A new method for locating data hiding in image steganography
In the steganographic picture, it remains a challenging problem to determine the best place for inserting the hidden message with a minimum distortion of the host medium. However, there is a long way to go to select the right embedding position with less distortion. To accomplish this goal, we sugge...
Gespeichert in:
Veröffentlicht in: | Multimedia tools and applications 2024-04, Vol.83 (12), p.34323-34349 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 34349 |
---|---|
container_issue | 12 |
container_start_page | 34323 |
container_title | Multimedia tools and applications |
container_volume | 83 |
creator | Pramanik, Sabyasachi |
description | In the steganographic picture, it remains a challenging problem to determine the best place for inserting the hidden message with a minimum distortion of the host medium. However, there is a long way to go to select the right embedding position with less distortion. To accomplish this goal, we suggest a new high performance image steganography method in which extreme machine learning algorithms (ELM) are updated to build a supervised mathematical model. The ELM is initially checked in regression mode on a portion of the picture or host medium. This helped us to determine the best place to embed the message with the best values in the expected assessment measurements. For practicing on a new metric, contrast, homogeneity and other texture characteristics are used. In addition, the established ELM is used to tackle over fitting during workout. The findings are analyzed using the correlation, the structural similarity measure, fusion matrices and mean square error in the efficiency of the proposed steganography approach. In terms of imperceptibility, the adjusted ELM has been found to transcend current approaches. Excellent characteristics of the findings indicate that the proposed steganographic method is highly capable of retaining the visual image detail. In accordance with the current state of the art approaches, an increase of 28 per cent of imperceptibility is achieved. |
doi_str_mv | 10.1007/s11042-023-16762-3 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3030965059</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3030965059</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-1a8907be804b62a0408b8d4954eda0426a24abde8e641b9d880dbb7beba33ba33</originalsourceid><addsrcrecordid>eNp9kE1LAzEQhoMoWKt_wFPAc3TysdkseCnFLyh40XNImnR3S7tZky3Sf2_WFfTkYZgZeN93hgehawq3FKC8S5SCYAQYJ1SWkhF-gma0KDkpS0ZP_8zn6CKlLQCVBRMzdL_Anf_Eez80weFNiHgX1mZouxo7MxjctG6c2w63e1N7nAZfmy7U0fTN8RKdbcwu-aufPkfvjw9vy2eyen16WS5WZM1pNRBqVAWl9QqElcyAAGWVE1UhvMsbk4YJY51XXgpqK6cUOGuzwRrOx5qjmym3j-Hj4NOgt-EQu3xSc-BQyQKKKqvYpFrHkFL0G93H_HQ8agp6pKQnSjpT0t-U9BjNJ1PK4q728Tf6H9cXaHVpZQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3030965059</pqid></control><display><type>article</type><title>A new method for locating data hiding in image steganography</title><source>SpringerLink Journals - AutoHoldings</source><creator>Pramanik, Sabyasachi</creator><creatorcontrib>Pramanik, Sabyasachi</creatorcontrib><description>In the steganographic picture, it remains a challenging problem to determine the best place for inserting the hidden message with a minimum distortion of the host medium. However, there is a long way to go to select the right embedding position with less distortion. To accomplish this goal, we suggest a new high performance image steganography method in which extreme machine learning algorithms (ELM) are updated to build a supervised mathematical model. The ELM is initially checked in regression mode on a portion of the picture or host medium. This helped us to determine the best place to embed the message with the best values in the expected assessment measurements. For practicing on a new metric, contrast, homogeneity and other texture characteristics are used. In addition, the established ELM is used to tackle over fitting during workout. The findings are analyzed using the correlation, the structural similarity measure, fusion matrices and mean square error in the efficiency of the proposed steganography approach. In terms of imperceptibility, the adjusted ELM has been found to transcend current approaches. Excellent characteristics of the findings indicate that the proposed steganographic method is highly capable of retaining the visual image detail. In accordance with the current state of the art approaches, an increase of 28 per cent of imperceptibility is achieved.</description><identifier>ISSN: 1573-7721</identifier><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-023-16762-3</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Communication ; Computer Communication Networks ; Computer Science ; Data Structures and Information Theory ; Distortion ; Electronic commerce ; Homogeneity ; Internet ; Machine learning ; Mathematical analysis ; Messages ; Multimedia ; Multimedia Information Systems ; Neural networks ; Special Purpose and Application-Based Systems ; Steganography</subject><ispartof>Multimedia tools and applications, 2024-04, Vol.83 (12), p.34323-34349</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-1a8907be804b62a0408b8d4954eda0426a24abde8e641b9d880dbb7beba33ba33</citedby><cites>FETCH-LOGICAL-c319t-1a8907be804b62a0408b8d4954eda0426a24abde8e641b9d880dbb7beba33ba33</cites><orcidid>0000-0002-9431-8751</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-023-16762-3$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-023-16762-3$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,777,781,27905,27906,41469,42538,51300</link.rule.ids></links><search><creatorcontrib>Pramanik, Sabyasachi</creatorcontrib><title>A new method for locating data hiding in image steganography</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>In the steganographic picture, it remains a challenging problem to determine the best place for inserting the hidden message with a minimum distortion of the host medium. However, there is a long way to go to select the right embedding position with less distortion. To accomplish this goal, we suggest a new high performance image steganography method in which extreme machine learning algorithms (ELM) are updated to build a supervised mathematical model. The ELM is initially checked in regression mode on a portion of the picture or host medium. This helped us to determine the best place to embed the message with the best values in the expected assessment measurements. For practicing on a new metric, contrast, homogeneity and other texture characteristics are used. In addition, the established ELM is used to tackle over fitting during workout. The findings are analyzed using the correlation, the structural similarity measure, fusion matrices and mean square error in the efficiency of the proposed steganography approach. In terms of imperceptibility, the adjusted ELM has been found to transcend current approaches. Excellent characteristics of the findings indicate that the proposed steganographic method is highly capable of retaining the visual image detail. In accordance with the current state of the art approaches, an increase of 28 per cent of imperceptibility is achieved.</description><subject>Algorithms</subject><subject>Communication</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Data Structures and Information Theory</subject><subject>Distortion</subject><subject>Electronic commerce</subject><subject>Homogeneity</subject><subject>Internet</subject><subject>Machine learning</subject><subject>Mathematical analysis</subject><subject>Messages</subject><subject>Multimedia</subject><subject>Multimedia Information Systems</subject><subject>Neural networks</subject><subject>Special Purpose and Application-Based Systems</subject><subject>Steganography</subject><issn>1573-7721</issn><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp9kE1LAzEQhoMoWKt_wFPAc3TysdkseCnFLyh40XNImnR3S7tZky3Sf2_WFfTkYZgZeN93hgehawq3FKC8S5SCYAQYJ1SWkhF-gma0KDkpS0ZP_8zn6CKlLQCVBRMzdL_Anf_Eez80weFNiHgX1mZouxo7MxjctG6c2w63e1N7nAZfmy7U0fTN8RKdbcwu-aufPkfvjw9vy2eyen16WS5WZM1pNRBqVAWl9QqElcyAAGWVE1UhvMsbk4YJY51XXgpqK6cUOGuzwRrOx5qjmym3j-Hj4NOgt-EQu3xSc-BQyQKKKqvYpFrHkFL0G93H_HQ8agp6pKQnSjpT0t-U9BjNJ1PK4q728Tf6H9cXaHVpZQ</recordid><startdate>20240401</startdate><enddate>20240401</enddate><creator>Pramanik, Sabyasachi</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-9431-8751</orcidid></search><sort><creationdate>20240401</creationdate><title>A new method for locating data hiding in image steganography</title><author>Pramanik, Sabyasachi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-1a8907be804b62a0408b8d4954eda0426a24abde8e641b9d880dbb7beba33ba33</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Algorithms</topic><topic>Communication</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Data Structures and Information Theory</topic><topic>Distortion</topic><topic>Electronic commerce</topic><topic>Homogeneity</topic><topic>Internet</topic><topic>Machine learning</topic><topic>Mathematical analysis</topic><topic>Messages</topic><topic>Multimedia</topic><topic>Multimedia Information Systems</topic><topic>Neural networks</topic><topic>Special Purpose and Application-Based Systems</topic><topic>Steganography</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Pramanik, Sabyasachi</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Pramanik, Sabyasachi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A new method for locating data hiding in image steganography</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2024-04-01</date><risdate>2024</risdate><volume>83</volume><issue>12</issue><spage>34323</spage><epage>34349</epage><pages>34323-34349</pages><issn>1573-7721</issn><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>In the steganographic picture, it remains a challenging problem to determine the best place for inserting the hidden message with a minimum distortion of the host medium. However, there is a long way to go to select the right embedding position with less distortion. To accomplish this goal, we suggest a new high performance image steganography method in which extreme machine learning algorithms (ELM) are updated to build a supervised mathematical model. The ELM is initially checked in regression mode on a portion of the picture or host medium. This helped us to determine the best place to embed the message with the best values in the expected assessment measurements. For practicing on a new metric, contrast, homogeneity and other texture characteristics are used. In addition, the established ELM is used to tackle over fitting during workout. The findings are analyzed using the correlation, the structural similarity measure, fusion matrices and mean square error in the efficiency of the proposed steganography approach. In terms of imperceptibility, the adjusted ELM has been found to transcend current approaches. Excellent characteristics of the findings indicate that the proposed steganographic method is highly capable of retaining the visual image detail. In accordance with the current state of the art approaches, an increase of 28 per cent of imperceptibility is achieved.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-023-16762-3</doi><tpages>27</tpages><orcidid>https://orcid.org/0000-0002-9431-8751</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1573-7721 |
ispartof | Multimedia tools and applications, 2024-04, Vol.83 (12), p.34323-34349 |
issn | 1573-7721 1380-7501 1573-7721 |
language | eng |
recordid | cdi_proquest_journals_3030965059 |
source | SpringerLink Journals - AutoHoldings |
subjects | Algorithms Communication Computer Communication Networks Computer Science Data Structures and Information Theory Distortion Electronic commerce Homogeneity Internet Machine learning Mathematical analysis Messages Multimedia Multimedia Information Systems Neural networks Special Purpose and Application-Based Systems Steganography |
title | A new method for locating data hiding in image steganography |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T11%3A34%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20new%20method%20for%20locating%20data%20hiding%20in%20image%20steganography&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Pramanik,%20Sabyasachi&rft.date=2024-04-01&rft.volume=83&rft.issue=12&rft.spage=34323&rft.epage=34349&rft.pages=34323-34349&rft.issn=1573-7721&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-023-16762-3&rft_dat=%3Cproquest_cross%3E3030965059%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3030965059&rft_id=info:pmid/&rfr_iscdi=true |