Authors: Ki-Hyun Jung, Kee-Young Yoo
Addresses: School of Computer Information, Yeungjin College, 218, Bokhyun-Dong, Buk-Gu, Daegu, 702-721, Republic of Korea. ' Dept. of Computer Engineering, Kyungpook National University, 1370, Sankuk-Dong, Buk-Gu, Daegu, 702-701, Republic of Korea
Abstract: This paper proposes two data hiding methods based on run length matching encoding. All of the proposed methods use the location of accumulated run length values where it compares the run length of the cover data with that of the secret data. The run length matching (RLM) method uses the run length table, which is constructed from the cover data and secret data. The reduced run length matching (RRLM) method calculates the difference value before making the run length encoding table. The experimental results demonstrate that RLM and RRLM have their own strengths with respect to different types of data and run length encoding value matching.
Keywords: data hiding; steganography; run length encoding; run length matching; RLM; reduced run length matching; RRLM; secret data.
International Journal of Intelligent Information and Database Systems, 2009 Vol.3 No.3, pp.311 - 325
Published online: 07 Aug 2009 *Full-text access for editors Access for subscribers Purchase this article Comment on this article