzAQhQVtoWmaC7QbXcDpyJJsq7uS9CcQ0k2zNrI0dlQcydgOIbevQgIdBmbx5g1vvgdy64NHQp4YzBkD9bLaLFebeQog50xmIDK4ITOVFxCbK1AivSUTprhMhMyzezIbhl-IxZVkkE9Is3RmdMHr_kT3wR5apNpbul0uXul4DNTjkequ64M2OxzoGCj6nfYGKe4rtNb5hhrdaePGEw011XQYsdE-NL3uds5QE7c9to_krtbtgLPrnJLtx_vP4itZf3-uFm_rxKVMjYnRosjySqTcgEljSFuYGlRWSJBos5Qxg9ZIyYpayIpjhQKxkELVCqHILZ8Sfrl78J0-HXXbll3v9vG9kkF5RlY6H1OXZ2TlFVl0PV9cDhH_DVf1Dw2xasg |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL ADTOC UNPAY |
| DOI | 10.1109/INDIN.2005.1560460 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher – sequence: 2 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EndPage | 700 |
| ExternalDocumentID | oai:espace.curtin.edu.au:20.500.11937/44899 1560460 |
| Genre | orig-research |
| GroupedDBID | 29I 6IE 6IK 6IL 6IN AAWTH ABLEC ACGFS ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK M43 OCL RIE RIL ADTOC UNPAY |
| ID | FETCH-LOGICAL-i219t-ca4867b423c0c2395d8cf0968505ed6211cedc5518f45b3ebe4ee8549f9e087d3 |
| IEDL.DBID | UNPAY |
| ISBN | 9780780390942 0780390946 |
| ISSN | 1935-4576 |
| IngestDate | Sun Oct 26 04:07:50 EDT 2025 Wed Aug 27 01:44:22 EDT 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | false |
| IsScholarly | true |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i219t-ca4867b423c0c2395d8cf0968505ed6211cedc5518f45b3ebe4ee8549f9e087d3 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://espace.curtin.edu.au/bitstream/20.500.11937/44899/2/19371_downloaded_stream_463.pdf |
| PageCount | 4 |
| ParticipantIDs | ieee_primary_1560460 unpaywall_primary_10_1109_indin_2005_1560460 |
| PublicationCentury | 2000 |
| PublicationDate | 20050000 |
| PublicationDateYYYYMMDD | 2005-01-01 |
| PublicationDate_xml | – year: 2005 text: 20050000 |
| PublicationDecade | 2000 |
| PublicationTitle | INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005 |
| PublicationTitleAbbrev | INDIN |
| PublicationYear | 2005 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0000395107 ssj0055146 |
| Score | 1.584542 |
| Snippet | In this paper we present a new technique to enhance embedding capacity of a steganographic channel by preprocessing the secret data. We limit ourselves to... |
| SourceID | unpaywall ieee |
| SourceType | Open Access Repository Publisher |
| StartPage | 697 |
| SubjectTerms | Australia Channel capacity Dictionaries Digital images Graphics History Information systems Pixel Steganography Writing |
| SummonAdditionalLinks | – databaseName: IEEE Electronic Library (IEL) dbid: RIE link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3JTsMwELWgF-iFrYhdPnAkrZs9XFuqgkTFgUq9VY49KRWtU0Giqnw9Y2ehQhy4JYrlJM4ofm_s94aQW-4w6CZeYonYZ5bLGbNCwaXlcccUXA0CI6R9HvnDsfs08SY75K7WwgCA2XwGbX1o1vJlKnKdKuto1a_rI0HfDUK_0GrV-RTmaKxQky0NBPxiRdmzXATVhrKH2Ar5jF8671TndqWmYVHncdR_HBW5lvJ2Zd2VJtnL1Ypv1nyx2JqCBgfkuXr4YufJezvP4rb4-uXr-N-3OyStH7EffamnsSOyA-qYNLd8Ck_IrD838gf-saHLVOYLoFxJOu737mm2TilCc1qZk8MnzVIK6k2HE4VlDFL3SwXOygIhP00TyinG1oyrwi57LqiWHytYtMh48PDaG1plhQZrjn-6zNKW6H4QIyQTTNj4BWQoEiRFIeIqkD6SSwFSaNO3xPViBwPGBQiRkiYRsDCQzilpqFTBGaFBKHQfricSBHUsibpOEHGHd21pe3HknpMTPWTTVWHCMS1H65zc1V_l55omNiya6lV_pQttelXzi797uST7xpLVpFauSCP7yOEawUYW35go-wbrPstQ priority: 102 providerName: IEEE |
| Title | Dictionary module and UDC: two new approaches to enhance embedding capacity of a steganographic channel |
| URI | https://ieeexplore.ieee.org/document/1560460 https://espace.curtin.edu.au/bitstream/20.500.11937/44899/2/19371_downloaded_stream_463.pdf |
| UnpaywallVersion | submittedVersion |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1NS8NAEF20HsSLShUVlT14NO22ySZZb-IHIig9WFA8hM3urBbbpNSEovjjnUkaFW8ePIYMS8LMZt5L8t4wdqR9AT0nnWfSUHiBFsKLjbae1H41cDWKKiHtzW14NQyu7-X9EntstDCA-4gma5SkoW_eV6SjgpQTeoJUvSMF7XPsql1kFkp1-1066CWWzOVzbcEmdXAShMgTrVtmK6FEoN5iK8PbwelDI50RqkufhWsT1A4pigMyqqyGrKyx1TKb6re5Ho9_9JvLdfbRXGn9m8lLpyzSjnn_ZeL4T7eywba-hYB88NXiNtkSZG32dD6qxBB69sYnuS3HwHVm-fD87IQX85wjUOeNVTm88iLnkD1TcXGYpGBpJW6wRxskADx3XHOstCed1ebZI8NJjJzBeIsNLy_uzq68xbwGb4TPvcIjg_QwShGgGWH6vpI2Ng4pUowoC2yIVNOANWQB5wKZ-lg-AUCMBNUpEHFk_W3WyvIMdhiPYkNrBNI4hHjCqZ4fKe3rXt_2ZaqCXdamNCXT2pIjWWRvlx1_pe37HNEcoZIq2TR2Uzbhe38L32etYlbCAaKQIj2spIKHi5r6BLPK3-s |
| linkProvider | Unpaywall |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT9wwEB0hegAupQXEV1sfeiSLd2Pno9fdrnZbdsWBlbitHHsCKxYH0UQIfn3HzgcI9dBbolhO4ozi98Z-bwC-q5BjP5d5oLOIB0JxHiRamUCq0BdcjWMvpJ3No8lC_LqW1xtw1mlhENFvPsOeO_Rr-abQlUuVnTvVr4iIoH-QQghZq7W6jAoPHVro6JaDAlG9piwDQbDak_aEWhGjiRrvnfZ80OppeHo-nY-m8zrb0tywqbyyA1uVfVDPT2q9fjMJjT_CrH38eu_JXa8qs55-eefs-L_vtwv7r3I_dtlNZJ9gA-1n2HnjVLgHN6OVF0Cox2d2X5hqjUxZwxaj4Q9WPhWMwDlr7cnxDysLhvbWBRTD-wyN65dpmpc1gX5W5Ewxiq4bZWvD7JVmToBscb0Pi_HPq-EkaGo0BCv615WBM0WP4oxAmeZ6QF_AJDonWpQQskITEb3UaLSzfcuFzEIKGYGYECnNU-RJbMID2LSFxUNgcaJdH0LqnGAdz9N-GKcqVP2BGcgsFUew54Zs-VDbcCyb0TqCs-6rvF5z1IanS7fub12pTdk2P_53L99ga3I1u1heTOe_T2DbG7T6RMspbJaPFX4h6FFmX33E_QXCVs6d |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3BSsNAEF20HsSLioqKyh48mnbbZJOsN7EWEZQeLCgewmZ3VottUjRBFD_emaSp4s2Dx5BhSZjZzHtJ3hvGjrUvoOuk80waCi_QQnix0daT2q8GrkZRJaS9vgkvR8HVnbxbYg-NFgZwH9FkjZI09M37inRckHJCT5Gqt6WgfY5dtYPMQqlOr0MH3cSSuXyuLdikDk6CEHmidctsJZQI1FtsZXQzPLtvpDNCdeizcG2C2iZFcUBGldWQlTW2WmYz_f6mJ5Mf_Wawzj6bK61_M3lul0XaNh-_TBz_6VY22Pa3EJAPFy1uky1BtsUe--NKDKFf3vk0t-UEuM4sH_XPT3nxlnME6ryxKodXXuQcsicqLg7TFCytxA32aIMEgOeOa46V9qiz2jx7bDiJkTOYbLPR4OL2_NKbz2vwxvjcKzwySA-jFAGaEabnK2lj45AixYiywIZINQ1YQxZwLpCpj-UTAMRIUJ0CEUfW32GtLM9gl_EoNrRGII1DiCec6vqR0r7u9mxPpirYY1uUpmRWW3Ik8-ztsZNF2r7PEc0RKqmSTWM3ZRO-_7fwA9YqXko4RBRSpEfzavoCeY7e6g |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=INDIN+%2705.+2005+3rd+IEEE+International+Conference+on+Industrial+Informatics%2C+2005&rft.atitle=Dictionary+module+and+UDC%3A+two+new+approaches+to+enhance+embedding+capacity+of+a+steganographic+channel&rft.au=Potdar%2C+V.M.&rft.au=Han%2C+S.&rft.au=Chang%2C+E.&rft.date=2005-01-01&rft.pub=IEEE&rft.isbn=9780780390942&rft.issn=1935-4576&rft.spage=697&rft.epage=700&rft_id=info:doi/10.1109%2FINDIN.2005.1560460&rft.externalDocID=1560460 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1935-4576&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1935-4576&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1935-4576&client=summon |